Biden is warning "real shooting war" if cyber attacks continue.

“Real Shooting War” May Result If Cyber Attacks Continue

You may have read our posts lately about the “whodunit” theories. Who originated the attacks against meat packing plants, managed service providers, and pipelines? There are many theories, many of which align with Russia and China being the culprits. These allegations have placed heated tensions on the American relationships with these two countries, and President …

“Real Shooting War” May Result If Cyber Attacks Continue Read More »

There are eight essential steps organizations should be taking for cyber threat prevention.

The Eight Essentials To Cyber Threat Prevention

Australia has released their Essential Eight Maturity Model (EEMM), and we have to hand it to them, it is good. It is simple, easy to interpret, and focuses on cyber threat prevention, instead of reaction. Australia’s Guide to Cyber Threat Prevention Let’s take a look at the eight essential steps included Australia’s EEMM, Application whitelisting …

The Eight Essentials To Cyber Threat Prevention Read More »

NIST deploys NCCoE in an effort to provide guidance on zero-trust technologies.

PC Matic Joins NIST National Cybersecurity Center of Excellence

PC Matic is one of the handpicked cybersecurity solutions that will work with the NIST National Cybersecurity Center of Excellence (NCCoE) to demonstrate its approach to implementing a zero-trust architecture.   “We received an overwhelming response from the vendor community on this important project,” said Natalia Martin, acting director of the NCCoE. “Implementing a zero-trust architecture …

PC Matic Joins NIST National Cybersecurity Center of Excellence Read More »

Instead of focusing on the whodunit, it's time American's focused on prevention.

Focus on Closing Security Holes, Not the Whodunit

With high profile ransomware attacks taking place more and more frequently, the U.S. administration has placed an emphasis on finding out who is responsible. The question is why? When it comes to these massive attacks, their level of sophistication is far greater than most. Meaning, the cyber criminals have spent months, perhaps even years to …

Focus on Closing Security Holes, Not the Whodunit Read More »

The healthcare sector is facing a high risk for cyber crime.

Rob Cheng Weighs In – Healthcare Sector is at Risk

As ransomware threats continue to rise, PC Matic founder and CEO, Rob Cheng, shared his thoughts on the increased likelihood of healthcare facilities falling victim. Increased Technology, Increased Vulnerability Healthcare facilities have become increasingly technical. From the way patient files are stored to the ways medical procedures are done, technology plays a significant role. Unfortunately, …

Rob Cheng Weighs In – Healthcare Sector is at Risk Read More »

Colonial Pipeline pays hackers, and then doesn't even use the decryption key.

Colonial Pipeline – The Perfect Example of Why Not to Pay

You’ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker’s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly …

Colonial Pipeline – The Perfect Example of Why Not to Pay Read More »

Ransomware Gang Emails Victims - Will the #ApplicationWhitelistingMatters movement drive change?

Will The #ApplicationWhitelistingMatters Movement Drive Change?

It has been a couple weeks since I have written to you all. First, I want to say thank you for your continued support for the #ApplicationWhitelistingMatters movement. There have been a few Twitter accounts, with a significant following, that have retweeted posts about the #AWLM movement — we just need to keep it up. …

Will The #ApplicationWhitelistingMatters Movement Drive Change? Read More »

The U.S. administration is threatening retaliation against Russia.

A Warning to Russia – We Will Strike Back

President Biden recently met with his top security advisors after the latest ransomware attack against Kaseya led to approximately 1,500 organizations becoming infected with ransomware. The ransomware attack is believed to have had originated from Russia, just three weeks after Biden had a one-on-one meeting with Putin in Geneva. During this meeting, President Biden provided …

A Warning to Russia – We Will Strike Back Read More »

What can Americans do to stay cyber secure?

Keeping Your Organization Cyber Secure Amidst Global Threats

If you were looking, cyber threats have been in the news for years. However, they’ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya. The news has left the world wondering what to do to stay cyber secure. …

Keeping Your Organization Cyber Secure Amidst Global Threats Read More »

Rob Cheng talks security holes with Scoop News Group's Wyatt Kash.

Two Types of Security Holes – Do you know what they are?

According to PC Matic founder and CEO, Rob Cheng, there are two types of security holes that organizations need to address. Unauthorized Software Unauthorized software is any type of software that you do not want running on your network. This may not always be malicious. For instance, if you issue a mobile device to employees, …

Two Types of Security Holes – Do you know what they are? Read More »