BMT

What is Crowdstrike? What to know about company linked to global IT outage

A global tech outage disrupted major airlines, media companies, banks, and telecommunications firms worldwide Friday morning. Australia's government said the outage appeared to be linked to an issue at cybersecurity firm Crowdstrike, which is used by over half of Fortune 500 companies, the U.S. firm said in a promotional video this year. [...]

Using IoT Devices to Empower Your Small Business

Running a business now is not like running one just a decade or two ago. With the older system, if one couldn’t speak to a partner in person, slower fax machines and phone calls were the only alternatives. Similarly, research included manually borrowing library books and digital media meant [...]

Microsoft Copilot for Teams – Top 3 Features

Using Copilot for Teams Preparing for Teams meetings can be time-consuming. It’s easy to spend hours digging through chats to find information, following the thread of complex conversations, and getting up to speed on meetings. Now, Copilot has changed all that. With just a few clever prompts, it can [...]

2024 NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2024 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

New Chrome Threat: Make Sure Your Browser is Up to Date

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel. The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the [...]

By |2024-05-10T13:01:08-05:00May 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Patches Issued for Microsoft Products

April’s Patch Tuesday was a record-breaker for Microsoft, with the software giant releasing patches for 147 vulnerabilities — more than researchers can recall ever seeing previously in a single month.  This month’s list initially appeared to contain no zero-day vulnerabilities, but researchers were quick to correct this — pointing [...]

By |2024-04-10T11:28:37-05:00April 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Top Ransomware Trends – Q1 2024

For the first quarter of 2024, ransomware incidents reported to the NJCCIC consisted of Akira, LockBit, and Play ransomware. There was a sharp increase in Akira ransomware attacks, particularly after the LockBit ransomware group’s takedown. Akira ransomware operators are known for their sophisticated attacks, especially against US healthcare organizations. [...]

By |2024-04-05T08:23:19-05:00April 4th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Multiple Vulnerabilities Found in Apple Products

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation in the context of the logged on user. Depending on the privileges associated with the user, an [...]

By |2024-03-06T11:23:32-05:00March 6th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

Catch-IT: Multiple Vulnerabilities Found in Microsoft Products

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new [...]

By |2024-02-14T14:37:09-05:00February 14th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

3 Important Considerations for 2024

With 2024 in full swing, we know budgets have been prepared and are in full-swing implementation.  Hoping you made considerations in security investments for the coming year to better protect your organization from growing threats, we wanted to highlight 3 things for consideration.  If you haven't given these areas [...]

By |2024-01-17T12:25:24-05:00January 17th, 2024|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

The Award for 2023 Most Impersonated Brand Goes to….

Microsoft! Phishing continues to lead the pack when it comes to online threats, with the FBI reporting more than 300,000 attacks last year alone. How are these attacks still so successful, despite better security tools and an increase in security awareness training? This is partially a result of cybercriminals knowing what may prompt [...]

Go to Top