Kayla Elliott

Dr. Eric Cole discusses prevention and the evolution of application whitelisting with PC Matic Vice President, Corey Munson.

Dr. Eric Cole Talks Prevention & Application Whitelisting

The founder and CEO of Secure Anchor Consulting, Dr. Eric Cole, and PC Matic Vice President of Sales, Corey Munson, connected earlier this week to talk cybersecurity. Application Whitelisting Isn’t What it Once Was… Truth be told, application whitelisting wasn’t always done in the most efficient manner. As Dr. Cole mentions, when he discusses the …

Dr. Eric Cole Talks Prevention & Application Whitelisting Read More »

Russian cyber gang, REvil, has been taken offline.

Largest Cyber Gang, REvil, Taken Offline, But For How Long?

The world is rejoicing. The Russian cyber gang responsible for two of the biggest ransomware attacks in history, JBS and Kaseya, has been taken offline. The real question is, for how long? Many believe that they were taken offline by political officials, from either the U.S. or Russia. Given the amount of tension the Kaseya …

Largest Cyber Gang, REvil, Taken Offline, But For How Long? Read More »

The healthcare sector is facing a high risk for cyber crime.

Rob Cheng Weighs In – Healthcare Sector is at Risk

As ransomware threats continue to rise, PC Matic founder and CEO, Rob Cheng, shared his thoughts on the increased likelihood of healthcare facilities falling victim. Increased Technology, Increased Vulnerability Healthcare facilities have become increasingly technical. From the way patient files are stored to the ways medical procedures are done, technology plays a significant role. Unfortunately, …

Rob Cheng Weighs In – Healthcare Sector is at Risk Read More »

Colonial Pipeline pays hackers, and then doesn't even use the decryption key.

Colonial Pipeline – The Perfect Example of Why Not to Pay

You’ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker’s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly …

Colonial Pipeline – The Perfect Example of Why Not to Pay Read More »

The U.S. administration is threatening retaliation against Russia.

A Warning to Russia – We Will Strike Back

President Biden recently met with his top security advisors after the latest ransomware attack against Kaseya led to approximately 1,500 organizations becoming infected with ransomware. The ransomware attack is believed to have had originated from Russia, just three weeks after Biden had a one-on-one meeting with Putin in Geneva. During this meeting, President Biden provided …

A Warning to Russia – We Will Strike Back Read More »

What can Americans do to stay cyber secure?

Keeping Your Organization Cyber Secure Amidst Global Threats

If you were looking, cyber threats have been in the news for years. However, they’ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya. The news has left the world wondering what to do to stay cyber secure. …

Keeping Your Organization Cyber Secure Amidst Global Threats Read More »

Rob Cheng talks security holes with Scoop News Group's Wyatt Kash.

Two Types of Security Holes – Do you know what they are?

According to PC Matic founder and CEO, Rob Cheng, there are two types of security holes that organizations need to address. Unauthorized Software Unauthorized software is any type of software that you do not want running on your network. This may not always be malicious. For instance, if you issue a mobile device to employees, …

Two Types of Security Holes – Do you know what they are? Read More »

PC Matic's whitelist holds the keys to protection.

Behind the Scenes of PC Matic’s Patented Whitelisting Technology

Did you know PC Matic uses application whitelisting as it’s core method of malware detection? What is Application Whitelisting? To understanding what application whitelisting is, you must first understanding its alternative. Since the beginning of time {antivirus time, of course} the method companies would use to identify malware was called a blacklist. The blacklist, similar …

Behind the Scenes of PC Matic’s Patented Whitelisting Technology Read More »

Increasing your cybersecurity posture is imperative in today's digital world.

5 Best Practices For Advancing Your Cybersecurity Position

Cyber threats are continuing to grow, making it more important than ever to make cyber safe decisions while using devices. Here are the top five best practices for advancing your cybersecurity position. Use a Proactive Cybersecurity Solution First, and quite possibly foremost, using an cybersecurity solution that implements proactive measures to block cyber attacks versus …

5 Best Practices For Advancing Your Cybersecurity Position Read More »

New legislation has been proposed in an attempt to increase cyber awareness.

Is Legislation Enough to Increase Cyber Awareness?

After cyber criminals have continuously targeted American businesses and vital sectors, a group of bipartisan House lawmakers introduced a bill to increase cyber awareness. The American Cybersecurity Literacy Act would require the National Telecommunications and Information Administration (NTIA) to create a cyber literacy campaign. The campaign’s objective is to increase awareness. By increasing awareness, the …

Is Legislation Enough to Increase Cyber Awareness? Read More »

MITRE releases their new framework, D3FEND.

MITRE D3FEND – A New Framework for Cybersecurity Professionals

MITRE, an organization dedicated to cybersecurity, recently released their latest framework, D3FEND. D3FEND is positioned as an offensive approach to cyber crime. Therefore, offering a complimentary component to MITRE’s existing knowledge base of cyber criminal behavior, ATT&CK. ATT&CK & D3FEND Available worldwide, ATT&CK is a free knowledge base of cyber adversary tactics and techniques based on …

MITRE D3FEND – A New Framework for Cybersecurity Professionals Read More »