About Sue Juter

As Marketing Specialist at BMT, I am involved in the day-to-day marketing and sales support efforts. Excited to be part of team that is dedicated to providing exceptional technology solutions.

Senator Chides FBI for Weak Advice on Mobile Security

Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile devices, after a contacts list stolen from the personal phone of the White House Chief of Staff Susie Wiles was reportedly used to fuel a series of text messages and [...]

By |2025-07-08T02:07:41-05:00June 30th, 2025|Categories: BMT Announcement|

The Leader in Data Security Brings You the Best in Office Security

Did You Know...BMT has added office security systems to our portfolio of services. Your leader in data and information protection now delivers best-in-class physical security and monitoring for your small business. Let us protect your business from every angle. Comprehensive Security Solutions = Physical + Data Protection BMT delivers [...]

Catch-IT: Time to Ditch Passwords

“The password era is ending,” Microsoft warns, as it moves quickly to push a billion-plus users to make changes before it’s too late. It’s not alone. Google is also telling its users to move away from passwords, with most accounts now at risk. This should come as no surprise. CNET has just [...]

Cloud Computing and Business Scalability

Few innovations have had a more significant impact on how companies operate, grow, and adapt than cloud computing. Once a cutting-edge luxury, cloud scalability is now a must-have for any company trying to remain competitive. What Is Cloud Computing Scalability? At its core, cloud computing scalability means your cloud [...]

Inside a Dark Adtech Empire Fed by Fake CAPTCHAs

Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad [...]

By |2025-06-26T02:08:20-05:00June 12th, 2025|Categories: BMT Announcement|

Patch Tuesday, June 2025 Edition

Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public. The sole [...]

By |2025-06-26T02:08:23-05:00June 10th, 2025|Categories: BMT Announcement|

Beware of AI-Powered Phishing Scams

New research from cybersecurity firm Cofense serves as a serious wake-up call for businesses: AI-powered phishing attacks are not only becoming more frequent, but they’re also far more convincing and effective than ever before. These aren’t the typical scam emails riddled with obvious red flags, [...]

The Importance of Cybersecurity Training for Staff

Multiple surveys in recent times have revealed a sobering conclusion: Many business owners think cybersecurity is their IT department’s concern, not theirs. What about you? Do you view cybersecurity awareness as a company-wide responsibility or not? In reality, secure operations require a collective effort. Everyone must be alert to [...]

Proxy Services Feast on Ukraine’s IP Address Exodus

Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of shadowy proxy and [...]

By |2025-06-26T02:08:28-05:00June 5th, 2025|Categories: BMT Announcement|

Catch-IT: Multiple Vulnerabilities Found in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome, the most severe, CVE-2025-5419,of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges [...]

Understanding Zero-Day Vulnerabilities

Procuring new software, applications, or devices for your business is always exciting. You and your team will be rearing to take advantage of all those features. Still, you have to know that they’re secure. Is there a chance your new installation contains a hidden flaw [...]

Ransomware Hackers Exploit Windows Flaw

Are your systems prepared to handle the latest cybersecurity threats? A new Windows flaw has given criminals a powerful opening to target establishments, and such attacks can disrupt everything from daily operations to customer trust. Learn more about it here. The Damage Dealt [...]

Go to Top