Rob Cheng joins Liz Callaway to discuss cyber regulations and more.

Rob Cheng Talks Cyber Regulations and Insurance with Liz Callaway

Last week, PC Matic founder and CEO, Rob Cheng joined Liz Callaway on her radio show to discuss all things cyber. Cyber Regulations Several regulations have been implemented, or are the midst of implementation, as a result of recent cyber attacks. There are compliance certifications and regulatory measures that organizations must be taking in order …

Rob Cheng Talks Cyber Regulations and Insurance with Liz Callaway Read More »

Multi-factor authentication is being touted as the silver bullet to ransomware.

Why Aren’t We Taking This Simple Step to Stop Ransomware?

Over the weekend I came across an article titled Why Aren’t We Taking This Simple Step to Prevent Ransomware? written by Chandra Brown. It was a quick read, that touted the use of multi-factor authentication (MFA) to prevent ransomware attacks. MFA is when two or more verification methods are needed to grant access to a …

Why Aren’t We Taking This Simple Step to Stop Ransomware? Read More »

Cybersecurity audit confirms, very little progress has been made to secure the American digital infrastructure.

Cybersecurity Audit Exposed Poor Practices by Federal Agencies

Upon evaluating the state of eight federal agencies’ digital infrastructures through a cybersecurity audit, it was confirmed, four agencies nearly failed. Had this been the first cybersecurity audit of those agencies, the scores may not be as alarming. However, in 2018 a similar audit was conducted exposing many of the same cybersecurity risks. The reality …

Cybersecurity Audit Exposed Poor Practices by Federal Agencies Read More »

IDG survey confirms application whitelisting is underutilized.

IDG Confirms Application Whitelisting is Underutilized

A recent survey by IDG confirms, application whitelisting is by far the most underutilized component of zero-trust technologies. What is Application Whitelisting? Application whitelisting only allows known trusted, and proven secure applications to run on the network. This is an effective means to cyber threat mitigation because no matter how many times malware evolves, it …

IDG Confirms Application Whitelisting is Underutilized Read More »

PC Matic and Scott Augenbaum host a virtual townhall event discussing prevention and cybersecurity.

PC Matic & Scott Augenbaum Host Virtual Townhall Event

As prevention has been top of mind for several organizations, PC Matic joins Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, to discuss application whitelisting and preventing cyber attacks. PC Matic Townhall During the one-hour townhall session, four different PC Matic employees discussed the approach PC Matic takes to prevention. By …

PC Matic & Scott Augenbaum Host Virtual Townhall Event Read More »

Zoom is slapped with an $85 million fine after misleading customers about their security practices.

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing

The video conferencing platform, Zoom, is facing a hefty fine after telling its users they were utilizing end-to-end (E2E) encryption for their platform’s meetings, when they were not. E2E encryption means the video conference would be encrypted, or inaccessible, unless the user provided an access, or decryption code. Zoom claimed they used E2E encryption, when …

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing Read More »

CSO Global Intelligence Report confirms, attack prevention is top of mind.

Attack Prevention is Top of Mind According to Global Report

The CSO Global Intelligence Report: The State of Cybersecurity in 2021 shares some interesting statistics on cybersecurity and the rate of infections. First, over 50% of those surveyed confirmed experiencing an increase in security incidents over the last year. What is more alarming is, nearly half of those infected reported economic damages, loss of productivity, …

Attack Prevention is Top of Mind According to Global Report Read More »

Americans begin the shift to a prevention focused cybersecurity stance with zero-trust technologies.

Cybersecurity Prevention – Is the World Making the Shift?

Fifteen days ago, I wrote about an interview PC Matic Vice President, Corey Munson, had with the CEO of Secure Anchor Consulting, Dr. Eric Cole discussing cybersecurity prevention and application whitelisting.  As you may recall, one of Dr. Cole’s biggest concerns, was the threat of extortion upon becoming a victim of ransomware.  For those who …

Cybersecurity Prevention – Is the World Making the Shift? Read More »

Biden is warning "real shooting war" if cyber attacks continue.

“Real Shooting War” May Result If Cyber Attacks Continue

You may have read our posts lately about the “whodunit” theories. Who originated the attacks against meat packing plants, managed service providers, and pipelines? There are many theories, many of which align with Russia and China being the culprits. These allegations have placed heated tensions on the American relationships with these two countries, and President …

“Real Shooting War” May Result If Cyber Attacks Continue Read More »

There are eight essential steps organizations should be taking for cyber threat prevention.

The Eight Essentials To Cyber Threat Prevention

Australia has released their Essential Eight Maturity Model (EEMM), and we have to hand it to them, it is good. It is simple, easy to interpret, and focuses on cyber threat prevention, instead of reaction. Australia’s Guide to Cyber Threat Prevention Let’s take a look at the eight essential steps included Australia’s EEMM, Application whitelisting …

The Eight Essentials To Cyber Threat Prevention Read More »

NIST deploys NCCoE in an effort to provide guidance on zero-trust technologies.

PC Matic Joins NIST National Cybersecurity Center of Excellence

PC Matic is one of the handpicked cybersecurity solutions that will work with the NIST National Cybersecurity Center of Excellence (NCCoE) to demonstrate its approach to implementing a zero-trust architecture.   “We received an overwhelming response from the vendor community on this important project,” said Natalia Martin, acting director of the NCCoE. “Implementing a zero-trust architecture …

PC Matic Joins NIST National Cybersecurity Center of Excellence Read More »

Instead of focusing on the whodunit, it's time American's focused on prevention.

Focus on Closing Security Holes, Not the Whodunit

With high profile ransomware attacks taking place more and more frequently, the U.S. administration has placed an emphasis on finding out who is responsible. The question is why? When it comes to these massive attacks, their level of sophistication is far greater than most. Meaning, the cyber criminals have spent months, perhaps even years to …

Focus on Closing Security Holes, Not the Whodunit Read More »