advisory

Using IoT Devices to Empower Your Small Business

Running a business now is not like running one just a decade or two ago. With the older system, if one couldn’t speak to a partner in person, slower fax machines and phone calls were the only alternatives. Similarly, research included manually borrowing library books and digital media meant [...]

Microsoft Copilot for Teams – Top 3 Features

Using Copilot for Teams Preparing for Teams meetings can be time-consuming. It’s easy to spend hours digging through chats to find information, following the thread of complex conversations, and getting up to speed on meetings. Now, Copilot has changed all that. With just a few clever prompts, it can [...]

2024 NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2024 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

3 Important Considerations for 2024

With 2024 in full swing, we know budgets have been prepared and are in full-swing implementation.  Hoping you made considerations in security investments for the coming year to better protect your organization from growing threats, we wanted to highlight 3 things for consideration.  If you haven't given these areas [...]

By |2024-01-17T12:25:24-05:00January 17th, 2024|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Catch-IT: Turning Off iPhone’s New NameDrop Feature

Installed as part of the latest iPhone iOS 17 update, NameDrop allows users to share contact information with any other iPhone by holding the phones close together.  Although it makes sharing contacts easier, some people are leery of the potential risks. How Does NameDrop work? All one has to do [...]

NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2023 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

Cyber Insurance 101

It seems hardly a day goes by without a new report of a cyberattack.  The average ransom payment shot up 82 percent from 2020 to 2021. By the middle of 2021, the number of ransomware attacks was up more than 150 percent over the entirety of 2020.  These numbers are [...]

Top 3 Phishing Attack Simulators to Defend Your Network

Did you know the median financial impact of a breach over the past year is $21,659, with 95 percent of incidents falling between $826 and $653,587?  Of these attacks 85% involved a human element.  Phishing emails are one of the most popular attack vectors for cybercriminals, with scams becoming [...]

Passwordless is Possible!

Tech giants Apple, Google, and Microsoft announced last month that they have committed to building support for passwordless sign-in across all of the mobile, desktop, and browser platforms that they control in the coming year. Effectively, this means that passwordless authentication will come to all major device platforms in the not too [...]

Latest Phishing Campaign Targets US Government, Exploits Windows Zero-Day Vulnerability

The latest vulnerability comes in the form of a phishing email, pretending to be an offer of a raise in compensation, including an attached Word Document (RTF file). Once activated, the malware then checks if the system is a virtual machine, stealing information from multiple web browsers, mail clients, and file [...]

Is Your PC Ready For The Holiday Weekend?

Summer kick-off is a couple days away!  Before you sign off for the long weekend, implement these simple steps to ensure your computer is updated, secure and refreshed upon return. What You Should Do Before you shut down for the holiday weekend, it's important to have your workstation in [...]

Cybersecurity Measures to Protect Against New Critical Threats

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin warning organizations of recent cyber threats and how to best combat and protect against these intrusions.  These recent attacks include website defacement and destructive malware, resulting in damage to critical infrastructure. What Should You Do? Here are steps [...]

Go to Top