Instead of focusing on the whodunit, it's time American's focused on prevention.

Focus on Closing Security Holes, Not the Whodunit

With high profile ransomware attacks taking place more and more frequently, the U.S. administration has placed an emphasis on finding out who is responsible. The question is why? When it comes to these massive attacks, their level of sophistication is far greater than most. Meaning, the cyber criminals have spent months, perhaps even years to …

Focus on Closing Security Holes, Not the Whodunit Read More »

The healthcare sector is facing a high risk for cyber crime.

Rob Cheng Weighs In – Healthcare Sector is at Risk

As ransomware threats continue to rise, PC Matic founder and CEO, Rob Cheng, shared his thoughts on the increased likelihood of healthcare facilities falling victim. Increased Technology, Increased Vulnerability Healthcare facilities have become increasingly technical. From the way patient files are stored to the ways medical procedures are done, technology plays a significant role. Unfortunately, …

Rob Cheng Weighs In – Healthcare Sector is at Risk Read More »

Colonial Pipeline pays hackers, and then doesn't even use the decryption key.

Colonial Pipeline – The Perfect Example of Why Not to Pay

You’ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker’s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly …

Colonial Pipeline – The Perfect Example of Why Not to Pay Read More »

Ransomware Gang Emails Victims - Will the #ApplicationWhitelistingMatters movement drive change?

Will The #ApplicationWhitelistingMatters Movement Drive Change?

It has been a couple weeks since I have written to you all. First, I want to say thank you for your continued support for the #ApplicationWhitelistingMatters movement. There have been a few Twitter accounts, with a significant following, that have retweeted posts about the #AWLM movement — we just need to keep it up. …

Will The #ApplicationWhitelistingMatters Movement Drive Change? Read More »

The U.S. administration is threatening retaliation against Russia.

A Warning to Russia – We Will Strike Back

President Biden recently met with his top security advisors after the latest ransomware attack against Kaseya led to approximately 1,500 organizations becoming infected with ransomware. The ransomware attack is believed to have had originated from Russia, just three weeks after Biden had a one-on-one meeting with Putin in Geneva. During this meeting, President Biden provided …

A Warning to Russia – We Will Strike Back Read More »

What can Americans do to stay cyber secure?

Keeping Your Organization Cyber Secure Amidst Global Threats

If you were looking, cyber threats have been in the news for years. However, they’ve been shoved into the limelight over the last few months, between the ransomware attack on the water treatment plant in Florida, Colonial Pipeline, and now Kaseya. The news has left the world wondering what to do to stay cyber secure. …

Keeping Your Organization Cyber Secure Amidst Global Threats Read More »

Rob Cheng talks security holes with Scoop News Group's Wyatt Kash.

Two Types of Security Holes – Do you know what they are?

According to PC Matic founder and CEO, Rob Cheng, there are two types of security holes that organizations need to address. Unauthorized Software Unauthorized software is any type of software that you do not want running on your network. This may not always be malicious. For instance, if you issue a mobile device to employees, …

Two Types of Security Holes – Do you know what they are? Read More »

PC Matic's whitelist holds the keys to protection.

Behind the Scenes of PC Matic’s Patented Whitelisting Technology

Did you know PC Matic uses application whitelisting as it’s core method of malware detection? What is Application Whitelisting? To understanding what application whitelisting is, you must first understanding its alternative. Since the beginning of time {antivirus time, of course} the method companies would use to identify malware was called a blacklist. The blacklist, similar …

Behind the Scenes of PC Matic’s Patented Whitelisting Technology Read More »

Increasing your cybersecurity posture is imperative in today's digital world.

5 Best Practices For Advancing Your Cybersecurity Position

Cyber threats are continuing to grow, making it more important than ever to make cyber safe decisions while using devices. Here are the top five best practices for advancing your cybersecurity position. Use a Proactive Cybersecurity Solution First, and quite possibly foremost, using an cybersecurity solution that implements proactive measures to block cyber attacks versus …

5 Best Practices For Advancing Your Cybersecurity Position Read More »

New legislation has been proposed in an attempt to increase cyber awareness.

Is Legislation Enough to Increase Cyber Awareness?

After cyber criminals have continuously targeted American businesses and vital sectors, a group of bipartisan House lawmakers introduced a bill to increase cyber awareness. The American Cybersecurity Literacy Act would require the National Telecommunications and Information Administration (NTIA) to create a cyber literacy campaign. The campaign’s objective is to increase awareness. By increasing awareness, the …

Is Legislation Enough to Increase Cyber Awareness? Read More »

The #AWLM movement appears to be gaining traction after a surge in cyber crime.

#AWLM Movement Gains Traction Amidst Cyber Crime Spikes

It’s getting scarier out there. It’s only Tuesday and I’ve read about four different ransomware attacks that led to millions being paid out to the hackers, and resulted in data breaches of the company’s clients. When will the world get it? #ApplicationWhitelistingMatters #AWLM The Key to Cyber Protection First and foremost, I want to say …

#AWLM Movement Gains Traction Amidst Cyber Crime Spikes Read More »