Government Encourages Application Whitelisting to Boost Security On March 15, 2018 the U.S. government made a statement confirming the U.S. power grid had been compromised by the Russians. Unsettling news, to say the least. Although, various news outlets have reported no damage was done, and they believe the primary goal was to send a message. […]
The Blacklist Cannot Keep Up with New Ransomware Variants In 2016, NextGov reported 1,419 ransomware variants, compared to 2,855 in 2017. These are only the confirm malicious variants. New strains are being created every minute of every day. Therefore, knowing the exact number and exact coding of all malicious variants is impossible, which is why […]
More Information on PC Matic’s Pending Patent We recently wrote a post about our patent pending technologies with PC Matic, and many of you wrote in wanting to know more about it. PC Matic is an endpoint security solution that meets the anti-virus needs of home and enterprise PC users, and was developed in 2009. […]
Application Control for Medical Professionals Decision Health recently published a lengthy article on Plan B News regarding application whitelisting within the medial field. With the advanced technological methods being used within the healthcare industry, and the ever-evolving software, IT administrators were curious if whitelisting could fit in this field. Roy Edroso stated application whitelisting is […]
Ransomware – The Looming Threat Throughout the last 18 months, rarely did a day go by a company, school, government agency, or public municipality went without being infected with ransomware. Since January of 2016, twelve educational institutions publicly announced being hit with ransomware, with ransom payments ranging from $28,000 to $2,900. The success behind ransomware […]
Malware Prevention Vs. Detection Malware infections have continued to spread at alarming rates. Whether it is ransomware, which encrypts data and demands a payment from the victim to regain access, or fileless malware which bypasses most security solutions, malware threats continue to grow daily. Once a version of malware is detected as malicious, it is […]
Whitelisting – Is it worth the work? Recently, Information Week reported application whitelisting as an “extreme” method for preventing malware. Is it extreme? It very well could be. Application whitelisting goes against the very core of traditional security programs. Instead of using a blacklist, which allows unknown files to execute until proven malicious, a whitelist […]
SMBs Struggle to Defend Against Cyber Threats In a recent report featured by Tech Republic, 35% of SMBs were hit with ransomware in the last year. Out of those impacted, 22% had to completely cease business operations to attempt to remediate the issue. But for how long? Over half of the attacks that resulted in […]
Application Whitelisting — The Future of Cyber Security After the recent global attacks, WannaCry and NotPetya, application whitelisting has made its way into the news as the future of cyber security. First, CSO Online featured a piece on dynamic whitelisting capabilities. Maria Korolov, the author of the article stated, “We are in an age of […]
Why Backing Up Your Data Won’t Work Let’s be honest, backing up your data is important. Maybe more so for some users than others, but important nonetheless. However, backups are not the golden ticket when it comes to restoring data after a malware attack. Although they could be useful in restoring your files after a […]
Recently, an article was posted on CIO.com and other IDG outlets, titled “Yes, you still need endpoint malware protection”, questioning the need for end point security. Several publications pointed out that end point security is not needed, due to the operating systems and other components being more secure. However, as we’ve seen in the most […]
Fighting Today’s Cyber Security Threats As modern cyber security threats continue to advance, keeping your data safe becomes more and more difficult. Especially for PC users who choose to keep their data secure by using an outdated anti-virus (AV). The term outdated means two things. The software may not be updated in regards to patch […]
Securing your data from a malware attack, should be your primary priority when it comes to data security. However, it appears a vast majority of organizations, both large and small, aren’t taking the preventative steps necessary to properly secure their data. With more businesses, educational institutions, government agencies and non-profits falling victim to malware attacks […]
The Today Show featured another piece on cyber security today, this time discussing ransomware. During which, Tom Costello claimed the best way to protect yourself from a ransomware attack is to back up your data. This cannot be further from the truth. First of all, backups do not protect you from becoming a victim of ransomware. It can be […]
Why Your Traditional AV Isn’t Working According to a recent study completed by KnowBe4, your traditional anti-virus alone is not effective in stopping today’s biggest cyber security threat, ransomware. Ransomware is a form of malware that locks your files or entire PCs and demands a payment to unlock them. In the study, KnowBe4 asked 500 […]
Application whitelisting has identified as the top security essential tool by Business IT. Application whitelisting implements a security method that, if utilized correctly, will only allow trusted programs to run. Since malware is not a trusted program, the executable will not be allowed to run. Theoretically. this will eliminate malware infections on PCs that are […]
Whitelisting Cuts Targeted Malware Attack Success Rates By 85% According to a report generated by Cylance, the Australian government believes cyber crime can be cut by 85% with the implementation of application whitelisting. The report states, “The Australian Signals Directorate has identified application whitelisting as the most effective strategy in its Strategies to Mitigate Targeted […]
Application Whitelisting–Our Nation’s Solution? Never in our history has cyber security been a bigger threat than it is now. Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they’re all at risk. Recent reports stated, over 3 million users were exposed to malware in the fourth quarter of 2016, almost a 23% […]
Application whitelisting provides the final piece to the endpoint security solution puzzle. When trying to battle today’s cyber criminals, PC users must always be on the defense. This includes consistently trying to anticipate the hacker’s next move. This can be incredibly difficult. What if there was a security solution that did that for you? Application whitelisting […]
PC Matic’s Vice President of Cyber Security, Dodi Glenn, recently conducted a webinar regarding how to strengthen cyber security infrastructures with an automated global whitelist approach. During the webinar, Dodi discussed the current threat landscape, malware sample manipulation, and preventative detection with application whitelisting. Dodi shared with the audience the malware trends, and his thoughts […]
Default Deny What is default deny? Essentially, it is application whitelisting. Application whitelisting is the preventative detection method, proven to be more effective in preventing malware attacks than the traditional methods used by many anti-virus programs. Google senior security engineer, Darren Bilby, has asked for research to be focused on more meaningful defenses such as whitelisting applications, instead […]
New malware variants are taking the world by storm…
Application whitelisting is a must in today’s cyber security world…
Data Center Journal encourages application whitelisting technology to keep your data safe…
A new study released by the Better Business Bureau (BBB) reports two age groups who are more likely to be scammed than others…
Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection and you may be surprised at one suggestion…
Threats are escalating very quickly, and our best bet is to be proactive…
Malware is a larger threat now than ever before. A FBI bulletin is encouraging PC users to utilize application whitelisting for proper data protection…
Antivirus and whitelisting are the keys to stopping ransomware in its tracks…
The fight against ransomware has never been more crucial; however in order to fight against it, the Department of Justice needs companies to keep talking…
Securing your data during a time when we are incredibly dependent upon computing has never been more crucial…
Does an increase price tag mean your security software is impenetrable, or can cyber criminals still maneuver their way into your PC?
We know ransomware has become an increasing threat to our cyber security. But how can we stop it?
As we’ve shared in our populating “Ransomware Attacks of 2016” blog, we’ve learned this year has caused a major concern among businesses and public sector organizations regarding malware attacks.
This week, Tech Sentry Endpoint Suite makes Network World’s Product of the Week….
The current security threats to the government industry seem to be rather obvious and frankly quite scary.
By: Angela Tuzzo MRB – PR Tech Sentry Offers Better Security, Enhanced Productivity, and Powerful Automation…
Falling victim to ransomware is disheartening and financially costly. Find out how to avoid it now…
You’re hit with ransomware – do you pay the ransom or not?
Has the ransomware epidemic just begun?
Polymorphic viruses are the reason why malware is on the rise…
We created a solution to block CryptoWall by implementing our vendor whitelist in June, 2015.
PC Pitstop CEO Rob Cheng was quoted extensively in this detailed look at whitelisting by Drew Robb & published at esecurityplanet.com.
In the 10-year time frame from 2002 to 2012, the volume of ‘known-good’ executable code has roughly doubled from 17 Million to 40 Million. During that same period, the amount of ‘known-bad’ malware has skyrocketed 40 times from 2 million to over 80 million. In 2002, keeping out the bad guys with antivirus was a correct and rational decision. Now, in 2012 that is no longer the case. The more rational decision is to continue using traditional (blacklist) antivirus but combined with gray- and whitelisting and only allow ‘known-good’ to run. It’s a simple, powerful idea that stops malware dead in its tracks. It allows you to run your network with an iron fist in a velvet glove.