An Antivirus Protection That Never Quits

Antivirus Protection that Never Quits — What Every Customer in the World Needs Cyber security threats are evolving every single day.  As customers of antivirus solutions, you need to demand better products.  You need to demand an antivirus protection that never quits.  But what would that look like? Consistent Innovation First, is the need for […]

2,204 total views, 6 views today

Continue reading


Ransomware Threat Can Be A Reseller’s Opportunity

A Reseller’s Opportunity – Education and Protection Ransomware threats have been increasing year-over-year, yet several businesses are not aware of the magnitude of the cyber threat.  This lack of awareness could be on this particular form of malware, or it may spill over into proper protection methods. It has become a reseller’s opportunity to educate […]

810 total views, 2 views today

Continue reading


Fun Fact – You Can Use PowerPoint to Record Your Screen

Microsoft Windows

Recording Your Computer Screen With PowerPoint It likely isn’t a regular occurrence that you wish to record something on your computer screen.  However, if the need is ever present, it is nice to know it can be done without installing yet another third-party application. How To Do It You will need to have open whatever […]

2,711 total views, 1 views today

Continue reading


Hackers Target Specifically Based on This One Thing

How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.  There it is.  That is the big secret, which likely isn’t as shocking as one anticipated.  Why do hackers target vulnerable systems?  This too is rather simple.  They don’t want to […]

7,039 total views, no views today

Continue reading


New Hampshire Healthcare Facility Offers Up Patient Data to Hackers

New Hampshire Healthcare Facility Suffers Ransomware, Followed by Security Breach Health Management Concepts (HMC) of New Hampshire recently suffered a ransomware attack.  The variant has not been disclosed to the public, but HMC officials did report they paid an undisclosed ransom amount. Before going on, it should be noted that paying the ransom demands is […]

2,067 total views, 2 views today

Continue reading


BEWARE: Scammers Offering Fake Refunds to Steal Banking Information

Scammers Call Offering Fraudulent Refunds There have been several reports lately regarding people receiving phone calls from individuals claiming to work for their security solution provider.  Not only do they work for your trusted security company, but they’re offering you major refunds!  But don’t get too excited — it’s a scam.  These hackers are calling, asking for […]

4,104 total views, no views today

Continue reading


How Hackers Know If They’ve Hit a Gold Mine

Top Information Hackers Look For There are two types of cyber attacks, targeted and untargeted.  Targeted could be as specific as going after a certain business or government agency, or as broad as a certain sector such as education or healthcare.  Targeted attacks often occur when an enemy or competitor specifically targets a business or […]

4,120 total views, 1 views today

Continue reading


PC Pitstop Expands Their Team – Check Out Their Latest New Hires

As we continue to grow, we are filling open positions with the finest American talent we can find. Our most recent job postings have yielded hundreds of resumes. We have always believed, as a company with 100% remote employees, that we are able to attract the highest -quality applicants that thrive in a non-traditional work […]

701 total views, no views today

Continue reading


PC Pitstop, Makers of PC Matic, Offers a View from the Top

In May, I gave a presentation to security professionals at Yankee Stadium.  Part of my presentation referenced the recent ransomware infection in the City of Atlanta. As I proceeded, I viewed blank faces and not one head nodding.  “Who knows what happened in Atlanta?”, I inquired. No one raised their hand. I paused the presentation […]

720 total views, 2 views today

Continue reading


T-Mobile Notifies 3 Million Customers After Security Breach

Hackers Breach T-Mobile, Leaving Millions Exposed Approximately 3 million T-Mobile customers either have been or soon will be notified their information was involved in a security breach.  Although details are not being released regarding how the attack was executed, T-Mobile has reported approximately 5% of their 75 million users were impacted by a recent data […]

5,775 total views, 4 views today

Continue reading


McAfee, Symantec and Malwarebytes Failed City Office

Multiple Layers of Defense, Doesn’t Always Mean Better Security On January 3, 2018, the ransomware variant, SamSam, infected the city offices of Farmington, New Mexico.  The ransomware infection successfully encrypted multiple areas of the city office including the electronic bill pay and records processing.  Although the infection did not impact utility operations and the city office has made it clear, […]

6,342 total views, 1 views today

Continue reading


Another Significant Security Gap Discovered in Intel Processors

First Spectre and Meltdown, Now Foreshadow Intel has been notified by various researchers that yet another security gap has been found in their processors.  The vulnerability affects its chip security technology called Software Guard Extensions (SGX).  This technology has been used in Intel processors since  2015.  Therefore, if you have an older PC — there is […]

3,899 total views, no views today

Continue reading


Ransomware Riddles Another Georgia Municipality

Another Georgia Municipality Suffers Cyber Attack While Atlanta Still Recovers After the City of Atlanta’s ransomware fiasco, one would think other public municipalities, specifically in Georgia, would have stepped up their cyber security game.  Apparently, that is not the case.  Hackers successfully installed ransomware on the internal systems of Coweta County, located in Newnan, Georgia.  This […]

2,312 total views, no views today

Continue reading


Application Whitelisting – The Active Defense Against Ransomware

Whitelisting – The Last Best Resort Ed Tech Magazine recently wrote an article on application whitelisting as an active defense against ransomware in the education sector.  Although we agree that whitelisting, or a default-deny approach, is proactive to ransomware prevention, their analysis warrants further investigation. Ed Tech author, Karen Scarfone states, If other security controls don’t stop […]

1,345 total views, 1 views today

Continue reading


Must Have Technologies to Thwart Ransomware

Top Tools for Proper Ransomware Defense Ed Tech Magazine recently released three major tools the education sector must have to effectively block ransomware from executing on their systems.  Although Ed Tech was specifically focusing on the educational vertical, these tips can be used in any industry. The three “must haves” include application whitelisting, endpoint protection, […]

1,987 total views, 1 views today

Continue reading


Scammers Target Fortnite Users with Android Expansion

Fortnite Users Anxiously Await Android Version – Falling for Scammers in the Process This summer’s “it” game, Fortnite, will soon be expanding its compatibility features to include Android devices.  Although this may be great news for gamers — it may come at a price.  The game’s developers have decided to make downloading available only through […]

3,591 total views, 1 views today

Continue reading


Alternative Approach to Tackling Vulnerabilities

Security Vulnerabilities Leave End-Users Exposed, But Perhaps There’s Another Way… I recently read an article on software vulnerabilities and the belief these issues will always be present.  This theory makes sense, as society’s dependence on technology and software continues to increase, the likelihood of security gaps existing increases as well.  Although, as long as these […]

3,531 total views, no views today

Continue reading


Anti-Virus or Anti-Malware? What’s the Difference?

Malware, Virus, Tomato, Tomahto? Recently, I’ve received a few different questions on the concepts of anti-malware and anti-virus programs.  Are they the same thing?  Which is better?  Is PC Matic an anti-malware program? There’s a lot to be said on the matter.  But here is the most basic explanation.  Malware is a blanket term used […]

2,257 total views, 1 views today

Continue reading


No One is Safe From Ransomware — Not Even the PGA

Ransomware Hits PGA’s American Servers Days Before Tournament The Professional Golf Association (PGA) has been the most recent victim of ransomware.  As their tournament is about to kick off in St. Louis, Missouri, the PGA has found all of their American servers encrypted with ransomware.  Meaning, all of the data on those servers is inaccessible […]

1,829 total views, 1 views today

Continue reading


Employees Get Resourceful After Ransomware Riddles Alaskan Systems

Ransomware Cripples Alaskan Borough – Thankfully Employees Think Outside the Box The Alaskan borough of Matanuska-Susitna, reported almost all of its 500 desktop computers and 120 of its servers were affected by a ransomware attack just days ago.  The unknown ransomware variant was found on July 24th, spreading throughout the network.  Although officials attempted to […]

1,429 total views, 1 views today

Continue reading


Latest AV-Test Results Are Released – PC Matic 3.0 Earns Certification Again

PC Matic 3.0 Earns AV-Test Certification In Latest Testing PC Matic first tested with AV-Test in the fall of 2017, and earned its first AV-Test certification at that time.  In May and June of 2018, AV-Test conducted another round of testing which included the latest version of PC Matic 3.0.  The testing resulted in PC Matic being […]

1,817 total views, 4 views today

Continue reading


PC Matic Pro and PC Pitstop Earn Major Recognition

Recognition at Company and Product Level Throughout the second quarter of 2018, both PC Pitstop and PC Matic Pro earned some significant recognition.   PC Pitstop was honored by Comparably for having the Best Company Leadership, Best Company Managers, and Best Company Professional Development.  In addition, Network Products Guide recognized PC Pitstop for IT Vendor […]

912 total views, 1 views today

Continue reading


PC Matic Teams Up with IDShield to Offer Identity Theft Protection

IDShield offers PC Matic Customers Exclusive Discount As breaches become more and more prevalent, keeping your personally identifiable information safe becomes increasingly important. PC Matic has now teamed up with IDShield to offer exclusive discounts for identity theft protection plans.  PC Matic users are able to save 10% on an individual identity theft protection plan with […]

4,473 total views, 3 views today

Continue reading


Missouri Family Healthcare Clinic Infected With Ransomware

Malware Riddles Missouri Healthcare Facility In May, Missouri’s Blue Springs Family Healthcare found its systems were infected with various forms of malware, including ransomware.  All of the forms of malware were not disclosed, nor was the ransom demand.  The only thing that seems to be quite clear is, the hackers had full access to all […]

1,169 total views, 1 views today

Continue reading


Malware Risks Increase As School Goes Back in Session

The Risk of Malware Infection Increases as School Begins As students and staff begin preparing for school to reconvene in August, administrators face increased cyber security risks.  The likelihood of malware spreading as both students and staff members connect their own devices to school networks increases exponentially at the beginning of the school year.  Why is this?  […]

1,051 total views, 2 views today

Continue reading


Ransomware Hits Alaskan Medical Records Facility

But That’s Not All… In April, ransomware infiltrated the servers of Golden Heart Administrative Professionals (GHAP), a medical billing, and bookkeeping facility located in Fairbanks, Alaska.  The incident was reported to impact approximately 500 of GHAP’s clients, exposing approximately 44,600 patient files.  Although there is no evidence the information breached has been used maliciously, GHAP reported […]

1,874 total views, 2 views today

Continue reading