2021

Cybersecurity audit confirms, very little progress has been made to secure the American digital infrastructure.

Cybersecurity Audit Exposed Poor Practices by Federal Agencies

Upon evaluating the state of eight federal agencies’ digital infrastructures through a cybersecurity audit, it was confirmed, four agencies nearly failed. Had this been the first cybersecurity audit of those agencies, the scores may not be as alarming. However, in 2018 a similar audit was conducted exposing many of the same cybersecurity risks. The reality […]

Cybersecurity Audit Exposed Poor Practices by Federal Agencies Read More »

IDG survey confirms application whitelisting is underutilized.

IDG Confirms Application Whitelisting is Underutilized

A recent survey by IDG confirms, application whitelisting is by far the most underutilized component of zero-trust technologies. What is Application Whitelisting? Application whitelisting only allows known trusted, and proven secure applications to run on the network. This is an effective means to cyber threat mitigation because no matter how many times malware evolves, it

IDG Confirms Application Whitelisting is Underutilized Read More »

PC Matic and Scott Augenbaum host a virtual townhall event discussing prevention and cybersecurity.

PC Matic & Scott Augenbaum Host Virtual Townhall Event

As prevention has been top of mind for several organizations, PC Matic joins Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, to discuss application whitelisting and preventing cyber attacks. PC Matic Townhall During the one-hour townhall session, four different PC Matic employees discussed the approach PC Matic takes to prevention. By

PC Matic & Scott Augenbaum Host Virtual Townhall Event Read More »

Zoom is slapped with an $85 million fine after misleading customers about their security practices.

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing

The video conferencing platform, Zoom, is facing a hefty fine after telling its users they were utilizing end-to-end (E2E) encryption for their platform’s meetings, when they were not. E2E encryption means the video conference would be encrypted, or inaccessible, unless the user provided an access, or decryption code. Zoom claimed they used E2E encryption, when

Zoom Faces $85M Fine After Lying About Encryption & Data Sharing Read More »

CSO Global Intelligence Report confirms, attack prevention is top of mind.

Attack Prevention is Top of Mind According to Global Report

The CSO Global Intelligence Report: The State of Cybersecurity in 2021 shares some interesting statistics on cybersecurity and the rate of infections. First, over 50% of those surveyed confirmed experiencing an increase in security incidents over the last year. What is more alarming is, nearly half of those infected reported economic damages, loss of productivity,

Attack Prevention is Top of Mind According to Global Report Read More »

Americans begin the shift to a prevention focused cybersecurity stance with zero-trust technologies.

Cybersecurity Prevention – Is the World Making the Shift?

Fifteen days ago, I wrote about an interview PC Matic Vice President, Corey Munson, had with the CEO of Secure Anchor Consulting, Dr. Eric Cole discussing cybersecurity prevention and application whitelisting.  As you may recall, one of Dr. Cole’s biggest concerns, was the threat of extortion upon becoming a victim of ransomware.  For those who

Cybersecurity Prevention – Is the World Making the Shift? Read More »

Biden is warning "real shooting war" if cyber attacks continue.

“Real Shooting War” May Result If Cyber Attacks Continue

You may have read our posts lately about the “whodunit” theories. Who originated the attacks against meat packing plants, managed service providers, and pipelines? There are many theories, many of which align with Russia and China being the culprits. These allegations have placed heated tensions on the American relationships with these two countries, and President

“Real Shooting War” May Result If Cyber Attacks Continue Read More »