It is time to make an example of these corporations and their CEO’s who think they own the country. Most of them are foreigners.
My question is – what do large corporations or any business do when the computers go down? What sort of back-up do they have outside of the square heads like Twitter/Facebook, etc.? Everything we have is computerized – which is a big mistake.
If they don’t like what you say – they can freeze your system. A good example is during the snow storm we did not have any service for about 12 days. Our water bill reflected a “storm credit.” That didn’t happened with DISH. I refused to pay that portion of the bill so they cut off my service until I paid it.
We have to change how these companies have the power to do this. Checking into the CEO’s ideology shows they are mostly not born and raised in the U.S. and do not have our patronage or values and that folks is they are here to make us part of the ONE WORLD ORDER. The big problem is they are lefties and are jealous of the U.S. and have been trying to disrupt our lives. As we can see – they couldn’t even run their own businesses in their country so how can we expect any different results in our country. They have no idea what the Constitution or Bill of Rights stand for.
Another example is the President of the U.S. Trump’s Twitter account was cut off because the CEO of that company didn’t like his verbage and he doesn’t agree with his ideology. And to think the Supreme Court , who is suppose to protect our Constitution, sides with Twitter. Something is wrong with this pattern.
This has happened several times while shopping and you try to check out and the clerks are not taught how to figure without a computer or a calculator – therefore, business stops on that dime. What plans do businesses have as a back-up? It is scary how these computer nerds have us wrapped up in a neat bundle.
You would think by now that the nerds would have figured out how to trap these hackers in their tracks. Are – are they hacking themselves to make money?
PC Matic CEO Rob Cheng’s 2016 Predictions Come To Pass
March 31, 2021 Mary James
PC Matic CEO, Rob Cheng, has always had his finger on the pulse of evolving cyber security technology. It’s what led him to found PC Pitstop in 1999, the company that later became PC Matic. His insights have always been ahead of his contemporaries.
Back in 2016, Mr. Cheng sat down with Bob Bragdon, publisher of CSO. For reference, “CSO is the leading information source for chief security officers (CSOs) and senior executives when making critical decisions regarding effective security and risk practices while driving business forward.”
Mr. Bragdon shared a statement made two years earlier, in 2014, by Symantec declaring antivirus to be dead. Similarly, Gardner stated that the focus should be changed from prevention to detection and response. Mr. Bragdon asked Mr. Cheng his thoughts. What followed was an insightful look at the future of ransomware. Many of Mr. Cheng’s predictions came to pass. Let’s take a look at the most important points.
Antivirus Is Dead
Rather than declare antivirus dead, Mr. Cheng suggested that we abandon the use of the blacklist. He explained the differences to Mr. Bragdon, noting that whitelist is effective prevention because it only allows through the known good. Whitelist is the only preventative measure against polymorphic viruses. Because polymorphic viruses are able to mutate, traditional antivirus, or blacklist software, was inefficient because someone would always have to be infected before that particular strain was identified and stopped.
A good deal of the apprehension toward the whitelisting approach, however, revolves around the prevalence of false positives. That, in turn, creates more work for IT staff to update and maintain the whitelist. Mr. Cheng’s answer to this was a policy still in effect at PC Matic today. Our Support Team does the work of updating and maintaining the whitelist. We also provide support to customers and IT specialists using our products.
Related Reading PC Matic Joins Elite Group
In the wake of the shortage of IT professionals, and the security concerns raised in the past year by businesses, this helps fill part of the gap in security. By removing the burden from an already stressed IT team, we free up their ability to monitor other security issues within their organization. It’s a win-win.
So Mr. Cheng’s comment that abandoning prevention completely would be a “misstep” was spot on. In fact, in April of 2019, the Cybersecurity & Infrastructure Security Agency (CISA) released a whitepaper with clear guidelines for ransomware prevention. The final bullet point in the prevention guidelines was to use and keep updated preventative software.
The Evolution of the Attack
When asked about his predictions, Mr. Cheng noted the rise of polymorphic ransomware. In 2016, it wasn’t that prevalent. By 2019, 93.6% of malware was polymorphic. Mr. Cheng’s foresight was spot on with the progression of ransomware.
But the evolution of the viruses wasn’t the only prediction Mr. Cheng made. He explained to Mr. Bragdon that the exploitation of vulnerabilities on the machine would go far. It hadn’t yet been used as a primary source of attack.
While there have been other instances in the 5 years since Mr. Cheng’s prediction, the most notable, has been in the recent news. After the SolarWinds breach, ransomware attacks have exploded. On March 11th 2021, Microsoft disclosed the Microsoft Exchange vulnerabilities were being used to facilitate ransomware attacks.
Right in line with Mr. Cheng’s predictions, one of the largest software giants on the planet was compromised via an exploitation of vulnerabilities.
Related Reading PC Matic University Malware Test
Where Security Is Needed
Mr. Cheng was passionate about the need for endpoint security. “Technology is so embedded in everything we do,” Mr. Cheng says, noting that everything from schools to hospitals to government are all reliant on their endpoints. Indeed, these have all made news in the past year for continual security breaches.
To his point, 70% of successful attacks in 2019 originated on the endpoint. So the suggestion of focusing less on endpoint security by both Symantec and Gardner was not only misplaced, but also a dangerous lack of foresight. Endpoint security is more crucial than ever.
The Cost of Ransomware
At the time of the 2016 interview, the numbers for ransomware in 2015 were in. The FBI stated that the total cost for that year was around $20 million. Acer computer manufacturer was hit in March of 2021 with a single ransom of $50 million which was double that of the 2015 overall total for all ransomware. By the end of 2021, 6 years later, the estimated yearly cost of ransomware will be over $20 billion.
But monetary values aren’t the only costs of ransomware. As we outlined, in our Work From Home report, there are business and human costs associated with ransomware as well. Prevention is a key part of minimalizing the effects it has on real people.
As we look to the future of ransomware, we can only speculate where it will go. We can guess, however, that Mr. Cheng has a pretty good idea of what that future looks like. Let’s make sure we’re listening.
Related Reading PC Matic’s Corey Munson Joins Julian Lee to Talk About Cybersecurity
Watch the full interview below.