Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Application Blocking

Matrix-Solutions-Application-Blocking-Header

What is application blocking? Why you need it.

How do the criminals take control of computers? How does a crypto attack happen? In the majority of cases, an unauthorised program has been allowed to run. Application blocking prevents unauthorised applications running. It is the single most important protection for your computer system.

For many years, Matrix Solutions has been using application blocking (sometimes called application whitelisting) to protect our private Cloud infrastructure from crypto attacks. No unauthorised applications can be installed or run on our server environment. Users must contact an IT administrator to request the installation of a new or updated application. Yes, there is an administrative overhead. But it is relatively small compared to the enormous disruption caused by a crypto attack.

But what about company computers? Using Microsoft technologies such as Azure AD and InTune we are able to enforce application blocking on all company computers. With this technology in place users are protected, even if they do inadvertently access a malicious email or website. The malicious software will not be able to run.

Better still, this same technology can be used to enforce other important cybersecurity protections like complex passwords and screen saver timeouts. Interested in protecting your local computer environment? Talk to us about inexpensive technology that will protect your computers so you can get on with what you do best.

Check out our new post on “Why Should Law Firms Invest in Managed IT Services?

About Matrix Solutions

Matrix Solutions provides tailored managed IT services to professional firms. In addition, the company specialises in installation and support of NetDocuments and Worldox Document Management software. Matrix Solutions hosts the BigHand Professional product in our Sydney datacentre. For more information about Matrix Solutions visit us at contact us today.

Schedule Your Free Consultation Today

Share:

Facebook
Twitter
Pinterest
LinkedIn
Picture of Matrix Solutions

Matrix Solutions

Matrix Solutions is the trusted partner for legal and finance businesses providing expert Managed IT Services with 25 years of experience. Contact us today!

On Key

All Posts

What is Red Teaming
Cybersecurity

What is Red Teaming and Why It Matters Today

Red teaming is a proactive security practice where a team of experts, often called ethical hackers, simulate real-world cyberattacks to test how well an organisation can defend itself. The goal is to identify weaknesses across systems, processes, and employee awareness before a real attacker can exploit them. Originally developed by military organisations like the Central

Read More »
network security audits
Cybersecurity

A Complete Guide to Network Security Audits for SMEs

With cyber threats increasing, ensuring your business’s security is more crucial than ever. A network security audit is the first step in identifying vulnerabilities and strengthening defences. Whether you’re concerned about data breaches, regulatory compliance, or improving your network’s performance, this guide covers everything you need to know. From understanding the audit process to choosing

Read More »
network security threats and solutions
Cybersecurity

Understanding Network Security Threats: Key Risks and Protection Strategies

Network security threats are a serious concern in today’s digital world. Cybercriminals are finding new ways to target businesses, risking sensitive data, daily operations, and reputations. Ignoring these threats can lead to costly consequences, making prevention a top priority. To protect your organisation, it’s crucial to understand network security threats and how they can affect

Read More »