Training

SIM Swapping Fraud, What is it and How Can You Protect?

SIM Swapping Fraud is on the Rise.  Here's What You Need to Know. The FBI has warned of criminals increasingly using “SIM swap” scams in which criminals duplicate cellphone SIM cards from unknowing victims and steal their personal information, including their cell phone numbers and bank account details.  These scams rose [...]

Google Account Hacks Drop 50% After 2FA Enrollment

Statistical Proof that 2FA is one of the Most Important Controls an Organization can Implement In October 2021, the Google announced plans to turn on two-factor authentication by default for 150 million Google users who were not currently using the service and to require 2 million YouTube creators to [...]

In Latest Scam Attempt, Hackers Turn to the Phone Lines

The Latest Ransomware Twist Involves Unsuspected Phone Calls No email or text, the latest in scam involves phone calls to unsuspected individuals.  Here is an example: Recently, the Allen Independent School District in Dallas suffered a breach.  Typically, hackers would then reach out to the IT or admin for [...]

How to Use the Phish Alert Button (Video)

Did you know more than 90% of successful hacks and data breaches start with phishing scams? One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are known as phishing attacks.   It is often much easier to trick someone to click on [...]

How to Properly Sign Off Your Computer (Video)

Do you know how to properly sign off your PC?  This important task is often not done correctly.  Learn why it is important to sign off your computer each day, and how to do so properly...in just under 2 minutes! Be sure to check back for future 2-minute tech [...]

Apple Inc. Targeted In $50 Million REvil Ransomware Attack

REvil ransomware has targeted Apple Inc. in a $50 million ransomware attack.  The attack happened just hours before Apple's Spring Loaded event, its first hardware announcement event of the year.  The notorious ransomware gang REvil said they had stolen data and schematics from Apple supplier Quanta Computer about unreleased products and [...]

Vote for Microsoft’s New Default Font

Time to say goodbye to Calibri!  After nearly 15 years, Microsoft is replacing its default font and is sourcing feedback for selecting the new one via Twitter.  The company has commissioned five new custom typefaces to replace Calibri (sadly no Comic Sans) and is asking the public to vote [...]

It’s National Password Day, Let’s Celebrate!

How do you create a password that can't be cracked in 7.5 million years? Which are the most common mistakes while creating passwords?  In honor of National Password Day, we have come up with some useful videos, tips and promos - all to help you keep your online accounts [...]

Announcing BMT’s New Video Series – 2-Minute Tuesday

Welcome to our new video series, 2-Minute Tuesday!  Every Tuesday we will feature a new video clip - this time-saving tip, trick or best practice is designed to keep you learning something new about Microsoft 365 each week. This Tuesday we highlight how to schedule a Microsoft Teams Meeting [...]

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |

BMT’s Cyber Security Awareness Training Program

Today we are pleased to announce the launching of our: Cyber Security Awareness Training Program Cyber Security Ignorance No one wants to be the person that: clicks on a link that encrypts all the data on the company servers until a hefty ransom is paid, wires thousands of dollars to a [...]

By |2018-05-18T09:39:07-05:00August 18th, 2016|Categories: BMT Announcement, CyberSecurity|Tags: , , , |
Go to Top