Whitelisting

Application Whitelisting — Is it Feasible for the Medical Field?

Application Control for Medical Professionals Decision Health recently published a lengthy article on Plan B News regarding application whitelisting within the medial field.  With the advanced technological methods being used within the healthcare industry, and the ever-evolving software, IT administrators were curious if whitelisting could fit in this field.  Roy Edroso stated application whitelisting is

Application Whitelisting — Is it Feasible for the Medical Field? Read More »

89% of PC Users Say Malware Prevention Is Key

Malware Prevention Vs. Detection Malware infections have continued to spread at alarming rates.  Whether it is ransomware, which encrypts data and demands a payment from the victim to regain access, or fileless malware which bypasses most security solutions, malware threats continue to grow daily.  Once a version of malware is detected as malicious, it is

89% of PC Users Say Malware Prevention Is Key Read More »

The Application Whitelist — Why it Matters When it Comes to Modern Threats

Fighting Today’s Cyber Security Threats As modern cyber security threats continue to advance, keeping your data safe becomes more and more difficult.  Especially for PC users who choose to keep their data secure by using an outdated anti-virus (AV).  The term outdated means two things.  The software may not be updated in regards to patch

The Application Whitelist — Why it Matters When it Comes to Modern Threats Read More »

Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting

Alternative Malware Detection Method Proven Highly Effective

Securing your data from a malware attack, should be your primary priority when it comes to data security.  However, it appears a vast majority of organizations, both large and small, aren’t taking the preventative steps necessary to properly secure their data.  With more businesses, educational institutions, government agencies and non-profits falling victim to malware attacks

Alternative Malware Detection Method Proven Highly Effective Read More »

Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting

Appropriate Defense Against Ransomware is Not Backups

The Today Show featured another piece on cyber security today, this time discussing ransomware.  During which, Tom Costello claimed the best way to protect yourself from a ransomware attack is to back up your data.  This cannot be further from the truth.  First of all, backups do not protect you from becoming a victim of ransomware.  It can be

Appropriate Defense Against Ransomware is Not Backups Read More »