{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/potentially-unwanted-application-pua","result":{"data":{"contentfulDictionaryTerm":{"title":"Potentially Unwanted Application (PUA)","slug":"potentially-unwanted-application-pua","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":" Learn about potentially unwanted applications and how to secure your business against them."}},"body":{"body":"# Potentially Unwanted Application (PUA)\nPrograms that aren’t necessarily malicious, but may not be secure enough for use in a business environment. These can include adware, tools for managing a computer, and scanners that identify vulnerabilities in computer systems.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"potentially-unwanted-application-pua","style":"position:relative;"},"children":[{"type":"text","value":"Potentially Unwanted Application (PUA)"},{"type":"element","tagName":"a","properties":{"href":"#potentially-unwanted-application-pua","ariaLabel":"potentially unwanted application pua permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Programs that aren’t necessarily malicious, but may not be secure enough for use in a business environment. These can include adware, tools for managing a computer, and scanners that identify vulnerabilities in computer systems."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Potentially Unwanted Application (PUA)","slug":"potentially-unwanted-application-pua","keepLearning":[{"title":"Pretexting","slug":"pretexting"},{"title":"Push Notifications (web","slug":"push-notifications-web"},{"title":"Quarantining","slug":"quarantining"}],"breadcrumb":{"location":"/dictionary/potentially-unwanted-application-pua","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/potentially-unwanted-application-pua","crumbLabel":"potentially-unwanted-application-pua"}]}}},"staticQueryHashes":["1614255152"]}