Dr. Eric Cole discusses prevention and the evolution of application whitelisting with PC Matic Vice President, Corey Munson.

Dr. Eric Cole Talks Prevention & Application Whitelisting

The founder and CEO of Secure Anchor Consulting, Dr. Eric Cole, and PC Matic Vice President of Sales, Corey Munson, connected earlier this week to talk cybersecurity. Application Whitelisting Isn’t What it Once Was… Truth be told, application whitelisting wasn’t always done in the most efficient manner. As Dr. Cole mentions, when he discusses the …

Dr. Eric Cole Talks Prevention & Application Whitelisting Read More »

Russian cyber gang, REvil, has been taken offline.

Largest Cyber Gang, REvil, Taken Offline, But For How Long?

The world is rejoicing. The Russian cyber gang responsible for two of the biggest ransomware attacks in history, JBS and Kaseya, has been taken offline. The real question is, for how long? Many believe that they were taken offline by political officials, from either the U.S. or Russia. Given the amount of tension the Kaseya …

Largest Cyber Gang, REvil, Taken Offline, But For How Long? Read More »

The healthcare sector is facing a high risk for cyber crime.

Rob Cheng Weighs In – Healthcare Sector is at Risk

As ransomware threats continue to rise, PC Matic founder and CEO, Rob Cheng, shared his thoughts on the increased likelihood of healthcare facilities falling victim. Increased Technology, Increased Vulnerability Healthcare facilities have become increasingly technical. From the way patient files are stored to the ways medical procedures are done, technology plays a significant role. Unfortunately, …

Rob Cheng Weighs In – Healthcare Sector is at Risk Read More »

Colonial Pipeline pays hackers, and then doesn't even use the decryption key.

Colonial Pipeline – The Perfect Example of Why Not to Pay

You’ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker’s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly …

Colonial Pipeline – The Perfect Example of Why Not to Pay Read More »

Ransomware Gang Emails Victims - Will the #ApplicationWhitelistingMatters movement drive change?

Will The #ApplicationWhitelistingMatters Movement Drive Change?

It has been a couple weeks since I have written to you all. First, I want to say thank you for your continued support for the #ApplicationWhitelistingMatters movement. There have been a few Twitter accounts, with a significant following, that have retweeted posts about the #AWLM movement — we just need to keep it up. …

Will The #ApplicationWhitelistingMatters Movement Drive Change? Read More »

The U.S. administration is threatening retaliation against Russia.

A Warning to Russia – We Will Strike Back

President Biden recently met with his top security advisors after the latest ransomware attack against Kaseya led to approximately 1,500 organizations becoming infected with ransomware. The ransomware attack is believed to have had originated from Russia, just three weeks after Biden had a one-on-one meeting with Putin in Geneva. During this meeting, President Biden provided …

A Warning to Russia – We Will Strike Back Read More »

What can Americans do to stay cyber secure?

Keeping Your Organization Cyber Secure Amidst Global Threats

If you were looking, cyber threats have been in the news for years. However, they’ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya. The news has left the world wondering what to do to stay cyber secure. …

Keeping Your Organization Cyber Secure Amidst Global Threats Read More »

Rob Cheng talks security holes with Scoop News Group's Wyatt Kash.

Two Types of Security Holes – Do you know what they are?

According to PC Matic founder and CEO, Rob Cheng, there are two types of security holes that organizations need to address. Unauthorized Software Unauthorized software is any type of software that you do not want running on your network. This may not always be malicious. For instance, if you issue a mobile device to employees, …

Two Types of Security Holes – Do you know what they are? Read More »

PC Matic's whitelist holds the keys to protection.

Behind the Scenes of PC Matic’s Patented Whitelisting Technology

Did you know PC Matic uses application whitelisting as it’s core method of malware detection? What is Application Whitelisting? To understanding what application whitelisting is, you must first understanding its alternative. Since the beginning of time {antivirus time, of course} the method companies would use to identify malware was called a blacklist. The blacklist, similar …

Behind the Scenes of PC Matic’s Patented Whitelisting Technology Read More »

Increasing your cybersecurity posture is imperative in today's digital world.

5 Best Practices For Advancing Your Cybersecurity Position

Cyber threats are continuing to grow, making it more important than ever to make cyber safe decisions while using devices. Here are the top five best practices for advancing your cybersecurity position. Use a Proactive Cybersecurity Solution First, and quite possibly foremost, using an cybersecurity solution that implements proactive measures to block cyber attacks versus …

5 Best Practices For Advancing Your Cybersecurity Position Read More »