Avoid Intruders By Simply Locking Your Doors….

Going back to the basics…

The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use three different products that all do the same thing, which in turn interferes with each one’s functionality.

So, PC Matic wants to go back to the basics for a moment.  There are two types of intrusions.  Either a malicious software is running on your device, or an unauthorized person is on your device or within your network without your permission.  That’s it.  Two types of intrusions, people or software.

Next, how do you block these two intruders?  Very simply — lock your doors.

It’s the same method of security you likely use for your home.  You keep your doors locked, only allowing those you trust inside.  From an IT perspective, you keep your device locked, only allowing known, trusted programs or files to run.  If the program hasn’t been tested and proven secure it will not be able to execute. This method of protection is called application whitelisting, or a default-deny approach.

Moving Forward…

Over the last few years, attack vectors have continued to evolve.  The two intrusions remain the same — people and software, but how they get into your system has advanced.

Therefore, hackers are going outside of file attacks and worming their way into your devices through other methods such as fileless infections and remote desktop attacks.  Finding a security solution that effectively thwarts all forms of attack vectors is imperative.  This proves the security solution is evolving with security threats.

If your current security solution isn’t preventing file-based attacks, fileless infections, and RDP exploits, it’s already 10 steps behind the cyber criminals, and it’s time for a change.

3,939 total views, 4 views today

(Visited 2,638 times, 1 visits today)

12 thoughts on “Avoid Intruders By Simply Locking Your Doors….

  1. I have a computer that was infected with ransom ware sitting on a shelve. I now have a new one with PC Matic installed. Is there any method to restore to usability the one on the shelve or is it just junk?

    • You may restore using backups — but if you do not have that, then there is little you can do. PC Matic is to prevent the infection — unfortunately, once the attack executes, there is little we can do. That is why our mission is to prevent the attacks and take a proactive approach. Please let us know if you need any help with the restoration process. Our support team is available at http://www.pcmatic.com/help.

  2. I purchased your program many years ago. I do not remember paying any renewal fee to you in a long time. (At 88 I don’t remember things too well). I your program installed in my computer? If not I sure want it.

  3. too much Bla, Bla, Bla… Am I protected? Are my doors locked? How do I make sure my doors are locled? I have PC Matic, does this mean that I am Protected

  4. What is interesting and disturbing is we are being forced by companies we work for to a specific software to lock our doors. In my case only software I am allow is Windows Defender. So even though I personally trust and would rather use PCmatic /PC Pitstop not allowed to do so.

    • @JW VanDer Sluis:
      Are you using a work computer, or is it your private property. If it belongs to the company you work for, there is little you can do, other than use another computer that you own for your computing needs. If it is your computer, tell your employer that it has crashed catastrophically and is no longer usable, and that you need a new machine to carry out their work.

      Either way, the only solution to your problem, is to separate work and private use. Maybe a dual boot system could achieve this.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.