construction/property management

Security Alert – Vulnerability in Google Chrome

Google Chrome’s latest update has a security fix - users are urged to apply when notified Google has released a security update for the Chrome browser on Windows, Mac and Linux to fix a newly discovered zero-day vulnerability that is being exploited actively by cyberattacks.  Successful exploitation of the [...]

Magnitude Earthquake Hits Morris County, NJ. Are You Prepared?

Did you know a magnitude-2.3 earthquake struck parts of northern New Jersey Tuesday evening, according to the U.S. Geological Survey. This recent event, coupled with the incoming storm season serves as a reminder to have a Disaster Recover plan in place.  Developing a plan offers assurance to both employers and their [...]

Still Using an iPhone 5S or 6? Check Out this Update.

On Wednesday, Apple backported security updates to older iPhones, iPads, and iPod touch devices to address a critical security flaw that has been actively exploited in the wild.  If you own the following devices an update is needed:  iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini [...]

Last Pass was Breached, Master Passwords Still Safe

Another BMT Recommendation Proven Safe! As you probably have heard by now, Last Pass, the world's largest password manager was breached last week.  The breach appears to have been of the development servers, facilitated by a compromise of a LastPass developer account.  The breach has been contained and there [...]

Cyber Insurance 101

It seems hardly a day goes by without a new report of a cyberattack.  The average ransom payment shot up 82 percent from 2020 to 2021. By the middle of 2021, the number of ransomware attacks was up more than 150 percent over the entirety of 2020.  These numbers are [...]

Top 3 Phishing Attack Simulators to Defend Your Network

Did you know the median financial impact of a breach over the past year is $21,659, with 95 percent of incidents falling between $826 and $653,587?  Of these attacks 85% involved a human element.  Phishing emails are one of the most popular attack vectors for cybercriminals, with scams becoming [...]

Email Not Working? Reach us via Social!

Two weeks ago we reported an issue Microsoft was having with Outlook.  Emails were unusually slow/delayed.  We wanted to take this opportunity to remind you of other ways to connect with us if email is not the best option.  You can always connect with BMT! Connect With Us Via [...]

Clear Your Cache!

Let's face it, your iPhone is a workhorse.  It wakes you up in the morning, manages your texts, lets you browse through  preferred social media apps and allows you to search up those weird, one-off facts you want to know. But that web browsing adds up over time, which [...]

The Best in Customized Office Security Solutions

BMT Offers Comprehensive Security Solutions to Meet your Everyday Needs From security system design and integration, to cabling and hardware installation, our experienced team protects your business at every location, 24/7.   We plan, design, install, implement, test and service your security system across all your business locations. Our ongoing [...]

The Most Important Tool To Prevent a Breach

The Most Important Security Tool You Should Be Using. Yes, it's FREE*! It's a fact, more than 90% of successful hacks and data breaches start with phishing scams. One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what is known as phishing [...]

Best Cables to Charge Your Phone, Tablet or Laptop

If you are anything like me, you are continually looking for the best cable to charge your device - one that works effectively and still does the job after a month of use.  With a household of multiple gadgets, I find myself purchasing this accessory often - for travel, [...]

Google Issues Urgent Security Fix For Chrome — What To Do Now

Multiple vulnerabilities have been discovered in Google Chrome, as a result Google is urging users to upgrade their browsers.  Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the logged-on user. Depending on the privileges associated with [...]

Go to Top