advisory

BMT – Successfully Serving and Educating Clients While Operating Remotely

As the world continues to adapt to life with Covid-19, we want you to know things are stable at BMT – our team is fully staffed and has adapted to serving our Clients' needs from home office stations. While 95% of what we do is remote, we have field [...]

Remote Works Webinar Series: Quick Tutorials to Improve Your Work from Home Experience

Recent events have altered the current work landscape as more people transition to remote work. As adjustments continue to be made by employer/employee, we find there are everyday technology tools and tips that can be implemented to overcome some common challenges associated with working remotely (Communication, Security, Strategy). The [...]

Using Technology to Create (and Keep) a Happy, Successful Remote Workforce

Recent events have pushed more companies and organizations to transition to remote work. Although there are many benefits and challenges associated with working from home (WFH), the most common complaints about remote work are often associated with loneliness. Through simple technology, you can help connect your team and combat [...]

Smart Security Habits – Physical Safeguards

With digital hacking incidents on the rise, many IT professionals have lost focus on the tried-and-true method of attacking physical security.  Criminals know security professionals put most of their eggs in the cyber basket and will often resort to the old-fashioned break-and-enter attack from inside.  Recently, a flaw was [...]

Smart Workstation Security Habits – End of Day

Now more than ever, adopting everyday practices to secure your workstation should be a priority.  One of the questions we frequently get asked is, what should I be doing with my workstation at the end of the day? What Should You Do? We highly recommend users sign out of [...]

Creating a Business Continuity Plan

Do you have a plan if your IT equipment is running, but physical access to the office is not possible? In the event employees must work from home (weather events, sick days, emergencies, etc.), it’s important to have resources in place to ensure business is not interrupted. Here are [...]

Adding Value to the Legal Industry through IT Education

Business Machine Technologies is excited to announce recent initiatives implemented to add value to the legal sector through technology resources.  Recently, we became accredited to provide a technology education course.  What Lawyers Need to Know About Managing Cybersecurity provides law firms with new tools and strategies to protect from [...]

By |2020-12-28T14:04:16-05:00March 4th, 2020|Categories: News|Tags: , , , |

Windows 2008 Update, Reboot Issue

Windows Server 2008 servers will no longer boot if prerequisites aren't installed before applying the out-of-band KB4539602 update released by Microsoft on February 7 to patch a wallpaper bug. After being deployed on machines running Windows Server 2008 or Windows Server 2008 R2, the boot file will be deleted and the [...]

Protect Your Organization with Enhanced Security Services

Did You Know? BMT is offering clients enhanced security solutions through Perch Security Services. This added protection will automate IT security, offering the following enhancements: Real-time threat detection Threat intelligence centralization, automation and log file management First-tier threat analysis with 24x7 escalation to IT support staff Access to view [...]

Happy Data Privacy Day!

Let's celebrate Data Privacy Day! It’s a great day to stop and think how your personal information is being used, collected or shared in our growing digital society. We encourage you to take some actionable steps to better protect your data and privacy. Here are some tips to get [...]

By |2020-12-28T13:56:24-05:00January 28th, 2020|Categories: Advisory, News|Tags: , , , |

New Microsoft Vulnerability Announced, Reprieve for Windows 7 Users

Time to patch those systems!  A vulnerability has been discovered in the Microsoft Cryptographic library CRYPT32.DLL, a Windows component that deals with security certificates and cryptographic messaging functions. Successful exploitation of this vulnerability could allow for attackers to compromise trusted network connections using spoofed certificates. This can be used [...]

Privacy vs. Convenience, are Smart Devices Worth the Risk?

Amazon Alexa, Ring doorbell, Nest thermometer – which electronic gift was placed under your tree this holiday season?  As smart devices continue to grow in popularity, how much do we know really about the information that is being collected and who has access to keep it, or more importantly, [...]

By |2020-12-28T13:52:44-05:00January 3rd, 2020|Categories: Advisory, News|Tags: , , , |
Go to Top