susan.juter@bmtcorp.com

About Sue Juter

As Marketing Specialist at BMT, I am involved in the day-to-day marketing and sales support efforts. Excited to be part of team that is dedicated to providing exceptional technology solutions.

Cloud Computing Supports Scalable, Flexible Workforces

A successful business isn’t just dependent on a great product or service. Staying competitive is about how quickly you can adapt and keep your team working together smoothly. Cloud computing is now part of this equation. Few things have had a greater impact on business operations in the last [...]

Oops: DanaBot Malware Devs Infected Their Own PCs

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants [...]

By |2025-06-26T02:08:36-05:00May 22nd, 2025|Categories: BMT Announcement|

Wild Apps Fuel Surge in Identity Attacks

Is your company prepared for the rise of rogue apps? These stealthy programs hide in plain sight and expose sensitive data to cybercriminals. Read on as we help you avoid costly breaches. The Growing Threat of Compromised Identities in Cybersecurity The recent Huntress 2025 Managed ITDR Report has become [...]

Using Workflow Automation to Sustain Business Growth

Think about your most mundane, repetitive tasks at work – the ones you dread because they feel so dull. These items might be necessary for overall business operations. You wouldn't be sad if you never had to send another invoice reminder, though! Maybe you’d love to hire an assistant [...]

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things [...]

By |2025-06-26T02:08:40-05:00May 20th, 2025|Categories: BMT Announcement|

Accelerate Growth With Financial Reporting Automation

Is your team stuck spending hours every month on financial reporting? Manual workflows can quickly become a bottleneck that takes valuable time away from strategic decisions. Keep reading and learn how financial reporting automation can turn this otherwise tedious task into a seamless experience. What’s Financial Reporting Automation? Financial [...]

Patch Tuesday, May 2025 Edition

Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month’s patch batch from Redmond are fixes for two other weaknesses that now have public [...]

By |2025-06-26T02:08:43-05:00May 14th, 2025|Categories: BMT Announcement|

Potential Risks in Your Work Mobile Apps

If your business relies on mobile apps, you need to be aware of a growing risk that could put your entire enterprise in jeopardy: data leakage. All your work mobile apps, from remote collaboration tools to time tracking apps, could be exposing sensitive customer information, internal files, and even [...]

Google Blocks Five Billion Ads – AI Scams

If you’ve spent any time online in the last year, you’ve come across AI-generated content, even if you didn’t realize it. You also might not realize that you didn’t see a lot of AI content, thanks to Google stepping up efforts to block “bad ads” and AI scams in [...]

Cyber Hygiene: Simple Steps To Stay Secure

How protected is your business in today’s digital age? Threats are everywhere and only growing more sophisticated each day. Cyber hygiene is about developing good habits to keep your digital information safe. Think of it as brushing your teeth but for your devices and systems. Incorporate these straightforward practices [...]

Social Engineering: The Human Side of Hacking

What’s the weakest link in your cybersecurity strategy? It’s not your firewall or antivirus software but your people. Social engineering targets human behavior and tricks you and your employees into giving away valuable information. Learn more about it here. What Is Social Engineering? Brute force isn’t the only way [...]

Is Your Smartphone a Cybersecurity Risk?

Is your smartphone a cybersecurity risk for your business? It’s easy to overlook how much confidential information lives on your device. Hackers know this, and they’re targeting mobile phones more than ever. Keep reading to learn more. Everyday Reliance, Everyday Risk: The Smartphone Dilemma Our phones are with us [...]

Go to Top