CyberSecurity

Internet Explorer Bytes the Dust (almost)

Microsoft will finally end support for Internet Explorer on multiple Windows versions on Wednesday, June 15, almost 27 years after its launch on August 24, 1995. After finally reaching its end of life, the Internet Explorer desktop application will be disabled. It will be replaced with the new Chromium-based Microsoft [...]

Passwordless is Possible!

Tech giants Apple, Google, and Microsoft announced last month that they have committed to building support for passwordless sign-in across all of the mobile, desktop, and browser platforms that they control in the coming year. Effectively, this means that passwordless authentication will come to all major device platforms in the not too [...]

Latest Phishing Campaign Targets US Government, Exploits Windows Zero-Day Vulnerability

The latest vulnerability comes in the form of a phishing email, pretending to be an offer of a raise in compensation, including an attached Word Document (RTF file). Once activated, the malware then checks if the system is a virtual machine, stealing information from multiple web browsers, mail clients, and file [...]

Choosing an Effective Passphrase

Tips for Choosing an Effective Passphrase A passphrase is a password composed of a sentence or combination of words. Choosing something longer and more complex than the average password increases overall security. Be sure to include special characters and numbers in your passphrase. A passphrase should be something that [...]

What Is Cyber Insurance and Why Is It Important?

With the ongoing growth of cyberattacks and ransomware, cyber insurance is becoming a must-have for businesses. As a leading Managed Security Service provider, BMT works with clients to deploy and manage the services that carriers require to provide coverage. What Does Cybersecurity Insurance Cover? Policies cover costs associated with [...]

Is Your PC Ready For The Holiday Weekend?

Summer kick-off is a couple days away!  Before you sign off for the long weekend, implement these simple steps to ensure your computer is updated, secure and refreshed upon return. What You Should Do Before you shut down for the holiday weekend, it's important to have your workstation in [...]

Removing Your Personal Information From Google Searches

With our private data scattered all over the internet, it's inevitable that some personal information will end up in Google search results. Fortunately, Google has a process that allows individuals to request certain search results be removed.  In April, the company added new categories of information that could be removed upon [...]

QR Code Safety – 5 Tips to Keep Safe

QR codes saw a resurgence during the pandemic, as more people took extra steps to keep their hands clean and touchless technologies gained ground at restaurants and retailers.  While convenient, QR codes come with security risks.  Like any other link, the codes can be the first step in a [...]

Cybersecurity Measures to Protect Against New Critical Threats

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin warning organizations of recent cyber threats and how to best combat and protect against these intrusions.  These recent attacks include website defacement and destructive malware, resulting in damage to critical infrastructure. What Should You Do? Here are steps [...]

Beware of BadUSB, the latest cyberattack comes via USPS

The FBI recently put out a warning that cybercriminal group FIN7, has started mailing USB drives filled with "BadUSB" malware to various companies.  There are two variations of packages: Those imitating HHS [US Department of Health and Human Services ], often accompanied by letters referencing COVID-19 guidelines and enclosed [...]

Update – Log4j Vulnerability

A joint Cybersecurity Advisory was recently released by Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), the Computer Emergency Response Team New Zealand (CERT NZ), the New Zealand National Cyber [...]

Log4j Vulnerability

By now, you have probably heard about the recent Log4j vulnerability. First, what is Log4j?   Log4j is a framework software developers use to record user activity and the behavior of applications for subsequent review. Distributed free by the nonprofit Apache Software Foundation, Log4j has been downloaded millions of times [...]

Go to Top