construction

Time to Update! Zero-Day Exploit Found Affecting Chrome and Edge Browsers

Using Google Chrome or Microsoft Edge?  Time to Update Your Browser Google announced that a zero-day exploit has been found in Google Chrome that could allow hackers to perform malicious activities on your computer. In addition, Microsoft announced Edge has also been affected. Zero-day exploits are particularly worrisome because [...]

BMT Recognized on CRN’s 2022 MSP 500 List

Business Machine Technologies, Inc. (BMT), NJ's leading managed services provider, announced today that CRN®, a brand of The Channel Company, has named BMT to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2022. CRN's annual MSP 500 list identifies the leading service providers inNorth America whose [...]

SIM Swapping Fraud, What is it and How Can You Protect?

SIM Swapping Fraud is on the Rise.  Here's What You Need to Know. The FBI has warned of criminals increasingly using “SIM swap” scams in which criminals duplicate cellphone SIM cards from unknowing victims and steal their personal information, including their cell phone numbers and bank account details.  These scams rose [...]

Google Account Hacks Drop 50% After 2FA Enrollment

Statistical Proof that 2FA is one of the Most Important Controls an Organization can Implement In October 2021, the Google announced plans to turn on two-factor authentication by default for 150 million Google users who were not currently using the service and to require 2 million YouTube creators to [...]

In Latest Scam Attempt, Hackers Turn to the Phone Lines

The Latest Ransomware Twist Involves Unsuspected Phone Calls No email or text, the latest in scam involves phone calls to unsuspected individuals.  Here is an example: Recently, the Allen Independent School District in Dallas suffered a breach.  Typically, hackers would then reach out to the IT or admin for [...]

How to Use the Phish Alert Button (Video)

Did you know more than 90% of successful hacks and data breaches start with phishing scams? One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are known as phishing attacks.   It is often much easier to trick someone to click on [...]

Cybersecurity Awareness Month 2021 – Week 4

The final week of Cybersecurity Awareness Month emphasizes that security should be a priority and not an afterthought, and we look at how the actions we take today can affect the future of personal, consumer, and business cybersecurity. Cybersecurity is increasingly integral for securely working, learning, and playing. We'll [...]

Cybersecurity Awareness Month 2021 – Week 3

We continue on with National Cybersecurity Awareness Month! This week (10/18-10/22) we focus on what's new in the world of online security. Please review our videos and free resources to learn the latest in how to protect your online assets. Protect yourself and stay safe! Week 3 Video - [...]

Cybersecurity Awareness Month 2021 – Week 2

We continue on with National Cybersecurity Awareness Month! This week (10/11-10/15) we direct our attention to the growing world of phishing. Please review our video and free resources to learn how to better detect and report phishing attempts. Week 2 Video - Easily Detect and Report Phishing Attempts 90% [...]

Cybersecurity Awareness Month 2021 – Week 1

Cybersecurity Awareness Month - Simple, Everyday Things You Can Do To Keep Secure We are kicking off National Cybersecurity Awareness Month! This week (10/4-10/8) we focus on simple things you can do to improve your security posture. (Password Manager and 2FA). Please review the video and free resources below to [...]

How to Properly Sign Off Your Computer (Video)

Do you know how to properly sign off your PC?  This important task is often not done correctly.  Learn why it is important to sign off your computer each day, and how to do so properly...in just under 2 minutes! Be sure to check back for future 2-minute tech [...]

Scammers Impersonating Construction Companies in Business Email Compromise (BEC) Attacks

The Federal Bureau of Investigation has recently warned that scammers are now posing as construction companies in business email compromise (BEC) attacks.    BEC scammers use various tactics (including social engineering and phishing) to compromise or impersonate business email accounts with the end goal of redirecting pending or future payments to bank [...]

Go to Top