CyberSecurity

Tired of Being Tracked Online? Simple Steps to Opt Yourself Out!

Tired of Being Tracked Online? Get Your Privacy Back With These Simple Tools! It seems nowadays information is readily available anywhere online.  A simple Google search will likely provide your name, address, phone number, birth date and more.  This information is not only available for all to see, it [...]

Protection on a Minimal Budget? We’ve Got You Covered With These 3 Security Tools!

Protection on a Minimal Budget? We've Got You Covered With These 3 Security Tools! So much news continues to be revolved about breaches. As overwhelming as it may seem, there are simple, low cost tools available to protect yourself from everyday attacks. We've identified 3 cost-effective things you can easily [...]

2023 IT Investments – Where to Prioritize?

Not surprisingly, cybersecurity tops the list as a priority for 2023.  According to Red Hat's 2023 Tech Outlook report, the need for cybersecurity investments was cited as a priority across a variety of technology categories including cloud infrastructure, big data and analytics, and automation.  Network security and cloud security were [...]

Your New Years Resolution – Develop a Company Incident Response Plan

This Pops Up On Your Computer Screen.  What Do You Do Next? As the world of cybersecurity continues to evolve, it is no longer an option to not have a plan in place to deal with a crisis situation.   For many companies, one isolated incident (similar to above) can [...]

Internet Explorer Bytes the Dust (almost)

Microsoft will finally end support for Internet Explorer on multiple Windows versions on Wednesday, June 15, almost 27 years after its launch on August 24, 1995. After finally reaching its end of life, the Internet Explorer desktop application will be disabled. It will be replaced with the new Chromium-based Microsoft [...]

Passwordless is Possible!

Tech giants Apple, Google, and Microsoft announced last month that they have committed to building support for passwordless sign-in across all of the mobile, desktop, and browser platforms that they control in the coming year. Effectively, this means that passwordless authentication will come to all major device platforms in the not too [...]

Latest Phishing Campaign Targets US Government, Exploits Windows Zero-Day Vulnerability

The latest vulnerability comes in the form of a phishing email, pretending to be an offer of a raise in compensation, including an attached Word Document (RTF file). Once activated, the malware then checks if the system is a virtual machine, stealing information from multiple web browsers, mail clients, and file [...]

Choosing an Effective Passphrase

Tips for Choosing an Effective Passphrase A passphrase is a password composed of a sentence or combination of words. Choosing something longer and more complex than the average password increases overall security. Be sure to include special characters and numbers in your passphrase. A passphrase should be something that [...]

What Is Cyber Insurance and Why Is It Important?

With the ongoing growth of cyberattacks and ransomware, cyber insurance is becoming a must-have for businesses. As a leading Managed Security Service provider, BMT works with clients to deploy and manage the services that carriers require to provide coverage. What Does Cybersecurity Insurance Cover? Policies cover costs associated with [...]

Is Your PC Ready For The Holiday Weekend?

Summer kick-off is a couple days away!  Before you sign off for the long weekend, implement these simple steps to ensure your computer is updated, secure and refreshed upon return. What You Should Do Before you shut down for the holiday weekend, it's important to have your workstation in [...]

Removing Your Personal Information From Google Searches

With our private data scattered all over the internet, it's inevitable that some personal information will end up in Google search results. Fortunately, Google has a process that allows individuals to request certain search results be removed.  In April, the company added new categories of information that could be removed upon [...]

QR Code Safety – 5 Tips to Keep Safe

QR codes saw a resurgence during the pandemic, as more people took extra steps to keep their hands clean and touchless technologies gained ground at restaurants and retailers.  While convenient, QR codes come with security risks.  Like any other link, the codes can be the first step in a [...]

Go to Top