Videos

Videos of BMT Events

Catch-IT: Facebook Business Users Beware, Thousands Hit by New Phishing Scam

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices. The phishing emails have targeted more than 12,000 email addresses at hundreds of companies. Nearly all of the emails targeted individuals in the US, the EU, and Australia, though the researchers also [...]

Catch-IT: Beware of Uptick in Phishing Tactics

Vishing, Whaling, SMiShing...what do these things have in common?  Although seemingly tied to nautical terms, they are all common phishing tactics.  Phishing is a type of social engineering attack that uses email, phone, social media, and other means of personal communication to trick people into providing sensitive information.  So, what [...]

Catch-IT: Multiple Vulnerabilities in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could [...]

Catch-IT: Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a [...]

Catch-IT: Ransomware on the Rise

 Ransomware Continues to Gain Momentum Ransomware continues to dominate the threat landscape, posing significant risks to organizations. The NJCCIC continues to receive reports of ransomware incidents impacting New Jersey private and public sector organizations, including educational institutions and local governments. Fog ransomware and 3AM ransomware are two significant variants [...]

Cyber Insurance 101

It seems hardly a day goes by without a new report of a cyberattack.  The average ransom payment shot up 82 percent from 2020 to 2021. By the middle of 2021, the number of ransomware attacks was up more than 150 percent over the entirety of 2020.  These numbers are [...]

The Most Important Tool To Prevent a Breach

The Most Important Security Tool You Should Be Using. Yes, it's FREE*! It's a fact, more than 90% of successful hacks and data breaches start with phishing scams. One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what is known as phishing [...]

Welcome World Password Day 2022!

It's the first Thursday in May and while many are celebrating Cinco De Mayo, at BMT we are rejoicing National Password Day!!  We commemorate this special day with some tips to help you stay safe online! 3 Tips You Can Use Now to Improve Online Security Passwordless Sign-In.  Yes, [...]

How to Easily Set Up 2-Factor Authentication (2FA)

BMT's How-To Series! How to Easily Set Up 2-Factor Authentication (2FA) Download the Authenticator App you want to use. Visit the application/program you want to enable 2FA. Visit the Setting section of that app and then Security>Two-Factor Authentication (set-up may vary a bit per app) Reenter your password. Then, find [...]

How to Use a Password Manager

Welcome to BMT's How-To Series! How to Use a Password Manager Download a Password Manager Program. We recommend Bitwarden, LastPass or 1Password. Create a Master Password (we recommend using a passphrase) for your new program. Start logging into accounts and saving passwords to the Password Manager. Begin changing your passwords to ones that are [...]

Favorite Shortcuts for Windows 10

We've Compiled our Top 5 Favorite Shortcuts for Windows 10 Who doesn't like a faster, easier way when it comes to completing everyday computer tasks?! We've come up with 5 of our favorite shortcuts you can utilize when you are using Windows 10.  These simple tips are sure to [...]

How to Use the Phish Alert Button (Video)

Did you know more than 90% of successful hacks and data breaches start with phishing scams? One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are known as phishing attacks.   It is often much easier to trick someone to click on [...]

Go to Top