Email encryption via Bracket offers an added layer of security to your email platform ensuring compliance in difficult industries like Health Care and Financial Services.

User-friendly encrypted email with no plugins or apps. Simply wrap brackets around the subject in any email client and Bracket handles the rest.

New with Bracket 3

Secure file transfer

Included with Bracket is our encrypted file transfer service, Bracket Share. This gives every Bracket user their own personalized file transfer page with an easy URL (Share link) they can give to anyone. Shared files and messages show up in the Bracket inbox just like a regular message.

  • Customizable link

    Bracket Share links are customizable, so users can make them easy to remember and share.

  • Personalized invites

    You can have Bracket email people an invitation to share. These can display your personalized profile, so your contacts feel more confident about sharing their sensitive data.

  • Anyone can share… anytime

    Anyone with your Share link can share encrypted files and messages when it’s convenient for them. No account required.

  • Sender validation

    Senders who share through the Share link are securely validated via inbox authentication to prevent abuse.

  • Send large files with easeDon’t worry about bounced emails with large attachments. Bracket can handle files up to 1GB in size with up to 25 files allowed per message. Large files are good to go when sending from Bracket’s webmail interface or Bracket Share.

Want to take the solution for a spin? We are able to offer Bracket 3 for free until end of 2020 to all net new Bracket users (new users only, no existing domains).

Call us today to try it out!


PremierePC - Managed IT

Matthew addresses : What is the dark web? Why should I monitor the dark web? What happens if my company’s information is already present on the dark web? How can PremierePC help my business?

View our Dark Web Video on Youtube

Click here, fill out the form, and access your free report today!

Are you only relying on your email platform’s baked in spam filtering? You could be leaving yourself open to a range of threats.

What is email filtering?

Most major email providers use built in settings to move emails to “junk” or “spam.” These settings work great for unwanted advertising. However, they are not as effective in blocking incoming phishing emails that are designed to steal your personal information. These settings also do not prevent users from visiting websites known to contain malware.

Additional email security and compliance services can be layered on to block phishing emails and prevent users from visiting problematic sites.

How does it work?

Email filtering analyzes incoming emails for common trigger words, problematic content or design of the email, previously flagged IP addresses or senders, etc. Emails from unknown senders containing links or attached documents may also set off these phishing filters.

Phishing filters will typically move flagged emails to an additional inbox and place them “on hold” until you release, block, or allow it.

Releasing an email sends it to your normal inbox to be opened. In the future you will have to continue approving emails from the sender. If an email is blocked, then the email is rejected and the sender will be now be blocked from sending you future emails.

What are other ways to protect my network?

  • Implement Two-Factor (2FA) / Multi-Factor (MFA) solutions: These solutions add an additional layer of protection to your users.
  • Recognize signs of a scam: Engage your team in regular security training and phishing simulations.
  • Strengthen password security: Use a password manager and limit repeating passwords across different accounts
  • Maintain up to date hardware and software: Work with your IT firm to ensure you are using the most up to date and secure platforms

Remember that email filtering is only a portion of a whole cybersecurity plan used to keep your company safe.

How can PremierePC help?

PremeirePC is partnered with MailProtector (here in Greenville) to offer a range of email security and compliance services.

Elevate your email security to the cloud and stop spam and viruses for good. Let our team of email security experts protect your users around the clock.
Filter outbound email traffic with the policies you define. Prevent spam proliferation and keep damaging or sensitive data from being leaked via email.
Email encryption via Bracket offers an added layer of security to your email platform ensuring compliance in difficult industries like Health Care and Financial Services.


Learn more about our email security and compliance offerings and overarching cybersecurity support.

All services sold by the user by the month, no long-term commitments or up-front fees. Services are limited to managed service plan clients.


60% of SMBs will go out of business within 6 months of a cyber incident

73.18% of the US population has at least one compromised credential on the dark web

$46,000 – average cost of downtime due to a ransomware attack

dark web monitor

Reusing passwords, or a similar version of the same password, means if one of these accounts is hacked, all of them are hacked. This will happen in a matter of seconds.

Now what?

PremierePC offers a wide variety of cybersecurity solutions to help mitigate and plan for attacks. They will happen. Will you be ready?

Dark Web Monitoring (DWM)

  • Delivers the same advanced credential monitoring capabilities used by Fortune 500 companies.
  • Connects to multiple Dark Web services, including Tor, I2P and Freenet, to search for compromised credentials, without requiring you to connect any of your software or hardware to these high-risk services directly.
  • Provides awareness of compromised credentials before identity theft or data breaches occur.

A Zero-Touch Solution. No need to share access to your server, domain, or DNS settings.

How can we protect against human error?

Regular security training and awareness allows employees to know what to look for, and how to stop phishing attacks from successfully gaining entry into your network. This is a very effective defense against cybercrime.

This solution is INCLUDED with our Dark Web ID solution. No additional costs to layer on a proactive security awareness program.


Ready to know what the bad guys know?

Access your free scan now

**Submitting your contact information in this form does not put your information at risk. We will simply use your provided information to compare to information we find on the dark web by searching typical hacker sites, over 500 distinct Internet relay chatroom channels, 600,000 private websites, and 600 twitter feeds. We will then set up a brief meeting with you to review your results.

How do I prevent Hackers from stealing my data?

How can I protect my business and data?

Scenario one: It’s 8:00 a.m. on a crisp, beautiful Monday morning. You walk into the business you own, and immediately realize your entire business is down. Overnight, your data and your clients’ data were stolen. It is being held for ransom. You panic. You’re on your own. now what?

Scenario two: It’s 8:00 a.m. on a crisp, beautiful Monday morning. You walk into the business you own, and realize your business is down, you call PremierePC. We share that a ransomware attack was detected. We identify the source of the attack, isolate it from the network, and then begin to restore all your data from backups. As a result your business is up and running with minimal effort on your part.” You take a deep breath. You are not alone. Thank goodness for PremierePC and a smart Cybersecurity plan.

Which scenario do you choose?

What is Huntress and how does it fit into a broader Cybersecurity plan?

Huntress collects and analyzes metadata about every application scheduled to execute when a computer boots up or a user logs in.

When a hacker establishes access, Huntress is there to help identify the breach, provide remediation steps, and monitor for any remnant footholds.

Huntress discovers new and existing footholds in shady email attachments, malicious website content, unpatched vulnerabilities, and tainted USB drives.

Breach detection alone is not a plan. Pairing this solution with a smart network design and backup and recovery plan help mitigate many risks and allows for flexible restorations.

PremierePC includes Huntress on every server we monitor.

Service plan clients can also add Huntress to each supported device for an additional fee.

New Features

Huntress has just added two new services at no additional cost: Ransomware Canaries and External Recon.

Ransomware Canaries is an early warning and detection system, sounding the alarm that the network has been hit and triggering protocol to restore their system from backups. This happens the moment a part of the network gets “ransomed.”

Networks have become harder to secure as endpoints move from office to homes and other mobile work locations. Ransomware canaries is a key solution.

External Recon is an automated tool which monitors the network, on a constant search for exploits that hackers have used in the past to penetrate security.

Huntress automated what hackers do to find vulnerable ports and make the client aware of them before hackers find them.

Additionally, there is a threat mitigation report that is automatically generated for customers to show the dangers that security software has intercepted and display the persistent nature of cyber-attacks.

Contact us today to learn more about automated breach detection and reporting from PremierePC.



Real-World Example: A food distributor received an invoice email. The email looked real: “from” the expected vendor, arrived at the expected time, and equaled the expected amount. The thieves had been watching. The company didn’t discover the problem until the real vendor got in touch to ask why the payment was late. By then, nothing could be done. The cybersecurity measures were not previously in place. Loss: $23,500.


What is cybersecurity?

Well it’s not just one thing; it is many things.

“Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.”

Cybersecurity can change based on industry, size, and services you already have in place or want to have in place.

Many people are afraid of cybersecurity because they think it is difficult, outside their knowledge level, and it can often be hard to implement. Many companies ignore it. This is not a solution. 

Your risks of not implementing cybersecurity measures include hackers, attackers, intruders,  malicious codes/malware, and vulnerabilities.

(Thanks to Homeland Security for the above quoted info.)


So, what is the solution? How do you figure out what your business needs?

Do you have a dedicated IT department to analyze your business’s specific needs? Or do you simply use hosted email with default security settings and take your chances with your daily computing platform?

Are you proactively training staff on cybersecurity issues and searching for security holes in your system?

Have you implemented single sign on and MFA across cloud applications?

Are you monitoring devices on your networks to ensure they are not bringing in intrusions from outside?

Are you paying attention to how and where company data is being stored and accessed?

In today’s world, remote work is becoming increasingly popular and needed. Is your company implementing security measures to protect remote workers along with company-owned data?


You could spend as much money as you want to and still not achieve 100% protection. Making sure you spend the right money on the right solutions is the right way forward.

There are many areas that cybersecurity needs to be applied to. Having these particular areas properly managed by a professional team can mitigate your exposure to threats.

Some security solutions include: 

  • Firewalls with active security subscription.
  • Protecting users from inbound threats, phishing, and other external compromises via email.
  • Monitoring the DarkWeb for data which is already compromised.
  • Ensuring you are using next generation endpoint anti-virus solutions that monitor for behavior not just signatures.
  • Auditing how employees are using, accessing, and storing company-owned data.
  • Having a reliable source to call when you have questions.

What’s next?

Cybersecurity doesn’t have to be hard, scary, or overwhelming when you have professionals handling it. It can be as expensive as you want it to be, or you can get solutions that are customized to your needs.

If you have questions, we are here to make cybersecurity easy, affordable, intelligent, and a perfect fit for your needs. At PremierePC, Cybersecurity is built into all we do.

What is the Dark web?

According to Experian, dark web monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

The dark web is seen as the underbelly of the internet, a shrouded area of the internet hidden from search engines and only accessible with a special web browser. It also masks IP addresses, which essentially allows fraudsters to operate undetected to commit crimes, including identity theft.

Is My Information on the Dark Web?

PremierePC offers an identity theft protection product called DarkWeb ID, which includes Dark Web Surveillance for comprehensive dark web monitoring to protect you from the financial and reputational harm that can result from identity theft.

This product is available for your company’s entire domain, meaning we can gather and report on any compromises for your entire team. Unlike other solutions which are sold by the user, our service is sold by the domain (

Additionally, you may add up to 5 personal email accounts at no cost. Help bolster the protection of your C-Level executives who are often targets of social and spearhead phishing campaigns.

Security Awareness Training (SAT): Protect Against Human Error.

Monitoring the dark web for stolen credentials is critical for clients who want to provide comprehensive security to their users. Our SAT solution complements that data with simulated phishing attacks and security awareness training campaigns to educate employees, making them the best defense against cybercrime.

This solution is INCLUDED with our Dark Web ID solution. No additional costs to layer on a proactive security awareness program.

For a limited time, we are offering these solutions to our service plan clients at a discounted rate of $79 per domain (normally $99), Signup by the end of April to lock in this pricing

Learn More >>

Not a service plan client? Why not? Learn more about our service plans

If you company does not have an active service plan, you may still purchase the solutions above at the regular rate. month-to-month terms, setup is super simple and takes less than 30 mins.Prefer a one-time report? We are offering that for $349 per domain.

LogMeIn has made that possible by offering the Connect PRO Bundle, a cloud communication and collaboration offering made possible by LogMeIn’s acquisition of Jive Communications. The Connect PRO Bundle includes a GoToMeeting PRO license with every Jive seat purchased. This means that every member of your organization not only receives over 80 of Jive’s great VoIP features, but high-quality face-to-face meetings with anyone, anywhere, from any device.

The bundle is designed to simplify and extend customers’ UCC (unified communications and collaboration) solutions by combining GoToMeeting’s cloud-based video conferencing solutions with Jive’s cloud-based telephony solutions to offer more value, savings, and — most importantly — more valuable connections.


Multi-Factor Authentication:
Multi-Factor Authentication (MFA for short) is one of the single best ways to help keep you and your associated accounts safe, yet it is often the one of the most hated methods.

What is MFA? 
Simply stated, MFA uses a second (or third) device to allow you to authenticate your account. This is most common with Email and Banking applications. When you go sign-in, your MFA device is sent an activation code. This process attempts to ensure that you are the one who is requesting a login.  The logic goes that it is more difficult for a hacker to compromise both your password and your MFA devices.

MFA is one of the most effective tactics used to combat phishing scams.  Let’s say that a user at your firm is targeted and they disclose their password during a scam. While that is a problem, the bad guys would still need the MFA device in order to actually login. During this time, the user can report the disclosure to IT and we can make changes before anything happens.

Why don’t more people use it?
The simple reason is its perceived as a hassle. Having to have your phone nearby to login to email may add an additional few moments to the sign-in process, but in the end it can make your life much more secure.

Complexity weighs in too.  Not knowing how to properly setup MFA and integrate with your applications is a huge obstacle.

Another reason seems to be about awareness. This email is designed to help with that.

What are the costs?
Depends on your environment.  Microsoft and Google both offer free MFA as part of their core email offering. Several 3rd party solutions like Duo exist as well.

Can you help?
If you are a managed IT client then yes we can! We are actively advising all our managed clients of the importance of MFA and reviewing the methods we can use.

Our goal is to integrate your on-premise environment and your cloud infrastructure.

Happy Halloween from PremierePC.
Remember, there is nothing more scary than not having a proper backup and disaster recovery plan in place. 
Our ProSupport Complete offering includes backup to help with management and peace of mind.

Call PremierePC today to learn more about our solutions.