<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PC Matic Blog</title>
	<atom:link href="https://www.pcmatic.com/blog/tips/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.pcmatic.com/blog/tips/</link>
	<description>Tech Tips and Tricks</description>
	<lastBuildDate>Tue, 15 Feb 2022 19:43:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Healthcare Industry Projected to Spend Over $65B in Cyber Security in the Next 5 Years</title>
		<link>https://www.pcmatic.com/blog/healthcare-industry-65b-cyber-security/</link>
					<comments>https://www.pcmatic.com/blog/healthcare-industry-65b-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 14:36:00 +0000</pubDate>
				<category><![CDATA[tips]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[healthcare industry]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=56914</guid>

					<description><![CDATA[The healthcare industry has become one of the primary targets for cyber security attacks, and they know it. &#160;Therefore, in an attempt to block cyber criminals from attacking their facilities, the healthcare industry plans to increase their cyber security budgets. &#160;According to the Herjavec Group, in the next five years, medical facilities will spend over [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>The healthcare industry has become one of the primary targets for cyber security attacks, and they know it. &nbsp;Therefore, in an attempt to block cyber criminals from attacking their facilities, the healthcare industry plans to increase their cyber security budgets. &nbsp;According to the <a href="https://www.herjavecgroup.com/cybersecurity-ventures-herjavec-group-2017-healthcare-cybersecurity-report/">Herjavec Group</a>, in the next five years, medical facilities will spend over $65 billion in cyber security protection.</p>



<h4 class="wp-block-heading">Spending&nbsp;more doesn&#8217;t mean higher protection</h4>



<p>Unfortunately, just because these facilities are spending more, doesn&#8217;t mean they&#8217;re more protected. Finding a security solution that is preventative in detecting malware is what is most important.  Many security solutions focus on remediation &#8212; fixing the problem after an attack occurs.  </p>



<p>This is no longer a logical approach. &nbsp;Dealing with a breach or <a href="https://www.pcmatic.com/ransomware/" title="How to stop ransomware attacks?">ransomware attack</a> after the fact is not feasible. &nbsp;Once these cyber attacks occur, it is too late. &nbsp;Systems are down, files are locked, and/or patient information has already been acquired by the cyber criminals.</p>



<h4 class="wp-block-heading">Why target the healthcare industry?</h4>



<p>Why is the healthcare industry a target of cyber criminals?  There are multiple reasons.  First, patient files are going for roughly $100 or more per file on the dark web.  Therefore, it is far more lucrative for hackers to spend their time stealing medical files, compared to a social security number or credit card information which sells for about a buck.</p>



<p>Also, they&#8217;re an easier target.  Often times, hospitals and clinics are running outdated programs and/or operating systems.  Because they are out of date, they have unpatched security vulnerabilities.  Essentially, a back door is left open for hackers to gain access to install malicious software or breach the facility&#8217;s systems.</p>



<p>Lastly, after they are hit with malware, such as ransomware, they are far more likely to pay to get their files back and their systems restored. &nbsp;Taking complete control of a hospital&#8217;s servers would mean the facility would likely go offline. Restoring server files is much harder than simply protecting the IT assets with <a href="https://www.pcmatic.com/pro/server-security.asp" title="Best Server Security Solutions">server security solutions</a>.&nbsp;</p>



<p>This means no electronic records, no electronic imaging, no emails &#8212; operations would go back to doing everything with a pen and paper.  Now it isn&#8217;t unrealistic to assume a facility could function in such a way, since it was done once upon a time.  </p>



<p>However, in today&#8217;s world, medical professionals are accustomed to the luxury of electronic systems and technology to help diagnose medical ailments.  Taking that away doesn&#8217;t sit well with them.  This isn&#8217;t to say every facility hit with ransomware will pay to regain access to their systems.  </p>



<p>Recently, <a href="https://techtalk.pcpitstop.com/2017/04/25/erie-county-medical-systems-still-12-days-attack/">Erie County Medical Center was hit with malware</a> and they have spent the last two weeks trying to slowly regain access to their systems.  However, some aren&#8217;t that patient.</p>



<h4 class="wp-block-heading">What to do next&#8230;</h4>



<p>It is time to be proactive.  By using a <a title="What is the best security software?" href="https://www.pcmatic.com/pro/compare-security-software.asp">security solution</a> with a whitelist approach, any files or programs that are not safe will not have permission to run.  Therefore, significantly mitigating the risk of exposure to malicious cyber attacks. PC Matic Pro is a security solution that includes an automated, global whitelist. Explore <a title="Hospital Ransomware Protection" href="https://www.pcmatic.com/pro/healthcare-cybersecurity.asp">hospital ransomware protection</a> solutions from PC Matic.</p>



<p>It would also be best practice to back-up the facility&#8217;s data at least once a day.  Store these backups on an external or cloud device. When using secure backups with <a title="Application Whitelisting" href="https://www.pcmatic.com/whitelist/application-whitelisting.asp">application whitelisting</a> ransomware protection increases exponentially. </p>



<p>Facilities should also have a disaster recovery plan.  This plan should explain, in detail, the steps the facility will take if a cyber attack were to occur.  This should include how the facility will restore their systems, where to store backup files, and who will lead the restoration process, etc.</p>



<p>Read more about <a href="https://www.pcmatic.com/blog/2019/01/24/hackers-target-healthcare-industry/">healthcare cybersecurity</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/healthcare-industry-65b-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Application Whitelisting &#8211; Our Nation&#8217;s Solution to the Cyber Security Crisis</title>
		<link>https://www.pcmatic.com/blog/application-whitelisting-nations-solution/</link>
					<comments>https://www.pcmatic.com/blog/application-whitelisting-nations-solution/#respond</comments>
		
		<dc:creator><![CDATA[PC Matic Cybersecurity]]></dc:creator>
		<pubDate>Sun, 17 Jan 2021 16:30:00 +0000</pubDate>
				<category><![CDATA[SpiceWorks]]></category>
		<category><![CDATA[TechTalk Slider]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[Whitelisting]]></category>
		<category><![CDATA[application whitelisting]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=56134</guid>

					<description><![CDATA[Application Whitelisting&#8211;Our Nation&#8217;s Solution? Application Whitelisting Cybersecurity. Never in our history has cyber security been a bigger threat than it is now.  Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they&#8217;re all at risk.  Malware and ransomware threats are becoming an increasing menace. How can we possibly secure our data against [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h4 class="wp-block-heading" id="application-whitelisting-our-nation-s-solution">Application Whitelisting&#8211;Our Nation&#8217;s Solution?</h4>



<p><strong>Application Whitelisting Cybersecurity</strong>. Never in our history has cyber security been a bigger threat than it is now.  Whether it is our computers, smart phones, tablets, televisions, smart watches, etc., they&#8217;re all at risk.  Malware and ransomware threats are becoming an increasing menace.</p>



<p>How can we possibly secure our data against these threats?&nbsp; The <a href="https://techtalk.pcpitstop.com/2017/01/05/department-of-homeland-security-lists-whitelisting-as-a-top-strategy/">FBI and The Department of Homeland Security </a>have encouraged device users to implement application whitelisting as an advanced measure to help mitigate the risk of a malware infection.&nbsp; The NSA has also added application whitelisting to their <a href="https://techtalk.pcpitstop.com/2016/09/07/nsa-best-practices-whitelisting/">best practices</a>.</p>



<h4 class="wp-block-heading" id="what-is-application-whitelisting">What is Application Whitelisting?</h4>



<p>In order for you to understand whitelisting, you first must understand blacklisting &#8212; the traditional method used for device protection.</p>



<p>Blacklisting is the methodology of keeping track of every known threat.  These threats are present on a &#8220;blacklist&#8221;.  When a file or program attempts to execute on your device, it is compared to the blacklist.  If the file/program is found on the blacklist, it will not run because it is a known malicious threat.  This method of security is no longer acceptable, because malware changes every single second.  This makes it impossible for the blacklist to remain adequately updated, to prevent malware infections. Furthermore, some malware infections are <em>fileless</em> such as zero-day infections and those are certainly not on any antivirus blacklist until they infect an unsuspecting target. More alarming, are malicious files masquerading as legitimate software programs that gain access to your system through a software vulnerability not yet on any malware blacklist.</p>



<p><a title="Whitelisting Application Software" href="https://www.pcmatic.com/whitelist/">Application whitelisting </a>is the exact opposite of the blacklist&nbsp;approach.&nbsp; Instead of keeping a list of &#8220;bad&#8221; files, application whitelisting is a list of all known trusted applications.&nbsp; Therefore, when you attempt to run a file or program on your computer, it is compared to the whitelist.&nbsp; If it is found on the whitelist, it is allowed to run because it has been tested and deemed secure.&nbsp; If the file is not on the whitelist, it is blocked until testing can be done to determine its security. Read more about <a title="Whitelisting Best Practices" href="https://www.pcmatic.com/whitelist/application-whitelisting-best-practices.asp">whitelisting best practices</a>.</p>



<h4 class="wp-block-heading" id="what-about-false-positives">What About False Positives?</h4>



<p>False positives are the primary inconvenience when using application whitelisting.  False positives occur when a whitelisting solution will not allow a safe program to run.  This is when testing takes place to determine the security of the program or file. App Whitelisting differs from App Control in the sense that application control programs will allow new or unknown files or file updates to run as long as they are updating to a known publisher&#8217;s software directory. This is less secure as it allows malicious files and scripts to piggyback onto legitimate programs and run undetected on a device or network. Whitelisting technology scan every file, script and process regardless of the software publisher&#8217;s reputation and so naturall may incur more false positives.</p>



<p>Even with the mild inconvenience of a few false positives, most PC users would rather have a higher level of protection against modern cyber security threats and cope with the minor inconvenience of a false positive, than provide malicious files the opportunity to execute by using a sub-par security solution that excludes whitelisting. Read more about <a title="What is Application Whitelisitng" href="https://www.pcmatic.com/whitelist/application-whitelisting.asp">what is Application Whitelisting</a>.</p>



<h4 class="wp-block-heading" id="how-to-start-implementing-application-whitelisting">How to Start Implementing Application Whitelisting</h4>



<p>As stated above, some of our nation&#8217;s largest security offices are encouraging  whitelisting as a way to address the risk of malware and <a title="Stop Ransomware Attacks" href="https://www.pcmatic.com/ransomware/">ransomware attacks</a>, but how do you implement it?  There are a few ways to begin the process, some more time consuming and backend work than others.</p>



<ol class="wp-block-list"><li>Start your own &#8220;whitelist&#8221;.  You can accomplish this through the IT department, your own personal computer, etc.  This however, is incredibly time consuming, and creates a significant amount of backend work for the IT department.  Creating a whitelist from scratch is an option, but not a very good one.</li><li>Use a security solution that already includes application whitelisting.  This is probably by far, the best option.  Do your research on cybersecurity firms and solutions.  Many claim to use whitelisting, but actually do not use it as their primary method of detection.</li><li>Use <a href="https://www.pcmatic.com/pro/endpoint-security.asp">Application Whitelisting for Endpoint Security</a>. Part of protecting endpoint devices is only allowing safe, legitimate programs to run while at the same time only granting access to legitimate users to the network. To accomplish both of these cyber security goals, whitelisting uses a zero-trust approach to cybersecurity.  Zero Trust Access and Architecture along with a whitelisting layer, is a security solution that is becoming one of the most effective for combating cyber threats and bad actors looking to penetrate network security.</li></ol>



<h4 class="wp-block-heading" id="pc-matic-and-pc-matic-pro">PC Matic and PC Matic Pro</h4>



<p><a title="Computer Virus Protection" href="https://cart.pcmatic.com/go.asp?id=504631">PC Matic</a> and <a title="Business Antivirus Software" href="https://cart.pcmatic.com/go.asp?id=504632">PC Matic Pro</a> have been working on their whitelist for years.  It is the only global whitelisting agent that is automatic, creating minimal backend work for the PC users and IT departments.  Our application whitelisting is far more effective than competitors in preventative malware detection, <a href="https://www.pcmatic.com/blog/2016/12/29/pc-matic-dominates-perfect-virus-detections-venerable-vb100/">scoring a 99.9% proactive detection rating</a> in the most recent Virus Bulletin Reactive and Proactive (RAP) Test. The whitelist is easy to implement and update from a cloud console. Systems administrators can also update operating system security patches and drivers automatically. In addition, security features include ransomware protection, and RDP port control access authentication and control.</p>



<p>To keep your business data, servers and network secure, use <a title="Business Application Whitelisting" href="https://www.pcmatic.com/pro/whitelisting.asp">Application Whitelisting for Business</a> as part of a comprehensive cybersecurity business systems plan. Our business security software protects servers, networks, cloud and hybrid environments from cyber attack. <a title="Compare System Security Solutions" href="https://www.pcmatic.com/pro/compare-security-software.asp">Compare system security solutions</a>. </p>



<p><a href="https://www.pcmatic.com/blog/tag/ransomware-reports/">Read more about ransomware</a> and AWL as a security solution to fight and guard against ransom attack and growing cyber threats. Try PC Matic Cybersecurity solutions and antimalware products proudly made entirely in the USA.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/application-whitelisting-nations-solution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Keep Your Windows Operating System Updated</title>
		<link>https://www.pcmatic.com/blog/update-windows-operating-system/</link>
					<comments>https://www.pcmatic.com/blog/update-windows-operating-system/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Mon, 13 Apr 2020 13:54:41 +0000</pubDate>
				<category><![CDATA[TechTalk Slider]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[windows operating systems]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=62137</guid>

					<description><![CDATA[Does Your OS Need To Be Updated? We say this all the time &#8212; is your Windows operating system updated? Yet, many PC users either don&#8217;t know why it&#8217;s important or how to check for updates. Let&#8217;s start with the first. Windows updates are issued for two reasons 1) to patch known security issues, and [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Does Your OS Need To Be Updated?</h3>



<p>We say this all the time &#8212; is your Windows operating system updated?  Yet, many PC users either don&#8217;t know why it&#8217;s important or how to check for updates. Let&#8217;s start with the first.  Windows updates are issued for two reasons 1) to patch known security issues, and 2) to deliver performance and feature enhancements.  Many times there is a misconception the updates are only for the second purpose, which deters users from installing the latest version.  </p>



<p>Users should be keeping their systems updated with the latest Windows version for security purposes.  If you&#8217;re running an outdated or legacy version (a version of Windows that is no longer supported by Windows), you&#8217;re leaving known security holes open on your device. </p>



<h3 class="wp-block-heading">Confirming You&#8217;re Updated &#8211; Instructions for Windows 10</h3>



<p>To confirm the Windows operating system is updated on your PC, you will want to access your settings. &nbsp;You can do so by clicking the Start menu and clicking on the gear icon, or you can type &#8220;Settings&#8221; into the search bar by the Start menu. &nbsp;Once you access your settings, you should see the screen below. &nbsp;From here, you will want to click on &#8220;Updates and Security&#8221;.</p>



<div class="wp-block-image"><figure class="aligncenter"><img fetchpriority="high" decoding="async" width="1016" height="712" src="https://www.pcmatic.com/blog/wp-content/uploads/settings-update-and-security.png" alt="" class="wp-image-57516" srcset="https://www.pcmatic.com/blog/wp-content/uploads/settings-update-and-security.png 1016w, https://www.pcmatic.com/blog/wp-content/uploads/settings-update-and-security-768x538.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></figure></div>



<p>From there you will want to click on &#8220;Check for Updates&#8221; near the top of the screen, as seen here:</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" width="1013" height="715" src="https://www.pcmatic.com/blog/wp-content/uploads/windows-update-check.png" alt="" class="wp-image-57515" srcset="https://www.pcmatic.com/blog/wp-content/uploads/windows-update-check.png 1013w, https://www.pcmatic.com/blog/wp-content/uploads/windows-update-check-768x542.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></figure></div>



<p>Once you click on &#8220;Check for updates&#8221;, the system will search for all applicable updates. &nbsp;If any are needed, they will update automatically. &nbsp;It would also be best practice to restart your computer after this process has completed.</p>



<h3 class="wp-block-heading">Other Windows Operating Systems</h3>



<p>Although screenshots are not available, here are step by step instructions to check for updates available for Windows 8 operating systems. &nbsp;</p>



<p>Windows 8</p>



<ol class="wp-block-list"><li>Access Settings</li><li>Click Change PC Settings</li><li>Click on Update and Recovery</li><li>From there, click Windows Update</li><li>Click the Check Now option</li><li>Upon completion, if any updates are found you can click View Details</li><li>Click on the updates you would like to install</li></ol>



<p>**PC Matic suggests users install updates to patch all vulnerabilities.</p>



<p>Windows Vista, XP and 7 are all legacy operating systems, meaning they are no longer supported by Microsoft. &nbsp;Therefore, system updates are no longer available for these systems; however, users do have the option to upgrade to Windows 10.  To learn more about upgrading to Windows 10, click <a href="https://www.pcmatic.com/blog/2019/02/12/updating-windows-10/">here</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/update-windows-operating-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware Is Not a Detect &#038; Respond Issue</title>
		<link>https://www.pcmatic.com/blog/ransomware-detect-respond/</link>
					<comments>https://www.pcmatic.com/blog/ransomware-detect-respond/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Wed, 12 Feb 2020 12:12:16 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[detect and respond]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61879</guid>

					<description><![CDATA[A vast majority of today&#8217;s cyber security solutions are failing. Many cyber security vendors are misguided when it comes to cyber security protection. One of the biggest &#8220;buzz phrases&#8221; in the security world is detect and respond. Therefore, cyber security vendors are deploying an endpoint detect and respond (EDR) component to their existing products. To [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h4 class="wp-block-heading">A vast majority of today&#8217;s cyber security solutions are failing. </h4>



<p>Many cyber security vendors are misguided when it comes to cyber security protection.  One of the biggest &#8220;buzz phrases&#8221; in the security world is <em>detect and respond.</em>  Therefore, cyber security vendors are deploying an endpoint detect and respond (EDR) component to their existing products.  To be clear, this isn&#8217;t all bad.  Having the ability to find and remediate malicious attacks is important.  Unfortunately, it&#8217;s a moot point when dealing with today&#8217;s primary cyber threat, ransomware.  </p>



<p>Ransomware is a form of malicious software, or malware, that encrypts a user&#8217;s files.  Therefore they become locked and inaccessible.  The only way to restore them is through backup files.  If the organization does not have current backups, or if the ransomware encrypted them as well, the entity is out of luck.  Detection and respose is not an option.  The entity may be able to remove the ransomware through an EDR tool, but the files will remain encrypted. </p>



<p>Ransomware is not a detect and respond issue.  Emphasis is in the wrong area.  But why?  </p>



<h4 class="wp-block-heading">There are a few reasons&#8230;</h4>



<p>The traditional approach has always been to detect and respond.  This goes all the way back to the very first antivirus solutions, and the technology many still use today &#8212; a blacklist.  This method allows unknown files to run and only blocks what is known to be bad.  The blacklist is no longer adequate due to the fast-paced evolvement of cyber threats. </p>



<p>Additionally for major analyst firms, such as Gartner, to recognize a solution as an endpoint protection platform, it&#8217;s required that an EDR component exists.  Again, this is important.  However, it&#8217;s being represented as a silver bullet.  It is far from it.  </p>



<h4 class="wp-block-heading">Beyond EDR </h4>



<p>As mentioned above, when ransomware infiltrates a system, EDR isn&#8217;t going to help to restore the integrity of the company&#8217;s files.  Detection and response is not an option when facing this threat.  As an alternative, entities should be taking a proactive approach to their cyber security.  By deploying a whitelist add-on feature to their existing cyber security solution, or by replacing their cyber security protection with one that includes a whitelist as its primary method of malware detection. </p>



<p>To be fair, whitelisting has traditionally had a bad reputation for creating a plethora of work for IT professionals, may be hard to deploy, and is time-consuming.  And for some options, that is still the case.  Although, there are <a href="http://www.pcmatic.com/pro/whitelist">programs available that utilize a whitelist</a> that will not bog down hardware or IT resources.  IT professionals can encourage their teams to do their due diligence. When it comes to choosing either a whitelist replacement or an add-on program, as not all security programs built the same.  </p>



<h4 class="wp-block-heading">Prevention is key </h4>



<p>Prevention is critical when facing ransomware.  Unfortunately, many businesses, schools, and government entities do not believe they will fall victim or believe their existing cyber security solution is sufficient, that is until it is too late.  At least that is what we can speculate Havre Public Schools, Union Grove High School, and Rockdale County officials are all thinking after falling victim to ransomware over the last week.  </p>



<p>For more information on ransomware attacks, and which security solution is failing American entities, click <a title="Ransomware Attacks Increasing and What to do about it?" href="http://www.pcmatic.com/ransomware">here</a>.  Discover <a title="Business Application Whitelisting" href="https://www.pcmatic.com/whitelisting.asp">business application whitelisting</a> solutions. School systems are vulnerable and need enhanced IT security protection. For enhanced cybersecurity in the education sector read <a title="Education Application Whitelisting Solutions" href="https://www.pcmatic.com/pro/caseStudies.asp">education application whitelisting</a> security software case studies.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/ransomware-detect-respond/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Optimizing Windows 10 Start Menu Through Personalization</title>
		<link>https://www.pcmatic.com/blog/windows-10-start-menu/</link>
					<comments>https://www.pcmatic.com/blog/windows-10-start-menu/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Tue, 03 Sep 2019 13:43:15 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[how to]]></category>
		<category><![CDATA[personalization]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61451</guid>

					<description><![CDATA[We Personalize Everything! We live in an era where we feel a need to personalize everything. &#160;Our shirts, gym bags, device cases, cars, and our computers — just to name a few. &#160;However, personalizing our items isn’t always a bad thing. &#160;For instance, if you aren’t personalizing your devices to meet your needs, you could [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h4 class="wp-block-heading">We Personalize Everything!</h4>



<p>We live in an era where we feel a need to personalize everything. &nbsp;Our shirts, gym bags, device cases, cars, and our computers — just to name a few. &nbsp;However, personalizing our items isn’t always a bad thing. &nbsp;For instance, if you aren’t personalizing your devices to meet your needs, you could be missing out. &nbsp;Adjusting our devices to meet our needs could not only simplify things but also make them more efficient. &nbsp;For instance, if your device has 15 programs on it that you don’t use — get rid of them! &nbsp;It’s wasting storage and could be slowing it down. &nbsp;Beyond personalizing the software, you can also personalize settings, backgrounds, sounds, etc.</p>



<p>Today, we are going to discuss how to personalize your Windows 10 Start menu.</p>



<h4 class="wp-block-heading">Personalizing Windows 10 Start Menu</h4>



<p>First, you will want to open your Start menu. &nbsp;Once you do, you will see something similar to this:</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" width="950" height="673" src="https://techtalk.pcpitstop.com/wp-content/uploads/adjusting-start-menu.png" alt="" class="wp-image-57581" srcset="https://www.pcmatic.com/blog/wp-content/uploads/adjusting-start-menu.png 950w, https://www.pcmatic.com/blog/wp-content/uploads/adjusting-start-menu-768x544.png 768w" sizes="(max-width: 950px) 100vw, 950px" /></figure></div>



<p>When I was first playing around with this, I combined several tiles into one box. &nbsp;I thought less to look at would be good. &nbsp;You can do the same by dragging whatever tile you would like, on top of another. &nbsp;This then puts them into their own single box, or folder, together.</p>



<p>I wasn’t crazy about this. &nbsp;It still looked unclean and too clustered for me. &nbsp;So, I decided to “unpin” whatever tiles I wasn’t using from the Start menu. &nbsp;You can do so by right-clicking on a tile and selecting “Unpin from Start”, as seen here.</p>



<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" width="1025" height="381" src="https://techtalk.pcpitstop.com/wp-content/uploads/unpin-from-start.png" alt="" class="wp-image-57582" srcset="https://www.pcmatic.com/blog/wp-content/uploads/unpin-from-start.png 1025w, https://www.pcmatic.com/blog/wp-content/uploads/unpin-from-start-768x285.png 768w" sizes="(max-width: 1025px) 100vw, 1025px" /></figure></div>



<p>In addition, you can also resize tiles, rate, and review, or uninstall certain programs right from this function.</p>



<p>Also, you may create new tiles for some of your most-used software. &nbsp;Handy feature?  I say so.  If you want a specific tile, find the program within the Start menu and right-click. &nbsp;Once you do so, you can select “Pin to Start”, seen below:</p>



<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" width="525" height="308" src="https://techtalk.pcpitstop.com/wp-content/uploads/creating-new-pin.png" alt="" class="wp-image-57583"/></figure></div>



<p>After clicking “Pin to Start”, a tile will populate within the Start menu for the software/program you requested. &nbsp;Once you have all of the pins you like and have unpinned those you don’t, you can drag and drop the tiles where ever you’d like that creates the most efficient use of the menu for you.</p>



<p>The last and final fun trick is personalizing your Start menu accent color, which determines the color of the tiles. You can customize this by opening Windows 10 Settings, navigating to Personalization, then clicking the “Color” option in the left margin. Scroll down and select your favorite color. You can also set it to automatically change the color based on your wallpaper colors. </p>



<p>If you have any fun tips and tricks for Windows 10 that you&#8217;d like to share, drop them in the comments section below! </p>



<p>Explore the <a href="https://www.pcmatic.com/pc_matic_windows10/default.asp" title="Best Antivirus for Windows 10">best antivirus protection for Windows 10</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/windows-10-start-menu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Copy NordVPN&#8217;s Website to Spread Bank Trojan</title>
		<link>https://www.pcmatic.com/blog/hackers-copy-nordvpns-website-to-spread-bank-trojan/</link>
					<comments>https://www.pcmatic.com/blog/hackers-copy-nordvpns-website-to-spread-bank-trojan/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Wed, 21 Aug 2019 19:47:39 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[spoofed site]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61412</guid>

					<description><![CDATA[Users Hoped for Security, Ended Up with Malware Cyber criminals have found an effective way to distribute malicious software, and users are none the wiser. By copying the popular VPN (virtual private network) website for NordVPN, users believe they are using something that is meant to boost their security. Instead, they are downloading a bank [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Users Hoped for Security, Ended Up with Malware</h3>



<p>Cyber criminals have found an effective way to distribute malicious software, and users are none the wiser.  By copying the popular VPN (virtual private network) website for NordVPN, users believe they are using something that is meant to boost their security.  Instead, they are downloading a bank trojan.  </p>



<p>Now, one may think they cannot be dupped by a fictitious website but these hackers are good.  Not only did they replicate the site entirely, but they also added a  valid SSL certificate, which helps the fake website appear more legitimate while also allowing it to bypass browser security checks.  </p>



<p>Tricky?  Yes, yes indeed. </p>



<h4 class="wp-block-heading">What is a VPN?</h4>



<p>As mentioned earlier, a VPN is a virtual private network.  However, that still doesn&#8217;t exactly state what it does.  Take a firewall, for example, that helps to protect your data on your computer.  A VPN does the same but does so online.  By utilizing a VPN, users are able to securely access a private network and share data on public networks. </p>



<h3 class="wp-block-heading">Don&#8217;t Fall Victim</h3>



<p>The best way to avoid these scams is two-fold.  First, when you visit a website, type the URL into the address bar instead of searching for the URL on a search engine.  Often times, even if they are malicious, websites will show up in the search results.  For instance, if you wanted to go to espn.com, type in www.espn.com in the browser&#8217;s address bar.  Do not go to google.com and search ESPN.  Granted you&#8217;ll likely go to the correct place, but you also may end up on a spoofed site.  So, searcher beware. </p>



<p>Also, deploy a security solution that uses an application whitelist.  By running a whitelist, only known trusted programs are permitted to execute.  Therefore, if you find yourself somewhere you shouldn&#8217;t be &#8212; the malware still cannot run, because it has not been tested and proven secure.  </p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/hackers-copy-nordvpns-website-to-spread-bank-trojan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scammers Are Once Again Offering Up Fake Refunds</title>
		<link>https://www.pcmatic.com/blog/scammers-are-once-again-offering-up-fake-refunds/</link>
					<comments>https://www.pcmatic.com/blog/scammers-are-once-again-offering-up-fake-refunds/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Wed, 07 Aug 2019 15:51:46 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61365</guid>

					<description><![CDATA[Initial reports of scammers calling individuals offering fake refunds for businesses that were &#8220;going out of business&#8221; started in 2018. Then there was an influx in early 2019, and now, they&#8217;re back at it. This time the crooks are offering up fraudulent refunds from companies experiencing &#8220;server issues&#8221;. They are not targeting one company in [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Initial reports of scammers calling individuals offering fake refunds for businesses that were &#8220;going out of business&#8221; started in 2018.  Then there was an <a href="https://techtalk.pcpitstop.com/2019/01/28/scammers-portraying-security-companies/">influx </a>in early 2019, and now, they&#8217;re back at it. </p>



<p>This time the crooks are offering up fraudulent refunds from companies experiencing &#8220;server issues&#8221;.  They are not targeting one company in particular, as they know that would limit their victim pool.  Instead, they keep it pretty vague, hoping the victim will throw them a bone.  </p>



<p>Just this week, one of our customers notified the support team the scammers were portraying PC Matic.  During the call, the scammer claimed PC Matic experienced server issues, which is why they were issuing $50 refunds.  They initially claimed the issues took place in the last month.  Then they stated it was last year &#8212; red flag?  Just one of many.  Next, in order to process the refund, the customer was asked to provide their banking information.  DO NOT DO THIS.  </p>



<h4 class="wp-block-heading">Red Flags Galore</h4>



<p>First and foremost, if a company was going to issue refunds for any reason, they would not call every single customer.  That would take a ridiculous amount of time.  Secondly, if a refund was going to be processed, they would not need the banking information.  Businesses keep their customer payment information on file.  They may request that you verify the last four digits, but will never ask for the full routing or account numbers.  </p>



<h4 class="wp-block-heading">What to do next&#8230;</h4>



<p>If you receive one of these calls, follow these steps:  </p>



<ul class="wp-block-list"><li>Gather as much data as you can.  This includes the phone number they are calling from, and you can even ask for a call back number.  Get their name and the company they are claiming to be from and their alledged location (this will all be fake, but get it anyway).</li><li>Once you&#8217;ve collected the data, tell the caller you know its a scam and will be calling the authorities.  This will deter them from calling again. </li><li>Contact your local authorities and share with them all of the data you collected. </li><li>Always keep in mind you should never share your banking information or personally identifiable information with anyone who is calling you.  </li></ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/scammers-are-once-again-offering-up-fake-refunds/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Security &#8211; Back to the Basics</title>
		<link>https://www.pcmatic.com/blog/simplifying-cyber-security/</link>
					<comments>https://www.pcmatic.com/blog/simplifying-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 20:42:45 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61343</guid>

					<description><![CDATA[Simplifying Cyber Security The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use multiple products that all do the same thing, which in turn interferes with each one’s functionality. In an attempt to make your life easier, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Simplifying Cyber Security</h3>



<p>The concept of cyber security has become convoluted.  Users aren’t sure what software to buy, or if one program is even enough.  Often times they’ll try to use multiple products that all do the same thing, which in turn interferes with each one’s functionality.</p>



<p>In an attempt to make your life easier, PC Matic wants to go back to the basics for a moment.  First, let&#8217;s talk about the two types of intrusions.  </p>



<ul class="wp-block-list"><li>Malicious software is running on your device</li><li>An unauthorized person is on your device or within your network without your permission. </li></ul>



<p>

That’s it.&nbsp; Two types of intrusions, people or software.

</p>



<p style="text-align:left">Next, let&#8217;s simplify how to block these two intruders.  It&#8217;s quite simple but has become a convoluted concept.   To block these intruders you must secure your devices.  How do you do that?  Only permit known trusted programs to execute.  This method, known as application whitelisting blocks any file or software that tries to run on the device that has not been proven secure.</p>



<p>In theory, this is the same method of security you likely use for your home.  You keep your doors locked, only allowing those you trust inside.  From an IT perspective, you keep your device locked, only allowing known, trusted programs or files to run.  </p>



<h4 class="wp-block-heading">Moving Forward…</h4>



<p>Over the last few years, attack vectors have continued to evolve.&nbsp; The two intrusions remain the same — people and software, but how they get into your system has advanced.</p>



<p>Therefore, hackers are going outside of file-based attacks and worming their way into your devices through other methods such as <a href="https://techtalk.pcpitstop.com/2017/06/16/infographic-blacklist-whitelist/">fileless infections</a> and <a href="https://techtalk.pcpitstop.com/2018/10/02/proactive-approach-rdp-attacks/">remote desktop attacks</a>.  Finding a security solution that effectively thwarts all forms of attack vectors is imperative.  This proves the <a href="http://www.pcmatic.com/">security solution</a> is evolving with security threats.</p>



<p>If your security solution isn’t thwarting all attack vectors, then it’s time for a change.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/simplifying-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Three Ways to Backup Your Data</title>
		<link>https://www.pcmatic.com/blog/backup-your-data/</link>
					<comments>https://www.pcmatic.com/blog/backup-your-data/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 18:09:21 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[backup files]]></category>
		<category><![CDATA[how to]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61341</guid>

					<description><![CDATA[Device users previously opted to back up their files as a means to prepare for restoration in the event their hard drive crashed. Now, users are facing a different threat &#8212; ransomware. If a device becomes corrupted by this form of malware, the only way to restore files is from backups. If these files are [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Device users previously opted to back up their files as a means to prepare for restoration in the event their hard drive crashed.  Now, users are facing a different threat &#8212; ransomware.  If a device becomes corrupted by this form of malware, the only way to restore files is from backups.  If these files are not current, the user faces the loss of any files that have yet to be backed up.</p>



<p>To prevent the loss of files users can backup their files in these three ways:</p>



<h4 class="wp-block-heading">3 Backup&nbsp;Methods to Keep Your Data Secure</h4>



<ol class="wp-block-list"><li>Within your computer you have the ability to back up your files. &nbsp;This method will save your files within your PC, and is not highly recommended. &nbsp;The reason being, if your computer becomes infected with malware, or crashes, it is likely you will lose these your backup files as well. &nbsp;However, if you would like to use this method, you need to:<ol><li>Access your Control Panel</li><li>Go to System and Security</li><li>Backup and Restore</li><li>Set up backup</li><li>Upon doing these things, you will likely get the following message:&nbsp;</li><li>You can save your files to your computer, but it is recommended you use an external device.</li></ol></li><li>Saving your data to an external device. &nbsp;External devices include USB drives, Solid State Drives (SSDs), Compact Disks, etc. &nbsp;This method is highly recommended because if your PC becomes infected with malware, or crashes, you will have an external device to regain access to all of your files. &nbsp;This external device can be used to upload all of your data to another PC, or to your existing PC once it is fixed. &nbsp;When purchasing an external device, please keep in mind how much storage you will need. &nbsp;You are able to purchase external storage devices at any electronics or office supply store, such as Best Buy or Staples.</li><li>You can also back up your files using cloud storage. &nbsp;This includes Box.com, Google Drive, and Drop Box to name a few. &nbsp;These services are often free of charge. &nbsp;The risk you run with using this form of storage is if hackers were able to breach any of these services. &nbsp;Unlike external drives, when you upload your data to these services, you’re trusting a third-party to keep them safe. &nbsp;By choosing an external device, you keep your data in your possession.</li></ol>



<h4 class="wp-block-heading">Beyond the Backup</h4>



<p>Ultimately the backup method users choose is theirs.  Regardless of which option picked, backing up your data is critical.  With the growing cyber threats, it no longer seems to be a question of if, but when.  Users never know when a malware infection may hit, or when your trusty hard drive is going to crash.  Once this happens, the data could be gone forever.  The only real hope of restoring it is having backup files available.</p>



<p>Once you start backing up your files, it is important you maintain them.  This means keeping them updated and ensuring they are free from malware.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/backup-your-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New RDP Vulnerability Recently Discovered</title>
		<link>https://www.pcmatic.com/blog/rdp-patch/</link>
					<comments>https://www.pcmatic.com/blog/rdp-patch/#respond</comments>
		
		<dc:creator><![CDATA[Kayla Elliott]]></dc:creator>
		<pubDate>Thu, 30 May 2019 17:26:29 +0000</pubDate>
				<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[RDP]]></category>
		<guid isPermaLink="false">https://www.pcmatic.com/blog/?p=61111</guid>

					<description><![CDATA[Microsoft Scrambles to Issue Patch for New RDP Security Hole A new vulnerability was discovered within remote desktop protocol (RDP) ports, although the technical details of the gap are being kept under wraps. We do know, the vulnerability found impacts Windows Server 2008 and Window 7, as well as out-of-support versions Windows 2003 and XP. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Microsoft Scrambles to Issue Patch for New RDP Security Hole</h3>



<p>A new vulnerability was discovered within remote desktop protocol (RDP) ports, although the technical details of the gap are being kept under wraps.  </p>



<p>We do know, the vulnerability found impacts Windows Server 2008 and Window 7, as well as out-of-support versions Windows 2003 and XP.  Microsoft has released a patch, which may be found <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">here</a>.  The software giant has deemed this vulnerability critical for three reasons.  First, the gap requires no interaction from users, as it is considered &#8220;wormable&#8221;.  Second, hackers may use RDP access to easily exploit the entire network, not just a single device.  Third, there are millions of users with impacted systems and enabled RDP ports.  </p>



<p>Saying this update is critical, may be an understatement. </p>



<p>Therefore, anyone who is currently using any of the impacted versions of Windows should install the patch provided by Microsoft immediately. </p>



<p>Beyond the vulnerability threat, hackers have been seen using RDP ports as a means to infect networks around the globe.  Therefore, beyond patch management, users and IT professionals should survey the devices that have RDP enabled.  If the function is not being utilized, users should disable the port entirely.  By closing the port, the risk of hackers malicious exploiting it will be eliminated.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcmatic.com/blog/rdp-patch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
