CyberSecurity

COMB: Over 3.2 Billion Unique Email and Password Combinations Leaked

More bad news: your password has likely been leaked online.  This recently announced breach, dubbed “Compilation of Many Breaches'' (COMB), doesn’t appear to be a new breach; rather, as the name suggests, it’s a compilation of multiple breaches.  Unique to this breach, the mammoth compilation of hacked data was [...]

Catch-IT: Keep Conversations Private With Signal Secure Chat

Want Conversations Kept Private? Check Out Signal Secure Messaging App Messaging App Signal has gained recent popularity as one of its biggest competitors, WhatsApp, announced it would require data sharing with its parent company, Facebook, beginning February 8. Signal is a free, privacy-focused messaging and voice talk app you [...]

Service Spotlight – Free Email Link Protection

Say Goodbye to Phishing, Malware, and Ransomware with Enhanced Link Protection Did You Know? BMT recently added Email Link Protection services to our portfolio, through our partnership with Appriver,  a Zix company. The service is being provided for FREE to our IT Essentials Managed Service Clients as our aim [...]

Are Identity Theft Services Like LifeLock Worth It?

Americans were victims of identity theft 13 million times in 2019, losing $16.9 billion, Javelin Strategy & Research found. The crimes involved included credit-card fraud, misuse of Social Security numbers and full-on impersonation. Account takeovers were up 72% over the previous year, and openings of fraudulent checking and savings accounts [...]

The Cost of Sophistication – Phishing 2021

According to a recent IBM Cost of a Data Breach Report, small businesses have been hit especially hard by data breaches. Their losses average over $2.5 million, which can be significant for a company making $50 million or less in annual revenue and make survival after the breach difficult. [...]

Smart Security Habits – Physical Safeguards

With digital hacking incidents on the rise, many IT professionals have lost focus on the tried-and-true method of attacking physical security.  Criminals know security professionals put most of their eggs in the cyber basket and will often resort to the old-fashioned break-and-enter attack from inside.  Recently, a flaw was [...]

Smart Workstation Security Habits – End of Day

Now more than ever, adopting everyday practices to secure your workstation should be a priority.  One of the questions we frequently get asked is, what should I be doing with my workstation at the end of the day? What Should You Do? We highly recommend users sign out of [...]

Windows 2008 Update, Reboot Issue

Windows Server 2008 servers will no longer boot if prerequisites aren't installed before applying the out-of-band KB4539602 update released by Microsoft on February 7 to patch a wallpaper bug. After being deployed on machines running Windows Server 2008 or Windows Server 2008 R2, the boot file will be deleted and the [...]

New Microsoft Vulnerability Announced, Reprieve for Windows 7 Users

Time to patch those systems!  A vulnerability has been discovered in the Microsoft Cryptographic library CRYPT32.DLL, a Windows component that deals with security certificates and cryptographic messaging functions. Successful exploitation of this vulnerability could allow for attackers to compromise trusted network connections using spoofed certificates. This can be used [...]

The End is Near for Windows 7, but Extended Help is Available!

On January 14, 2020, Windows 7 will reach end-of-life.  This means Microsoft will not longer provide free support and security updates for users. If you are not yet ready to leave Windows 7, a solution exists.  Beginning December 1, 2019, small and midsize businesses (SMBs) will be able to [...]

URGENT! Using an iPhone 5? Update by Sunday or Lose Access to the Internet

Starting just before 12:00 a.m. UTC (8:00PM EST) on November 3, 2019, iPhone 5 will require an iOS update to maintain accurate GPS location and to continue to use functions that rely on correct date and time including App Store, iCloud, email, and web browsing. What Should You Do? [...]

Go to Top