Manufacturing

Smart Security Habits – Physical Safeguards

With digital hacking incidents on the rise, many IT professionals have lost focus on the tried-and-true method of attacking physical security.  Criminals know security professionals put most of their eggs in the cyber basket and will often resort to the old-fashioned break-and-enter attack from inside.  Recently, a flaw was [...]

Smart Workstation Security Habits – End of Day

Now more than ever, adopting everyday practices to secure your workstation should be a priority.  One of the questions we frequently get asked is, what should I be doing with my workstation at the end of the day? What Should You Do? We highly recommend users sign out of [...]

Creating a Business Continuity Plan

Do you have a plan if your IT equipment is running, but physical access to the office is not possible? In the event employees must work from home (weather events, sick days, emergencies, etc.), it’s important to have resources in place to ensure business is not interrupted. Here are [...]

Windows 2008 Update, Reboot Issue

Windows Server 2008 servers will no longer boot if prerequisites aren't installed before applying the out-of-band KB4539602 update released by Microsoft on February 7 to patch a wallpaper bug. After being deployed on machines running Windows Server 2008 or Windows Server 2008 R2, the boot file will be deleted and the [...]

Protect Your Organization with Enhanced Security Services

Did You Know? BMT is offering clients enhanced security solutions through Perch Security Services. This added protection will automate IT security, offering the following enhancements: Real-time threat detection Threat intelligence centralization, automation and log file management First-tier threat analysis with 24x7 escalation to IT support staff Access to view [...]

New Microsoft Vulnerability Announced, Reprieve for Windows 7 Users

Time to patch those systems!  A vulnerability has been discovered in the Microsoft Cryptographic library CRYPT32.DLL, a Windows component that deals with security certificates and cryptographic messaging functions. Successful exploitation of this vulnerability could allow for attackers to compromise trusted network connections using spoofed certificates. This can be used [...]

The End is Near for Windows 7, but Extended Help is Available!

On January 14, 2020, Windows 7 will reach end-of-life.  This means Microsoft will not longer provide free support and security updates for users. If you are not yet ready to leave Windows 7, a solution exists.  Beginning December 1, 2019, small and midsize businesses (SMBs) will be able to [...]

URGENT! Using an iPhone 5? Update by Sunday or Lose Access to the Internet

Starting just before 12:00 a.m. UTC (8:00PM EST) on November 3, 2019, iPhone 5 will require an iOS update to maintain accurate GPS location and to continue to use functions that rely on correct date and time including App Store, iCloud, email, and web browsing. What Should You Do? [...]

Happy National Cybersecurity Awareness Month!

October is National Cybersecurity Awareness Month. As a leader in the IT security space, we feel this is a great time to reinforce the importance of taking proactive steps to stay secure at home and in the workplace. To commemorate, we will be providing a number of educational resources [...]

BMT Nominated for Best Cybersecurity Firm in NJ – 2019 NJBIZ Reader Rankings

Voting has officially opened for the 2019 NJBIZ Reader Rankings Survey, and Business Machine Technologies has once again been nominated for Best Cybersecurity Company.  As we hope to top the list this year, please support team BMT by voting for us!  You can access the survey here: 2019 NJBIZ [...]

By |2020-12-28T13:30:24-05:00September 9th, 2019|Categories: Awards, BMT Announcement, News|Tags: , , , , , |

Windows 10 Hidden Tips and Tricks

Using Windows 10? Check Out these Great Features! Windows 10 has some fun tools to help make life a little easier. Some are a bit older and others relatively new, all are designed to save time and reduce everyday headaches. Let's take a look at the 10 cool tools [...]

NotYourAverageITCompany

Threats are moving so fast it's hard to keep up Petya/NotPetya? On June 27, there was news of a cyber attack affecting the Ukraine. It was thought to be a worm known as Petya spreading ransomware. 24-hours later it was reclassified as NotPetya because, you guessed it,  it was [...]

Go to Top