Whitelisting 101

Protect you PC

A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional antivirus, blacklist, works by making a list of all the known “bad things” and then blocking them from a computer. This approach means you need multiple layers of protection. Often, you’ll see firewalls, email […]

108 total views, 2 views today

Continue reading


Youth Cyber Education

Teaching America’s youth the importance of cyber security No one is arguing that cyber security is an ongoing problem. Ransomware attacks are rising. As a result of ransomware payments, the ransoms are becoming more expensive. A proactive approach to the ransomware problem lies in the education of America’s youth. Educating youth on a topic, bringing […]

195 total views, 2 views today

Continue reading


Los Altos Union High School Attacked By Ransomware

Safety procedures in place by the district mitigated losses Another school has been attacked with ransomware. Lost Altos Union HS discovered the hit when an employee tried logging into email at 5:30am the morning of January 29th. From there, the full scope of the breach was discovered. Los Altos had some good safety procedures in […]

234 total views, 2 views today

Continue reading


What it will take to defend schools from digital threats

It is time for school trustees and administrators to embrace their leadership responsibility to safeguard their school communities from emerging digital threats As published on DallasNews.com By Doug Levin https://k12cybersecure.com/ 12:00 AM on Feb 6, 2020 Texas schools face an immediate threat that few parents and educators have considered: computer malware and the scourge of cybercrime. […]

403 total views, 2 views today

Continue reading


MSP vs Self-Managed IT

MSPs are becoming more popular with businesses American business is becoming increasingly dependent on technology. Whether you’re a large corporation with employees spanning the country or even the world, or a mom and pop shop, there will be different layers of technology built into your operations. Therefore, managing that tech is necessary. We know about […]

997 total views, 2 views today

Continue reading


Free Antivirus Isn’t Free

That free AV software isn’t out of the kindness of their hearts Yesterday we announced PC Matic’s Data Integrity Pledge. Recently, news that some “free” antivirus (AV) products surfaced. Interestingly, these free products have been caught with their hands in the (digital) cookie jar. In an article by PCMag, it was discovered that one free […]

459 total views, 1 views today

Continue reading


PC Matic Announces Data Integrity Pledge

PC Matic Release

Creating a more secure world This morning, PC Matic released our Data Integrity Pledge. The pledge assures both current and future customers that PC Matic will never release their personal information, directly or indirectly, to third parties. In other words, PC Matic values your privacy. Security is the top priority at PC Matic. Therefore, PC […]

1,273 total views, 2 views today

Continue reading


RDP 101

Who has RDP? There’s been a lot of talk in recent months about RDP being the favorite attack vector for cybercriminals. This raises a lot of concern, especially if you aren’t sure what RDP means. It’s likely that if you aren’t familiar with RDP, it’s not something you have to worry about. RDP means remote […]

1,499 total views, 2 views today

Continue reading


National Attempt to Thwart Cyber Warfare

Department of Defense sets guidelines The Department of Defense (DOD) is ready to release its first manual for the Cybersecurity Maturity Model Certification (CMMC) guidelines. Several drafts have been released recently, with 0.7 being the latest in early December. CMMC guidelines regulate organizations looking to do work on government contracts. Therefore, it’ll decrease the likelihood […]

1,574 total views, no views today

Continue reading