Being Reactive is Foolish When Prevention is Possible

Protect your PC

If there was an immunization for cancer, would you get it? Of course, you would. It makes sense to focus on prevention when it is possible. Unfortunately, this immunization doesn’t exist. What does this have to do with cyber security? PC Matic CEO, Rob Cheng, has shared his views of ransomware and believes it is […]

1,861 total views, no views today

Continue reading


Baltimore Attack Leads to Nationwide Emphasis – On The Wrong Thing…

One would have thought the ransomware attack that riddled the city of Atlanta would have done it. But it didn’t. Or maybe the attacks that have hit U.S. airports, county governments, or major manufacturers. But again, it didn’t. However, the point seems to be getting across now. Better late than never I suppose. Memphis Takes […]

2,223 total views, 1 views today

Continue reading


All Whitelisting Solutions Are Not Created Equal

Whitelisting is Effective, but Automating is a Must… With cyber security threats growing, businesses must take a proactive approach to their data and device security.  According to SC Magazine, there is one methodology that has been proven to be effective in blocking modern cyber threats, including ransomware. “According to numerous resources on ransomware, one strong and […]

2,293 total views, no views today

Continue reading


Whitelisting Keeps the Education Sector Secure

Four Months of Data Exposes Malware Trends From January 2018 to April 2018, PC Matic Pro accumulated various data points while school was in session at a 1,000 endpoint school.  The goal was to gather as much data as we could regarding the protection we provide to these institutions and to identify any trends. What […]

1,094 total views, 1 views today

Continue reading


Avoid Intruders By Simply Locking Your Doors….

Going back to the basics… The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use three different products that all do the same thing, which in turn interferes with each one’s functionality. So, PC Matic wants to go […]

4,978 total views, 1 views today

Continue reading


Application Whitelisting – The Active Defense Against Ransomware

Whitelisting – The Last Best Resort Ed Tech Magazine recently wrote an article on application whitelisting as an active defense against ransomware in the education sector.  Although we agree that whitelisting, or a default-deny approach, is proactive to ransomware prevention, their analysis warrants further investigation. Ed Tech author, Karen Scarfone states, If other security controls don’t stop […]

2,418 total views, 2 views today

Continue reading


Application Whitelisting – The Future of Security

Whitelisting Begins to Take Over Federal Security Application whitelisting, or the concept of only allowing known trusted programs to execute, is not new.  As a matter of fact, PC Matic has been doing it for almost a decade.  Over time, other security providers jumped on the bandwagon as well. With the increased offerings of application […]

2,940 total views, no views today

Continue reading


The Deep Dive Into Application Whitelisting

Application Whitelisting – What is it? Before we dive too deep into the concept of whitelisting, readers must understand what application whitelisting is.  In addition, understand how it differs from alternative cyber security methods.  First, application whitelisting is a proactive approach to cyber security.  A security solution that employs application whitelisting will only allow known […]

3,498 total views, 1 views today

Continue reading


US-CERT Urges Implementation of Whitelisting to Thwart Russian Attacks

Government Encourages Application Whitelisting to Boost Security On March 15, 2018 the U.S. government made a statement confirming the U.S. power grid had been compromised by the Russians.  Unsettling news, to say the least.  Although, various news outlets have reported no damage was done, and they believe the primary goal was to send a message.  […]

483 total views, 1 views today

Continue reading


Ransomware Variants Double in 2017 – The Blacklist Cannot Keep Up

The Blacklist Cannot Keep Up with New Ransomware Variants In 2016, NextGov reported 1,419 ransomware variants, compared to 2,855 in 2017.  These are only the confirm malicious variants.  New strains are being created every minute of every day.  Therefore, knowing the exact number and exact coding of all malicious variants is impossible, which is why […]

427 total views, no views today

Continue reading


Additional Details on PC Matic’s Pending Patent

More Information on PC Matic’s Pending Patent We recently wrote a post about our patent pending technologies with PC Matic, and many of you wrote in wanting to know more about it. PC Matic is an endpoint security solution that meets the anti-virus needs of home and enterprise PC users, and was developed in 2009. […]

1,603 total views, 1 views today

Continue reading


Application Whitelisting — Is it Feasible for the Medical Field?

Application Control for Medical Professionals Decision Health recently published a lengthy article on Plan B News regarding application whitelisting within the medial field.  With the advanced technological methods being used within the healthcare industry, and the ever-evolving software, IT administrators were curious if whitelisting could fit in this field.  Roy Edroso stated application whitelisting is […]

1,883 total views, 1 views today

Continue reading


How Does Application Whitelisting Help Guard Against Ransomware?

Ransomware – The Looming Threat Throughout the last 18 months, rarely did a day go by a company, school, government agency, or public municipality went without being infected with ransomware.  Since January of 2016, twelve educational institutions publicly announced being hit with ransomware, with ransom payments ranging from $28,000 to $2,900. The success behind ransomware […]

1,205 total views, no views today

Continue reading


89% of PC Users Say Malware Prevention Is Key

Malware Prevention Vs. Detection Malware infections have continued to spread at alarming rates.  Whether it is ransomware, which encrypts data and demands a payment from the victim to regain access, or fileless malware which bypasses most security solutions, malware threats continue to grow daily.  Once a version of malware is detected as malicious, it is […]

2,111 total views, no views today

Continue reading


Application Whitelisting — Is it too extreme?

Whitelisting – Is it worth the work? Recently, Information Week reported application whitelisting as an “extreme” method for preventing malware.  Is it extreme?  It very well could be.  Application whitelisting goes against the very core of traditional security programs.  Instead of using a blacklist, which allows unknown files to execute until proven malicious, a whitelist […]

3,436 total views, 1 views today

Continue reading


62% of SMBs Hit With Ransomware Were Forced to Cease Operations

SMBs Struggle to Defend Against Cyber Threats In a recent report featured by Tech Republic, 35% of SMBs were hit with ransomware in the last year.  Out of those impacted, 22% had to completely cease business operations to attempt to remediate the issue.  But for how long?  Over half of the attacks that resulted in […]

6,478 total views, no views today

Continue reading


Whitelisting Makes Headlines Again…

Application Whitelisting — The Future of Cyber Security After the recent global attacks, WannaCry and NotPetya, application whitelisting has made its way into the news as the future of cyber security.  First, CSO Online featured a piece on dynamic whitelisting capabilities.  Maria Korolov, the author of the article stated, “We are in an age of […]

367 total views, no views today

Continue reading


Backups Smackups, Prevention is the Real Key

Security lock

Why Backing Up Your Data Won’t Work Let’s be honest, backing up your data is important.  Maybe more so for some users than others, but important nonetheless.  However, backups are not the golden ticket when it comes to restoring data after a malware attack.  Although they could be useful in restoring your files after a […]

3,052 total views, 1 views today

Continue reading