Kayla Elliott

Insider threats are on the rise. So what can organizations do?

Insider Threats Are on the Rise – How Can Businesses Remain Protected?

From 2018 to 2020 insider threats have increased 47% leading to a 31% increase in insider threat costs.  In 2020, the total cost of insider threats was just under $11.5 million.  Today, those numbers are increasing as cyber criminals are offering employees a hefty payday if they infect their corporate networks with ransomware.   In August …

Insider Threats Are on the Rise – How Can Businesses Remain Protected? Read More »

How Does Application Whitelisting Help Guard Against Ransomware?

Ransomware – The Looming Threat Application Whitelisting for cyber security. Throughout the last 18 months, rarely did a day go by a company, school, government agency, or public municipality went without a ransomware infection.  Since January, twelve educational institutions publicly announced being hit with ransomware, with ransom payments ranging from $28,000 to $2,900. The success …

How Does Application Whitelisting Help Guard Against Ransomware? Read More »

Rob Cheng joins Liz Callaway to discuss cyber regulations and more.

Rob Cheng Talks Cyber Regulations and Insurance with Liz Callaway

Last week, PC Matic founder and CEO, Rob Cheng joined Liz Callaway on her radio show to discuss all things cyber. Cyber Regulations Several regulations have been implemented, or are the midst of implementation, as a result of recent cyber attacks. There are compliance certifications and regulatory measures that organizations must be taking in order …

Rob Cheng Talks Cyber Regulations and Insurance with Liz Callaway Read More »

Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting

Application Whitelisting — Is it too extreme?

Whitelisting – Is it worth the work? Recently, Information Week reported application whitelisting as an “extreme” method for preventing malware.  Is it extreme?  It very well could be.  Application whitelisting goes against the very core of traditional security programs.   Instead of using a blacklist, which allows unknown files to execute until they prove to …

Application Whitelisting — Is it too extreme? Read More »

Cybersecurity audit confirms, very little progress has been made to secure the American digital infrastructure.

Cybersecurity Audit Exposed Poor Practices by Federal Agencies

Upon evaluating the state of eight federal agencies’ digital infrastructures through a cybersecurity audit, it was confirmed, four agencies nearly failed. Had this been the first cybersecurity audit of those agencies, the scores may not be as alarming. However, in 2018 a similar audit was conducted exposing many of the same cybersecurity risks. The reality …

Cybersecurity Audit Exposed Poor Practices by Federal Agencies Read More »

PC Matic and Scott Augenbaum host a virtual townhall event discussing prevention and cybersecurity.

PC Matic & Scott Augenbaum Host Virtual Townhall Event

As prevention has been top of mind for several organizations, PC Matic joins Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, to discuss application whitelisting and preventing cyber attacks. PC Matic Townhall During the one-hour townhall session, four different PC Matic employees discussed the approach PC Matic takes to prevention. By …

PC Matic & Scott Augenbaum Host Virtual Townhall Event Read More »

Zoom is slapped with an $85 million fine after misleading customers about their security practices.

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing

The video conferencing platform, Zoom, is facing a hefty fine after telling its users they were utilizing end-to-end (E2E) encryption for their platform’s meetings, when they were not. E2E encryption means the video conference would be encrypted, or inaccessible, unless the user provided an access, or decryption code. Zoom claimed they used E2E encryption, when …

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing Read More »

CSO Global Intelligence Report confirms, attack prevention is top of mind.

Attack Prevention is Top of Mind According to Global Report

The CSO Global Intelligence Report: The State of Cybersecurity in 2021 shares some interesting statistics on cybersecurity and the rate of infections. First, over 50% of those surveyed confirmed experiencing an increase in security incidents over the last year. What is more alarming is, nearly half of those infected reported economic damages, loss of productivity, …

Attack Prevention is Top of Mind According to Global Report Read More »

Americans begin the shift to a prevention focused cybersecurity stance with zero-trust technologies.

Cybersecurity Prevention – Is the World Making the Shift?

Fifteen days ago, I wrote about an interview PC Matic Vice President, Corey Munson, had with the CEO of Secure Anchor Consulting, Dr. Eric Cole discussing cybersecurity prevention and application whitelisting.  As you may recall, one of Dr. Cole’s biggest concerns, was the threat of extortion upon becoming a victim of ransomware.  For those who …

Cybersecurity Prevention – Is the World Making the Shift? Read More »

Biden is warning "real shooting war" if cyber attacks continue.

“Real Shooting War” May Result If Cyber Attacks Continue

You may have read our posts lately about the “whodunit” theories. Who originated the attacks against meat packing plants, managed service providers, and pipelines? There are many theories, many of which align with Russia and China being the culprits. These allegations have placed heated tensions on the American relationships with these two countries, and President …

“Real Shooting War” May Result If Cyber Attacks Continue Read More »

There are eight essential steps organizations should be taking for cyber threat prevention.

The Eight Essentials To Cyber Threat Prevention

Australia has released their Essential Eight Maturity Model (EEMM), and we have to hand it to them, it is good. It is simple, easy to interpret, and focuses on cyber threat prevention, instead of reaction. Australia’s Guide to Cyber Threat Prevention Let’s take a look at the eight essential steps included Australia’s EEMM, Application whitelisting …

The Eight Essentials To Cyber Threat Prevention Read More »

NIST deploys NCCoE in an effort to provide guidance on zero-trust technologies.

PC Matic Joins NIST National Cybersecurity Center of Excellence

PC Matic is one of the handpicked cybersecurity solutions that will work with the NIST National Cybersecurity Center of Excellence (NCCoE) to demonstrate its approach to implementing a zero-trust architecture.   “We received an overwhelming response from the vendor community on this important project,” said Natalia Martin, acting director of the NCCoE. “Implementing a zero-trust architecture …

PC Matic Joins NIST National Cybersecurity Center of Excellence Read More »

Instead of focusing on the whodunit, it's time American's focused on prevention.

Focus on Closing Security Holes, Not the Whodunit

With high profile ransomware attacks taking place more and more frequently, the U.S. administration has placed an emphasis on finding out who is responsible. The question is why? When it comes to these massive attacks, their level of sophistication is far greater than most. Meaning, the cyber criminals have spent months, perhaps even years to …

Focus on Closing Security Holes, Not the Whodunit Read More »