{"id":1658,"date":"2018-09-20T07:08:00","date_gmt":"2018-09-20T07:08:00","guid":{"rendered":"https:\/\/www.pentame.com\/blog\/?p=1658"},"modified":"2025-09-24T06:56:58","modified_gmt":"2025-09-24T06:56:58","slug":"protect-your-pc-from-ransomware-malware-attack","status":"publish","type":"post","link":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/","title":{"rendered":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK"},"content":{"rendered":"<p>Anti-malware tools are an important part of your computer\u2019s security system. you should have installed and been running the most current version antivirus on your computer.<\/p>\n<p>malware tools give you the ability to scan emails attachments before opening them.<br \/>\nonce you open the attachment, your computer is at risk of becoming infected with malware. Another way ransomware can infect computers is through certain websites.<\/p>\n<ul>\n<li style=\"text-align: left\">If you\u2019re not sure about email attachment or link in email .block the sender and delete the email.<\/li>\n<li style=\"text-align: left\">Checking that it is really an email that has been sent, and not clicking on the links to avoid falling victim to tricks that might result in infection.<\/li>\n<li style=\"text-align: left\">the threat is detected and blocked timely manner so they can\u2019t take advantage of the security flaw<\/li>\n<li style=\"text-align: left\">Avoid downloading apps from unsecured sites and only install apps from trusted sources.<\/li>\n<li style=\"text-align: left\">Don\u2019t subscribe unsecured sites with your email account.<\/li>\n<li style=\"text-align: left\">Add Antivirus add-ins in your third-party mail using the software.<\/li>\n<li style=\"text-align: left\">When you are using Webmail enable the Antivirus extensions in the browser.<\/li>\n<li style=\"text-align: left\">Enable automatic updates your operating system and applications.<\/li>\n<li style=\"text-align: left\">You can often recognize a fake email and webpage because they have bad spelling, or just look letters. Look out for strange spellings of company names (like \u201cEtisalat \u201d instead of \u201cEtisalait\u201d) or unusual spaces, symbols.<\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-pentagon-information-technology wp-block-embed-pentagon-information-technology\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Bw13MsLY3G\"><a href=\"https:\/\/www.pentame.com\/blog\/some-web-design-trends-for-2018\/\">Some Web Design Trends for 2018<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"\u201cSome Web Design Trends for 2018\u201d \u2014 Pentagon Information Technology\" src=\"https:\/\/www.pentame.com\/blog\/some-web-design-trends-for-2018\/embed\/#?secret=T5lW3EMGWA#?secret=Bw13MsLY3G\" data-secret=\"Bw13MsLY3G\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Anti-malware tools are an important part of your computer\u2019s security system. you should have installed and been running the most current version antivirus on your computer. malware tools give you the ability to scan emails attachments before opening them. once you open the attachment, your computer is at risk of becoming infected with malware. Another [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":3659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK | Pentagon<\/title>\n<meta name=\"description\" content=\"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK | Pentagon\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Pentagon Information Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pentagon.ae\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-20T07:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T06:56:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Rojo Jose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pentame\" \/>\n<meta name=\"twitter:site\" content=\"@pentame\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rojo Jose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/\"},\"author\":{\"name\":\"Rojo Jose\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#\\\/schema\\\/person\\\/9081191afbc065d24a97d9b578d19c5b\"},\"headline\":\"PROTECT YOUR PC FROM RANSOMWARE \\\/ MALWARE ATTACK\",\"datePublished\":\"2018-09-20T07:08:00+00:00\",\"dateModified\":\"2025-09-24T06:56:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/\"},\"wordCount\":230,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Protect-your-pc.webp\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/\",\"name\":\"PROTECT YOUR PC FROM RANSOMWARE \\\/ MALWARE ATTACK | Pentagon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Protect-your-pc.webp\",\"datePublished\":\"2018-09-20T07:08:00+00:00\",\"dateModified\":\"2025-09-24T06:56:58+00:00\",\"description\":\"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \\\/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Protect-your-pc.webp\",\"contentUrl\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Protect-your-pc.webp\",\"width\":787,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/protect-your-pc-from-ransomware-malware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PROTECT YOUR PC FROM RANSOMWARE \\\/ MALWARE ATTACK\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/\",\"name\":\"Pentagon Information Technology\",\"description\":\"World Class SEO Friendly Web Design &amp; Development Company UAE\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#organization\",\"name\":\"Pentagon Information Technology\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo.png\",\"width\":397,\"height\":397,\"caption\":\"Pentagon Information Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pentagon.ae\\\/\",\"https:\\\/\\\/x.com\\\/pentame\",\"https:\\\/\\\/www.instagram.com\\\/pentagon.ae\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/pentamevideos\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pentasolutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/#\\\/schema\\\/person\\\/9081191afbc065d24a97d9b578d19c5b\",\"name\":\"Rojo Jose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/rojo-sir.jpg\",\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/rojo-sir.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/rojo-sir.jpg\",\"caption\":\"Rojo Jose\"},\"description\":\"Rojo Jose is the Founder and CEO of Pentagon Information Technology and a seasoned Digital Strategist with over 29 years of expertise in Cloud Infrastructure &amp; Hosting, Web &amp; E-commerce Development, Cybersecurity, Penetration Testing, and Digital Marketing. With a strong presence across the UAE, US, and UK, he has helped businesses implement secure, scalable, and growth-focused digital solutions. Under his leadership, Pentagon has become a trusted name in delivering innovative IT services worldwide.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/rojo-jose\\\/\"],\"url\":\"https:\\\/\\\/www.pentame.com\\\/blog\\\/author\\\/rojojose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK | Pentagon","description":"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/","og_locale":"en_US","og_type":"article","og_title":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK | Pentagon","og_description":"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology","og_url":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/","og_site_name":"Pentagon Information Technology","article_publisher":"https:\/\/www.facebook.com\/pentagon.ae\/","article_published_time":"2018-09-20T07:08:00+00:00","article_modified_time":"2025-09-24T06:56:58+00:00","og_image":[{"width":787,"height":425,"url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","type":"image\/webp"}],"author":"Rojo Jose","twitter_card":"summary_large_image","twitter_creator":"@pentame","twitter_site":"@pentame","twitter_misc":{"Written by":"Rojo Jose","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#article","isPartOf":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/"},"author":{"name":"Rojo Jose","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b"},"headline":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK","datePublished":"2018-09-20T07:08:00+00:00","dateModified":"2025-09-24T06:56:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/"},"wordCount":230,"commentCount":0,"publisher":{"@id":"https:\/\/www.pentame.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/","url":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/","name":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK | Pentagon","isPartOf":{"@id":"https:\/\/www.pentame.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","datePublished":"2018-09-20T07:08:00+00:00","dateModified":"2025-09-24T06:56:58+00:00","description":"Stay ahead of trends, read PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK . Dive into the latest blogs from Pentagon Information Technology","breadcrumb":{"@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#primaryimage","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","width":787,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.pentame.com\/blog\/protect-your-pc-from-ransomware-malware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pentame.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.pentame.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"PROTECT YOUR PC FROM RANSOMWARE \/ MALWARE ATTACK"}]},{"@type":"WebSite","@id":"https:\/\/www.pentame.com\/blog\/#website","url":"https:\/\/www.pentame.com\/blog\/","name":"Pentagon Information Technology","description":"World Class SEO Friendly Web Design &amp; Development Company UAE","publisher":{"@id":"https:\/\/www.pentame.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pentame.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pentame.com\/blog\/#organization","name":"Pentagon Information Technology","url":"https:\/\/www.pentame.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2023\/12\/logo.png","width":397,"height":397,"caption":"Pentagon Information Technology"},"image":{"@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pentagon.ae\/","https:\/\/x.com\/pentame","https:\/\/www.instagram.com\/pentagon.ae\/","https:\/\/www.youtube.com\/user\/pentamevideos","https:\/\/www.linkedin.com\/company\/pentasolutions"]},{"@type":"Person","@id":"https:\/\/www.pentame.com\/blog\/#\/schema\/person\/9081191afbc065d24a97d9b578d19c5b","name":"Rojo Jose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg","url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg","contentUrl":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2025\/07\/rojo-sir.jpg","caption":"Rojo Jose"},"description":"Rojo Jose is the Founder and CEO of Pentagon Information Technology and a seasoned Digital Strategist with over 29 years of expertise in Cloud Infrastructure &amp; Hosting, Web &amp; E-commerce Development, Cybersecurity, Penetration Testing, and Digital Marketing. With a strong presence across the UAE, US, and UK, he has helped businesses implement secure, scalable, and growth-focused digital solutions. Under his leadership, Pentagon has become a trusted name in delivering innovative IT services worldwide.","sameAs":["https:\/\/www.linkedin.com\/in\/rojo-jose\/"],"url":"https:\/\/www.pentame.com\/blog\/author\/rojojose\/"}]}},"fimg_url":"https:\/\/www.pentame.com\/blog\/wp-content\/uploads\/2018\/09\/Protect-your-pc.webp","time":"54 Sec","related_services":false,"tag_names":[],"category":[],"category_names":{"Security":"security"},"_links":{"self":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/comments?post=1658"}],"version-history":[{"count":2,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1658\/revisions"}],"predecessor-version":[{"id":4207,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/posts\/1658\/revisions\/4207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/media\/3659"}],"wp:attachment":[{"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/media?parent=1658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/categories?post=1658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pentame.com\/blog\/wp-json\/wp\/v2\/tags?post=1658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}