Application Whitelisting – The Only Protection Against Ransomware

Application whitelisting provides the final piece to the endpoint security solution puzzle. When trying to battle today’s cyber criminals, PC users must always be on the defense.  This includes consistently trying to anticipate the hacker’s next move.  This can be incredibly difficult.  What if there was a security solution that did that for you? Application whitelisting […]

7,009 total views, no views today

Continue reading

PC Matic Earns Best New Product of the Year Award by Best in Biz

November 30, 2016 – PC Matic has been named a bronze winner in Best New Product of the Year – SMB in Best in Biz Awards, the only independent business awards program judged by members of the press and industry analysts. Developed, researched, and supported in the U.S., PC Matic is the only trusted security […]

911 total views, 1 views today

Continue reading

Security Vulnerabilities Caused by Those Claiming to be Tech Savvy

Can you be too tech savvy? There are several things that you can do on your PC that will create a negatively impact.  Many PC users view themselves as being rather tech savvy, therefore they believe they are far more secure against these threats.  Unfortunately that is not the case.  Sometimes PC users, both home and […]

309 total views, no views today

Continue reading

Gartner Named PC Pitstop, Makers of PC Matic, as an Innovative Vendor in Application Control

PC Pitstop, makers of PC Matic, are pleased to announced they were cited as an Innovative Vendor in Application Control in the Gartner Event Summary: Gartner Security & Risk Management Summit 2016 — London, report published 27 October 2016  by Gartner, the world’s leading information technology company. PC Pitstop provides expert advice to its clients on […]

878 total views, 1 views today

Continue reading

Got Apple Quicktime installed on your computer? Uninstall it immediately, says Department of Homeland Security

A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely […]

170 total views, no views today

Continue reading