Security

Catch-IT: Microsoft to Replace Skype for Business with Teams

Microsoft recently announced it will retire Skype for Business Online in two years (July 2021), to be replaced with Microsoft Teams.  Current Skype users will experience no change in service in the two years leading up to retirement. But starting September 1, 2019, Microsoft will onboard any new Office [...]

Catch-IT: Using Internet Explorer? Time to Move On…

Released back in 1995, Internet Explorer (IE) was once the browser standard.  Installed by default on every Windows computer, IE held about 95% of the market share in the early 2000s.  Today, Microsoft is urging users to stop using Internet Explorer as they are no longer supporting new development [...]

Company Size Doesn’t Matter When it Comes to Data Breaches

For most things in life, bigger is better. But when it comes to cyber crime all victims are considered fair game, regardless of size. While it may seem larger companies would be targeted due to deep pockets, hackers count on the fact that smaller organizations are probably not making [...]

By |2020-12-28T12:51:07-05:00May 23rd, 2019|Categories: News|Tags: , , , , , , |

BMT Webinar – Preparing for Microsoft Windows 7 End-of-Life

There are 8 months to go before Windows 7 becomes end of support (January 14, 2020). Noticing a number of our clients are still using Windows 7, we created this webinar to begin aiding users in the migration process. We know the process of converting computers is not something [...]

By |2020-12-28T12:47:24-05:00May 13th, 2019|Categories: Events|Tags: , , , , , , |

BMT Named a Top Cybersecurity Firm in New Jersey for 3rd Year in a Row

We are excited to announce Business Machine Technologies, Inc. (BMT) has once again been named one of the top Cybersecurity Firms in New Jersey.  Ranked #3, this recognition marks the third consecutive year BMT has placed in the Top 3 of NJBIZ’s list of Top Cybersecurity Firms in New [...]

By |2020-12-28T12:43:42-05:00May 8th, 2019|Categories: Awards, BMT Announcement, News|Tags: , , , , , , , |

Dark Web Monitoring – Is It Worth It?

The name alone sounds pretty impressive.  A recent service offered by security companies to scan the dark web for your personal information. Since the dark web is a place where lots of cybercriminals conduct business, it makes sense to monitor this, right? First, what is the dark web? Most of [...]

By |2020-12-28T12:13:02-05:00March 25th, 2019|Categories: Advisory, News|Tags: |

Recent Security Flaws Detected in Computer Chips

THREAT: Two security flaws have been discovered that affect nearly all microprocessors, the digital brains of the world’s computers. Dubbed Meltdown and Spectre, these major security flaws found in microprocessors are causing havoc amongst tech giants.  Up against the clock, experts are working to create patches to fix this problem [...]

By |2018-01-11T16:44:34-05:00January 11th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

Celebrate World Backup Day!

March 31, 2017 marks the sixth anniversary of World Backup Day.  Six years of generating awareness about the importance of protection from data loss and doing data backup.  Don’t be an April Fool – be sure to back up your data this Friday! Leading Causes of Data Loss Hardware Malfunctions [...]

By |2018-01-02T12:38:54-05:00March 29th, 2017|Categories: News|Tags: , , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |
Go to Top