Advisory

Windows 10 End of Life Series

Are you one of the 62+% still using Windows 10? This is for you! Microsoft has set October 14, 2025, as the official End of Life (EOL) date for Windows 10.  After this date, security updates will no longer be provided, and Microsoft will cease technical support for the operating [...]

FAQ – New Jersey Data Protection Act, Effective January 15, 2025

The New Jersey Data Protection Act (NJDPA), N.J. Stat. § 56:8-166.4 et seq., went into effect on January 15, 2025, as New Jersey joins eighteen other states with comprehensive data privacy laws.  Here’s what you need to know to stay compliant and maintain consumer trust. Who Is Affected? This law [...]

Meet the BMT IT Support Team!

It’s Our Incredible People Who Make a Difference in your IT Support! The BMT Support Team is comprised of industry experts who are passionate about their work, have an extensive background in a wide variety of applications, and are dedicated to helping you.  We know how frustrating it is [...]

Safety Tips for Online Holiday Shoppers!

 Tis the Season for Holiday Scammers!  3 Useful Tips When Shopping Online Holiday shopping is in full swing! We wanted to let you know about a few online shopping trends we've noticed and give some tips about how to stay safe online while buying gifts for everyone on your list!  [...]

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Norton LifeLock Identity Theft Protection Alert

Individuals who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system. They are aware of the problem and are [...]

Android Vulnerability Warning – Update Now

A vulnerability (CVE-2024-43093) has been discovered in Google Android that could allow for remote code execution.  Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context [...]

Cloud Storage: The Best Solution for Managing Business Data

It’s no secret that managing business data can be tricky. Sure, you can store information on separate hard drives. But is that the best strategy for your business?Let’s take a closer look at how cloud storage can benefit your operations. Cloud Storage: The Basics So, what exactly is cloud [...]

Organizing Your Cybersecurity Strategy into Left and Right of Boom

Navigating the fight for data security is ongoing and requires a dual strategy. To best protect IT assets, businesses need to equip themselves with an advanced collection of cybersecurity tactics. These tactics fall into two categories: proactive prevention (Left of Boom) and robust recovery (Right of Boom). Left of Boom [...]

5 Tips for Cybersecurity Awareness Month 2024

Every year, a crazy high number of people face the consequences of cyberattacks. These attacks not only cost organizations billions. They also leave a devastating impact on individuals.  We know, if you’re reading this, you get it. You already understand the importance of safeguarding your organization and people from cyber [...]

Final Week of Cybersecurity Awareness Month!

It's the final countdown!!  As we head into Week 4 (10/24-10/28) we discuss the importance of applying software updates. Please review the videos and access our free resources to learn how to patch security vulnerabilities that cyber threat actors can exploit. Staying informed regarding publicly disclosed vulnerabilities and applying [...]

Go to Top