{"id":68501,"date":"2026-05-11T11:55:17","date_gmt":"2026-05-11T16:55:17","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68501"},"modified":"2026-05-11T12:05:34","modified_gmt":"2026-05-11T17:05:34","slug":"digital-signature-security-origin","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/","title":{"rendered":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters"},"content":{"rendered":"\n<p>A digital signature proves that a file hasn\u2019t been tampered with, but it doesn&#8217;t always tell you if the source is one you should trust. Geography plays a pivotal role in modern threat assessments. PC Matic\u2019s Fingerprint Dashboard has introduced <strong>Country of Origin<\/strong> data to give you total visibility into the geographic footprint of your software ecosystem.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">The Role of Geographic Origin in Software Supply Chain Security<\/h3>\n\n\n\n<p>Understanding your software signatures&#8217; origin is important because it determines whether you can reliably trust the software\u2019s integrity and authenticity. Without verifying the origin, a signature can be meaningless, and sometimes even dangerous, because it may have been issued by a compromised or untrusted source.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--70);margin-bottom:var(--wp--preset--spacing--70)\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Enhancing Threat Intelligence with the Country of Origin Tool<\/h2>\n\n\n\n<p>The Country of Origin tool analyzes every digitally signed file across your Windows devices and maps them back to their registered source.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">The Global Overview<\/h3>\n\n\n\n<p>On your dashboard, you\u2019ll see a high-level percentage breakdown. This represents the percentage of files running on your devices that were created and signed in specific regions (e.g., the United States).<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1173\" height=\"421\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-eHMIqOUuwG.png\" alt=\"PC Matic Fingerprint Dashboard showing the software origin by country\" class=\"wp-image-68502\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-eHMIqOUuwG.png 1173w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-eHMIqOUuwG-768x276.png 768w\" sizes=\"(max-width: 1173px) 100vw, 1173px\" \/><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Drilling Down into the Data<\/h3>\n\n\n\n<p>Clicking the arrow beside any country in this view will display a list of all files signed by that specific country. This list will include the Filename, Categorization, Vendor, Product, Version, and Total Devices. You can sort the list by each of those columns.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1106\" height=\"409\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-EFsA4fuYhr.png\" alt=\"Detailed geographic data in PC Matic \" class=\"wp-image-68503\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-EFsA4fuYhr.png 1106w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-EFsA4fuYhr-768x284.png 768w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Clicking the arrow icon beside a specific file, will display more detailed data about the File, it&#8217;s Digital Signature, and the Categorization.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1026\" height=\"561\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-i2jadnsapE.png\" alt=\"Detailed file signature data view in PC Matic \" class=\"wp-image-68504\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-i2jadnsapE.png 1026w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-i2jadnsapE-768x420.png 768w\" sizes=\"(max-width: 1026px) 100vw, 1026px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A digital signature proves that a file hasn\u2019t been tampered with, but it doesn&#8217;t always tell you if the source is one you should trust. Geography plays a pivotal role in modern threat assessments. PC Matic\u2019s Fingerprint Dashboard has introduced Country of Origin data to give you total visibility into the geographic footprint of your [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68509,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Knowing Your Software\u2019s Roots: Why Country of Origin Matters<\/title>\n<meta name=\"description\" content=\"A digital signature isn&#039;t enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Knowing Your Software\u2019s Roots: Why Country of Origin Matters\" \/>\n<meta property=\"og:description\" content=\"A digital signature isn&#039;t enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-11T16:55:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-11T17:05:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Knowing Your Software\u2019s Roots: Why Country of Origin Matters\",\"datePublished\":\"2026-05-11T16:55:17+00:00\",\"dateModified\":\"2026-05-11T17:05:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/\"},\"wordCount\":265,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-7.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/\",\"name\":\"Knowing Your Software\u2019s Roots: Why Country of Origin Matters\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-7.jpg\",\"datePublished\":\"2026-05-11T16:55:17+00:00\",\"dateModified\":\"2026-05-11T17:05:34+00:00\",\"description\":\"A digital signature isn't enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-7.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-3-7.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/digital-signature-security-origin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowing Your Software\u2019s Roots: Why Country of Origin Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters","description":"A digital signature isn't enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/","og_locale":"en_US","og_type":"article","og_title":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters","og_description":"A digital signature isn't enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.","og_url":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2026-05-11T16:55:17+00:00","article_modified_time":"2026-05-11T17:05:34+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters","datePublished":"2026-05-11T16:55:17+00:00","dateModified":"2026-05-11T17:05:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/"},"wordCount":265,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/","url":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/","name":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg","datePublished":"2026-05-11T16:55:17+00:00","dateModified":"2026-05-11T17:05:34+00:00","description":"A digital signature isn't enough. Discover why tracking software country of origin is the new security essential for protecting your digital supply chain.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-3-7.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/digital-signature-security-origin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Knowing Your Software\u2019s Roots: Why Country of Origin Matters"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68501"}],"version-history":[{"count":2,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68501\/revisions"}],"predecessor-version":[{"id":68507,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68501\/revisions\/68507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68509"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}