Professional Services

Microsoft Copilot for Teams – Top 3 Features

Using Copilot for Teams Preparing for Teams meetings can be time-consuming. It’s easy to spend hours digging through chats to find information, following the thread of complex conversations, and getting up to speed on meetings. Now, Copilot has changed all that. With just a few clever prompts, it can [...]

2024 NJBIZ Reader Rankings – Nominate BMT

Help us continue our reign as NJ's Top Cybersecurity Company!  Nominations have officially opened for the 2024 NJBIZ Reader Rankings, and Business Machine Technologies needs your help.  In the past we have had the honor of being part of this list, and we are hoping to make it this [...]

New Chrome Threat: Make Sure Your Browser is Up to Date

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel. The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the [...]

By |2024-05-10T13:01:08-05:00May 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Patches Issued for Microsoft Products

April’s Patch Tuesday was a record-breaker for Microsoft, with the software giant releasing patches for 147 vulnerabilities — more than researchers can recall ever seeing previously in a single month.  This month’s list initially appeared to contain no zero-day vulnerabilities, but researchers were quick to correct this — pointing [...]

By |2024-04-10T11:28:37-05:00April 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Top Ransomware Trends – Q1 2024

For the first quarter of 2024, ransomware incidents reported to the NJCCIC consisted of Akira, LockBit, and Play ransomware. There was a sharp increase in Akira ransomware attacks, particularly after the LockBit ransomware group’s takedown. Akira ransomware operators are known for their sophisticated attacks, especially against US healthcare organizations. [...]

By |2024-04-05T08:23:19-05:00April 4th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Catch-IT: Multiple Vulnerabilities Found in Apple Products

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation in the context of the logged on user. Depending on the privileges associated with the user, an [...]

By |2024-03-06T11:23:32-05:00March 6th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

Catch-IT: Multiple Vulnerabilities Found in Microsoft Products

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new [...]

By |2024-02-14T14:37:09-05:00February 14th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

The Award for 2023 Most Impersonated Brand Goes to….

Microsoft! Phishing continues to lead the pack when it comes to online threats, with the FBI reporting more than 300,000 attacks last year alone. How are these attacks still so successful, despite better security tools and an increase in security awareness training? This is partially a result of cybercriminals knowing what may prompt [...]

Beware of the ‘Say Yes’ phone scam

What is the 'Say Yes' phone scam? The "Say Yes" phone scam is a type of fraud where a person receives a call from an unknown number. If they answer it, the robocaller on the other end of the line will ask a question that prompts the victim to say "yes." [...]

10 Signs Your Computer Has a Virus

Like the real thing, computer viruses replicate themselves, spreading through your operating system and network. At the same time, the virus is wreaking havoc: it can damage programs, delete files, and make devastating changes to your hard drive, all of which can result in reduced performance. Some viruses will even crash [...]

Free Tools for Cybersecurity Awareness Month

October is a great month for many reasons, but at BMT we especially like this time of the year as it celebrates something that should be an important part of any business culture, cybersecurity awareness.  While usually an afterthought until it happens, cyberattacks are increasing at a significant pace.  [...]

Go to Top