Alternative Malware Detection Method Proven Highly Effective

Securing your data from a malware attack, should be your primary priority when it comes to data security.  However, it appears a vast majority of organizations, both large and small, aren’t taking the preventative steps necessary to properly secure their data.  With more businesses, educational institutions, government agencies and non-profits falling victim to malware attacks […]

Continue reading


Appropriate Defense Against Ransomware is Not Backups

The Today Show featured another piece on cyber security today, this time discussing ransomware.  During which, Tom Costello claimed the best way to protect yourself from a ransomware attack is to back up your data.  This cannot be further from the truth.  First of all, backups do not protect you from becoming a victim of ransomware.  It can be […]

Continue reading


Application Whitelisting Ranks #1 For Security Essentials

Application whitelisting has identified as the top security essential tool by Business IT.  Application whitelisting implements a security method that, if utilized correctly, will only allow trusted programs to run.  Since malware is not a trusted program, the executable will not be allowed to run.  Theoretically. this will eliminate malware infections on PCs that are […]

Continue reading


Application Whitelisting Cuts Cyber Crime by 85%

Whitelisting Cuts Targeted Malware Attack Success Rates By 85% According to a report generated by Cylance, the Australian government believes cyber crime can be cut by 85% with the implementation of application whitelisting.  The report states, “The Australian Signals Directorate has identified application whitelisting as the most effective strategy in its Strategies to Mitigate Targeted […]

Continue reading


Application Whitelisting – Our Nation’s Solution to Cyber Security Crisis

Application Whitelisting–Our Nation’s Solution? Never in our history has cyber security been a bigger threat than it is now.  Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they’re all at risk.  Recent reports stated, over 3 million users were exposed to malware in the fourth quarter of 2016, almost a 23% […]

Continue reading


Application Whitelisting – The Only Protection Against Ransomware

Application whitelisting provides the final piece to the endpoint security solution puzzle. When trying to battle today’s cyber criminals, PC users must always be on the defense.  This includes consistently trying to anticipate the hacker’s next move.  This can be incredibly difficult.  What if there was a security solution that did that for you? Application whitelisting […]

Continue reading


Strengthening Cyber Security Infrastructure with Automated Global Whitelist

PC Matic’s Vice President of Cyber Security, Dodi Glenn, recently conducted a webinar regarding how to strengthen cyber security infrastructures with an automated global whitelist approach. During the webinar, Dodi discussed the current threat landscape, malware sample manipulation, and preventative detection with application whitelisting. Dodi shared with the audience the malware trends, and his thoughts […]

Continue reading


Default Deny – The Future to PC Protection

Default Deny What is default deny? Essentially, it is application whitelisting. Application whitelisting is the preventative detection method, proven to be more effective in preventing malware attacks than the traditional methods used by many anti-virus programs. Google senior security engineer, Darren Bilby, has asked for research to be focused on more meaningful defenses such as whitelisting applications, instead […]

Continue reading


The Powerful Idea that Stops Malware Dead

In the 10-year time frame from 2002 to 2012, the volume of ‘known-good’ executable code has roughly doubled from 17 Million to 40 Million. During that same period, the amount of ‘known-bad’ malware has skyrocketed 40 times from 2 million to over 80 million. In 2002, keeping out the bad guys with antivirus was a correct and rational decision. Now, in 2012 that is no longer the case. The more rational decision is to continue using traditional (blacklist) antivirus but combined with gray- and whitelisting and only allow ‘known-good’ to run. It’s a simple, powerful idea that stops malware dead in its tracks. It allows you to run your network with an iron fist in a velvet glove.

Continue reading