BMT

It’s Time to Level Up Your Password Game

We know most relate Passwords to the broccoli of the internet - they’re good for us, but we still hate them. They’re a pain to remember, we have too many of them, and just when we come up with one we actually like, some website tells us it’s not [...]

From Tangled to Tidy—Spring Refresh Your Server Room

Wire You Waiting? It's Time to Clean Up that Server Room! Why is it Important to Keep Your Server/Cable Room Clean? A Messy Area Makes it Difficult to Troubleshoot Network Issues Keeping Dust/Dirt to a Minimum Increases the Longevity of Equipment A Dirty Environment Attracts Rodents that Destroy Equipment [...]

BMT tops CRN’s MSP 500 list in 2026

Business Machine Technologies is proud to be named in CRN’s 2026 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This recognition highlights our continued commitment to delivering secure, scalable IT solutions that enhance efficiency and drive business success. CRN’s MSP 500 list identifies top North American [...]

2025 NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2025 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

Catch-IT: Multiple Vulnerabilities Discovered in Apple Products

Multiple vulnerabilities (CVE-2024-44308 and CVE-2024-44309) have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.  Depending on the privileges [...]

By |2024-11-21T15:35:45-05:00November 21st, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update to its Chrome web browser—Chrome 127—in July 2024, which included an info stealer malware block. Available to all 3.5 billion web browser users, the improved tool aimed to stop [...]

Microsoft Cracking Down On Security

Microsoft 365 is a leading platform for businesses worldwide. Investing.com says roughly 80% of Fortune 500 companies use it. The chances are your business uses it, too. However, whether your team is small or large, you’ve likely heard of and been worried about recent Microsoft attacks that are now [...]

Cybersecurity Advances and Their Critical Role in Protecting Business Assets

Your business is only as efficient as its technology, as safe and protected as its security measures, and as reputable as its actions. When keeping all these factors in line, you need the right cybersecurity practices to ensure your equipment, browsers, and employee ventures are not threatening your company, [...]

Latest Trick – Malware Disguised as VPN

Suppose your employees use a VPN to access your company’s network when working remotely securely. In that case, you must know the latest threat targeting enterprises. Researchers have discovered that threat actors release malware disguised as VPN services, tricking users into downloading a malicious version of a well-respected VPN [...]

By |2024-09-19T13:01:03-05:00September 19th, 2024|Categories: News|Tags: , , , , , , , , , , |

WhatsApp for Windows Security Flaw

Suppose your company uses the popular messaging platform WhatsApp for Windows. In that case, you need to be aware of a potentially critical security flaw that puts your company at risk for a disruptive and costly breach. Users discovered the flaw in June 2024. It allows certain risky file [...]

By |2024-09-18T07:54:23-05:00September 18th, 2024|Categories: News|Tags: , , , , , , , , , , |

Protecting Your Google Workspace Account From Cyber Threats

If your company relies on Google Workspace, you must know about the latest cyber threat. As you know, setting up a new user account in Google Workspace requires email authentication. Hackers uncovered a vulnerability in Google’s protocols that bypassed this authentication process. The vulnerability allowed bad actors to create [...]

By |2024-09-16T11:38:32-05:00September 16th, 2024|Categories: News|Tags: , , , , , , , , , , |
Go to Top