Jessica Molden

Allianz Life Data Breach: What Happened and How to Protect Yourself

Allianz Life, a major U.S. insurance company, announced that a cyberattack exposed the personal information of about 1.1 million customers. Some financial professionals who work with Allianz and even a number of employees were also affected. What Happened Why It Matters Even basic information like your name, phone number, and email can be dangerous in […]

Allianz Life Data Breach: What Happened and How to Protect Yourself Read More »

PC Matic Pro: Stopping Software Sprawl With Visibility and Control

Across many organizations, software use is expanding faster than IT teams can track. Employees install applications without approval, old programs remain forgotten, and redundant tools pile up. This creates more than clutter. It introduces risk, makes audits more difficult, and drives up costs. For business leaders, the problem comes down to two key questions: Without

PC Matic Pro: Stopping Software Sprawl With Visibility and Control Read More »

What Most SMBs Get Wrong About Cybersecurity — And How to Fix It

Small and mid-sized businesses are spending more than ever on cybersecurity. Yet breaches keep happening—often with devastating results. So what’s going wrong? The truth is, many SMBs are investing in the wrong things. That’s why the PC Matic team is bringing in retired FBI Special Agent Scott Augenbaum for an eye-opening webinar designed just for

What Most SMBs Get Wrong About Cybersecurity — And How to Fix It Read More »

Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks

Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion—when a hacker threatens to share private or embarrassing photos or videos unless the victim pays money. Unfortunately, this crime has now become even easier for scammers, thanks to a new type of malware

Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks Read More »

Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps

The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two large payments were routed to the impostor. The city recovered one of them, but more than a million dollars was lost before the scheme was discovered. This incident reinforces a familiar

Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps Read More »

Unlocking the Power of LinkedIn: From Connections to Conversations

Navigating the complex world of digital networking is more crucial than ever for Managed Service Providers (MSPs) and resellers. LinkedIn, with its vast professional network, stands out as a powerful platform to connect and build lasting relationships. In a recent session with LinkedIn expert Brynne Tillman, CEO of Social Sales Link, PC Matic explored strategies

Unlocking the Power of LinkedIn: From Connections to Conversations Read More »

Strengthening Cybersecurity in Local Government: Why Application Allowlisting Matters

Local governments are increasingly finding themselves in the crosshairs of cybercriminals. From ransomware shutting down emergency dispatch systems to malware compromising public utilities, the stakes couldn’t be higher. Yet, many county IT teams, municipal CIOs, and public sector cybersecurity advisors continue to battle these threats with limited resources, outdated infrastructure, and complex networks. So, how

Strengthening Cybersecurity in Local Government: Why Application Allowlisting Matters Read More »

Password Managers Found Vulnerable: What You Need to Know

Password managers are trusted by millions of people to store logins, credit card details, and even two-factor codes. But researchers have recently discovered that six popular password managers have a security flaw that could let hackers trick users into giving away sensitive information. What’s the Problem? The issue is called “clickjacking.” Think of it like

Password Managers Found Vulnerable: What You Need to Know Read More »