Jessica Molden

Don’t Take the Bait: Spotting Imposter Emails Pretending to be PC Matic

In the world of cybersecurity, trust is everything. Because PC Matic is a leader in keeping devices safe, cybercriminals are increasingly trying to “borrow” that trust. They aren’t hacking PC Matic; instead, they are sending fraudulent emails that look like they come from us to trick you. As we move through 2026, these “imposter” phishing […]

Don’t Take the Bait: Spotting Imposter Emails Pretending to be PC Matic Read More »

Is Your Third-Party Support Platform a Security Backdoor?

In the world of cybersecurity, we often talk about “hardening the perimeter.” We invest in firewalls, secure our primary databases, and encrypt our core applications. But as the recent Hims & Hers Health (Hims) breach demonstrates, the most sophisticated front door in the world doesn’t matter if a threat actor can simply walk through the

Is Your Third-Party Support Platform a Security Backdoor? Read More »

The Kill Switch: Your Essential Defense Against Data Leaks When Using a VPN

Ever wondered what happens to your data if your VPN suddenly disconnects? This isn’t just a technical worry – it’s a real-life risk, and it’s where the mighty “Kill Switch” steps in to save the day. What is a VPN Kill Switch? Think of a VPN like a super-secure, encrypted tunnel connecting your device to

The Kill Switch: Your Essential Defense Against Data Leaks When Using a VPN Read More »

PC Matic Sweeps Two Categories at the 2026 Global InfoSec Awards

We are thrilled to announce that PC Matic has been named a winner in two distinct categories at the 14th Annual Global InfoSec Awards, hosted by Cyber Defense Magazine (CDM) during the RSAC Conference 2026. This year, PC Matic was recognized for excellence in: Redefining Cybersecurity Standards The Global InfoSec Awards are among the most

PC Matic Sweeps Two Categories at the 2026 Global InfoSec Awards Read More »

What is VPN Interface Binding? A Simple Guide for Secure Torrenting

If you use a torrent client, you probably already know that a Virtual Private Network (VPN) is essential for protecting your privacy. A VPN hides your real IP address and encrypts your internet traffic, keeping your online activity secure from prying eyes. But what happens if your VPN connection drops unexpectedly? Even a momentary blip

What is VPN Interface Binding? A Simple Guide for Secure Torrenting Read More »

Scam Alert: Is your “Safe” Chrome Extension Stealing from You?

Do you use the popular “Save image as Type” Google Chrome extension? If so, we have an important scam alert. More than one million users found that Google has disabled this extension in their browser due to it containing malware. The extension has also been completely removed from the Chrome Web Store. What was “Save

Scam Alert: Is your “Safe” Chrome Extension Stealing from You? Read More »

Why Your Business Needs a “Default Deny” Strategy in the AI Era

A recent TIME article highlighted a sobering reality: cybersecurity threats are growing at an overwhelming pace, fueled by advanced AI and a corporate culture that often prioritizes employee convenience over security. With the average cost of a data breach now reaching $4.44 million, businesses can no longer afford to treat security as a “check-the-box” compliance

Why Your Business Needs a “Default Deny” Strategy in the AI Era Read More »

Why Application Allowlisting is the “Secret Sauce” for Scaling Your Public Sector MSP

As an MSP, you know the “Public Sector” dance all too well: tight budgets, ancient legacy systems, and a threat landscape that targets 911 dispatch centers and water utilities with the same ferocity as a Fortune 500 company. For years, we’ve relied on reactive tools (AV and EDR) to catch the “bad guys.” But if

Why Application Allowlisting is the “Secret Sauce” for Scaling Your Public Sector MSP Read More »