construction

Windows 10 End of Life Series

Are you one of the 62+% still using Windows 10? This is for you! Microsoft has set October 14, 2025, as the official End of Life (EOL) date for Windows 10.  After this date, security updates will no longer be provided, and Microsoft will cease technical support for the operating [...]

Catch-IT: Facebook Business Users Beware, Thousands Hit by New Phishing Scam

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices. The phishing emails have targeted more than 12,000 email addresses at hundreds of companies. Nearly all of the emails targeted individuals in the US, the EU, and Australia, though the researchers also [...]

Catch-IT: Beware of Uptick in Phishing Tactics

Vishing, Whaling, SMiShing...what do these things have in common?  Although seemingly tied to nautical terms, they are all common phishing tactics.  Phishing is a type of social engineering attack that uses email, phone, social media, and other means of personal communication to trick people into providing sensitive information.  So, what [...]

BMT Named to CRN’s MSP 500 List for 2025

BMT is excited to announce that CRN®, a brand of The Channel Company, has recognized BMT on its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2025.  This marks the seventh time BMT has topped the CRN MSP 500 list. CRN’s annual MSP 500 list is [...]

Catch-IT: Multiple Vulnerabilities in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could [...]

Catch-IT: Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a [...]

FAQ – New Jersey Data Protection Act, Effective January 15, 2025

The New Jersey Data Protection Act (NJDPA), N.J. Stat. § 56:8-166.4 et seq., went into effect on January 15, 2025, as New Jersey joins eighteen other states with comprehensive data privacy laws.  Here’s what you need to know to stay compliant and maintain consumer trust. Who Is Affected? This law [...]

Meet the BMT IT Support Team!

It’s Our Incredible People Who Make a Difference in your IT Support! The BMT Support Team is comprised of industry experts who are passionate about their work, have an extensive background in a wide variety of applications, and are dedicated to helping you.  We know how frustrating it is [...]

Catch-IT: Ransomware on the Rise

 Ransomware Continues to Gain Momentum Ransomware continues to dominate the threat landscape, posing significant risks to organizations. The NJCCIC continues to receive reports of ransomware incidents impacting New Jersey private and public sector organizations, including educational institutions and local governments. Fog ransomware and 3AM ransomware are two significant variants [...]

Safety Tips for Online Holiday Shoppers!

 Tis the Season for Holiday Scammers!  3 Useful Tips When Shopping Online Holiday shopping is in full swing! We wanted to let you know about a few online shopping trends we've noticed and give some tips about how to stay safe online while buying gifts for everyone on your list!  [...]

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Go to Top