tech interest

Top 3 Phishing Attack Simulators to Defend Your Network

Did you know the median financial impact of a breach over the past year is $21,659, with 95 percent of incidents falling between $826 and $653,587?  Of these attacks 85% involved a human element.  Phishing emails are one of the most popular attack vectors for cybercriminals, with scams becoming [...]

Email Not Working? Reach us via Social!

Two weeks ago we reported an issue Microsoft was having with Outlook.  Emails were unusually slow/delayed.  We wanted to take this opportunity to remind you of other ways to connect with us if email is not the best option.  You can always connect with BMT! Connect With Us Via [...]

Clear Your Cache!

Let's face it, your iPhone is a workhorse.  It wakes you up in the morning, manages your texts, lets you browse through  preferred social media apps and allows you to search up those weird, one-off facts you want to know. But that web browsing adds up over time, which [...]

The Best in Customized Office Security Solutions

BMT Offers Comprehensive Security Solutions to Meet your Everyday Needs From security system design and integration, to cabling and hardware installation, our experienced team protects your business at every location, 24/7.   We plan, design, install, implement, test and service your security system across all your business locations. Our ongoing [...]

The Most Important Tool To Prevent a Breach

The Most Important Security Tool You Should Be Using. Yes, it's FREE*! It's a fact, more than 90% of successful hacks and data breaches start with phishing scams. One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what is known as phishing [...]

Best Cables to Charge Your Phone, Tablet or Laptop

If you are anything like me, you are continually looking for the best cable to charge your device - one that works effectively and still does the job after a month of use.  With a household of multiple gadgets, I find myself purchasing this accessory often - for travel, [...]

Google Issues Urgent Security Fix For Chrome — What To Do Now

Multiple vulnerabilities have been discovered in Google Chrome, as a result Google is urging users to upgrade their browsers.  Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the logged-on user. Depending on the privileges associated with [...]

No More Echo in Teams Meetings

Ever feel like you are participating in cavernous-like Teams meetings?   Well, echo no more!   Utilizing Artificial Intelligence (AI), Microsoft recently announced enhancements to its Teams platform.  Two of these improvements include Echo Cancellation and De-Reverberation. Echo Cancellation When a user has the microphone too close to their speaker while [...]

Internet Explorer Bytes the Dust (almost)

Microsoft will finally end support for Internet Explorer on multiple Windows versions on Wednesday, June 15, almost 27 years after its launch on August 24, 1995. After finally reaching its end of life, the Internet Explorer desktop application will be disabled. It will be replaced with the new Chromium-based Microsoft [...]

Choosing an Effective Passphrase

Tips for Choosing an Effective Passphrase A passphrase is a password composed of a sentence or combination of words. Choosing something longer and more complex than the average password increases overall security. Be sure to include special characters and numbers in your passphrase. A passphrase should be something that [...]

What Is Cyber Insurance and Why Is It Important?

With the ongoing growth of cyberattacks and ransomware, cyber insurance is becoming a must-have for businesses. As a leading Managed Security Service provider, BMT works with clients to deploy and manage the services that carriers require to provide coverage. What Does Cybersecurity Insurance Cover? Policies cover costs associated with [...]

Microsoft Patch Update – May 2022

Microsoft recently released this month’s patch batch includes fixes for seven “critical” flaws, as well as a zero-day vulnerability that affects all supported versions of Windows.  Of most importance is CVE-2022-26925, an “important” spoofing vulnerability in Windows Local Security Authority (LSA) that may turn into a “critical” one if [...]

Go to Top