All Whitelisting Solutions Are Not Created Equal

Whitelisting is Effective, but Automating is a Must… With cyber security threats growing, businesses must take a proactive approach to their data and device security.  According to SC Magazine, there is one methodology that has been proven to be effective in blocking modern cyber threats, including ransomware. “According to numerous resources on ransomware, one strong and […]

2,090 total views, no views today

Continue reading


Whitelisting Keeps the Education Sector Secure

Four Months of Data Exposes Malware Trends From January 2018 to April 2018, PC Matic Pro accumulated various data points while school was in session at a 1,000 endpoint school.  The goal was to gather as much data as we could regarding the protection we provide to these institutions and to identify any trends. What […]

1,006 total views, no views today

Continue reading


Avoid Intruders By Simply Locking Your Doors….

Going back to the basics… The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use three different products that all do the same thing, which in turn interferes with each one’s functionality. So, PC Matic wants to go […]

4,650 total views, no views today

Continue reading


Application Whitelisting – The Active Defense Against Ransomware

Whitelisting – The Last Best Resort Ed Tech Magazine recently wrote an article on application whitelisting as an active defense against ransomware in the education sector.  Although we agree that whitelisting, or a default-deny approach, is proactive to ransomware prevention, their analysis warrants further investigation. Ed Tech author, Karen Scarfone states, If other security controls don’t stop […]

2,154 total views, 1 views today

Continue reading


Application Whitelisting – The Future of Security

Whitelisting Begins to Take Over Federal Security Application whitelisting, or the concept of only allowing known trusted programs to execute, is not new.  As a matter of fact, PC Matic has been doing it for almost a decade.  Over time, other security providers jumped on the bandwagon as well. With the increased offerings of application […]

2,763 total views, no views today

Continue reading


The Deep Dive Into Application Whitelisting

Application Whitelisting – What is it? Before we dive too deep into the concept of whitelisting, readers must understand what application whitelisting is.  In addition, understand how it differs from alternative cyber security methods.  First, application whitelisting is a proactive approach to cyber security.  A security solution that employs application whitelisting will only allow known […]

3,153 total views, no views today

Continue reading


US-CERT Urges Implementation of Whitelisting to Thwart Russian Attacks

Government Encourages Application Whitelisting to Boost Security On March 15, 2018 the U.S. government made a statement confirming the U.S. power grid had been compromised by the Russians.  Unsettling news, to say the least.  Although, various news outlets have reported no damage was done, and they believe the primary goal was to send a message.  […]

347 total views, 1 views today

Continue reading


Ransomware Variants Double in 2017 – The Blacklist Cannot Keep Up

The Blacklist Cannot Keep Up with New Ransomware Variants In 2016, NextGov reported 1,419 ransomware variants, compared to 2,855 in 2017.  These are only the confirm malicious variants.  New strains are being created every minute of every day.  Therefore, knowing the exact number and exact coding of all malicious variants is impossible, which is why […]

297 total views, 1 views today

Continue reading


Additional Details on PC Matic’s Pending Patent

More Information on PC Matic’s Pending Patent We recently wrote a post about our patent pending technologies with PC Matic, and many of you wrote in wanting to know more about it. PC Matic is an endpoint security solution that meets the anti-virus needs of home and enterprise PC users, and was developed in 2009. […]

1,520 total views, no views today

Continue reading


Application Whitelisting — Is it Feasible for the Medical Field?

Application Control for Medical Professionals Decision Health recently published a lengthy article on Plan B News regarding application whitelisting within the medial field.  With the advanced technological methods being used within the healthcare industry, and the ever-evolving software, IT administrators were curious if whitelisting could fit in this field.  Roy Edroso stated application whitelisting is […]

1,734 total views, no views today

Continue reading


How Does Application Whitelisting Help Guard Against Ransomware?

Ransomware – The Looming Threat Throughout the last 18 months, rarely did a day go by a company, school, government agency, or public municipality went without being infected with ransomware.  Since January of 2016, twelve educational institutions publicly announced being hit with ransomware, with ransom payments ranging from $28,000 to $2,900. The success behind ransomware […]

1,055 total views, no views today

Continue reading


89% of PC Users Say Malware Prevention Is Key

Malware Prevention Vs. Detection Malware infections have continued to spread at alarming rates.  Whether it is ransomware, which encrypts data and demands a payment from the victim to regain access, or fileless malware which bypasses most security solutions, malware threats continue to grow daily.  Once a version of malware is detected as malicious, it is […]

2,019 total views, 1 views today

Continue reading


Application Whitelisting — Is it too extreme?

Whitelisting – Is it worth the work? Recently, Information Week reported application whitelisting as an “extreme” method for preventing malware.  Is it extreme?  It very well could be.  Application whitelisting goes against the very core of traditional security programs.  Instead of using a blacklist, which allows unknown files to execute until proven malicious, a whitelist […]

3,323 total views, no views today

Continue reading


62% of SMBs Hit With Ransomware Were Forced to Cease Operations

SMBs Struggle to Defend Against Cyber Threats In a recent report featured by Tech Republic, 35% of SMBs were hit with ransomware in the last year.  Out of those impacted, 22% had to completely cease business operations to attempt to remediate the issue.  But for how long?  Over half of the attacks that resulted in […]

6,361 total views, 1 views today

Continue reading


Whitelisting Makes Headlines Again…

Application Whitelisting — The Future of Cyber Security After the recent global attacks, WannaCry and NotPetya, application whitelisting has made its way into the news as the future of cyber security.  First, CSO Online featured a piece on dynamic whitelisting capabilities.  Maria Korolov, the author of the article stated, “We are in an age of […]

299 total views, no views today

Continue reading


Backups Smackups, Prevention is the Real Key

Security lock

Why Backing Up Your Data Won’t Work Let’s be honest, backing up your data is important.  Maybe more so for some users than others, but important nonetheless.  However, backups are not the golden ticket when it comes to restoring data after a malware attack.  Although they could be useful in restoring your files after a […]

2,868 total views, no views today

Continue reading


Misconceptions: PC Matic’s Whitelist

Recently, an article was posted on CIO.com and other IDG outlets, titled “Yes, you still need endpoint malware protection”, questioning the need for end point security. Several publications pointed out that end point security is not needed, due to the operating systems and other components being more secure. However, as we’ve seen in the most […]

659 total views, 1 views today

Continue reading


The Application Whitelist — Why it Matters When it Comes to Modern Threats

Fighting Today’s Cyber Security Threats As modern cyber security threats continue to advance, keeping your data safe becomes more and more difficult.  Especially for PC users who choose to keep their data secure by using an outdated anti-virus (AV).  The term outdated means two things.  The software may not be updated in regards to patch […]

2,207 total views, no views today

Continue reading