util-adm-bmt

About BMT Admin

This author has not yet filled in any details.
So far BMT Admin has created 25 blog entries.

We Are RingCentral Partners!

BMT is proud to announce we are a RingCentral Partner. We've been using the service ourselves for the past several years and it has been a key element in our work from home efforts throughout the Covid-19 Pandemic. For more info on how RingCentral can help your business operate [...]

By |2020-12-28T14:43:21-05:00June 12th, 2020|Categories: BMT Announcement, Partner|

Computer Systems Validation Professional – Contract Postion

Our client, a global Health, Hygiene and Home company is looking for a Computer Systems Validation Professional to work with a recently placed Project Manager. This person will be responsible to ensure all CSV related requirements are captured and activities completed for the go live. Position Responsibilities: Candidate will be required [...]

By |2020-12-28T11:08:07-05:00November 28th, 2018|Categories: HR|

The Passphrase – An Upgrade to your Current Password

It's time to upgrade your password.  Consider the following password Do's and Don'ts and the challenges they present. Let's start with the Don'ts: Password Don’ts Use your login name (ssmith) Use a sequence or repeated characters (“123456” or “abc123”) Reuse for different accounts Share. A secret is no longer [...]

By |2020-12-28T11:06:39-05:00November 20th, 2018|Categories: Advisory, CyberSecurity|

Web Based Software Developer – Contract Position

Our client a national trucking company is looking for a Web based software developer Focus on Microsoft .Net 4.5 technologies including AJAX, JQuery, MVC 4.0, ASP.Net, C#, WCF, Windows Azure, LINQ, ADO.Net entities, SQL2008. Specialties: Web Application front end development. Azure Application Development. Client Systems: Below are just some [...]

By |2019-07-31T11:26:45-05:00September 4th, 2018|Categories: BMT Announcement, HR|

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

The Passphrase – An Upgrade to your Current Password

It's time to upgrade your password.  Consider the following password Do's and Don'ts and the challenges they present. Let's start with the Don'ts: Password Don’ts Use your login name (ssmith) Use a sequence or repeated characters (“123456” or “abc123”) Reuse for different accounts Share. A secret is no longer a [...]

By |2018-01-02T11:41:02-05:00September 19th, 2017|Categories: BMT Announcement|

Look out Phishing, here comes Smishing!

Look out Phishing, here comes Smishing! There’s a new scam in town!  Although the name may sound funny, becoming a victim is not joke.  “Smishing” is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or phone number in an attempt to [...]

By |2018-01-02T11:43:14-05:00July 19th, 2017|Categories: Catch IT, CyberSecurity|

NotYourAverageITCompany

Threats are moving so fast it's hard to keep up Petya/NotPetya? On June 27, there was news of a cyber attack affecting the Ukraine. It was thought to be a worm known as Petya spreading ransomware. 24-hours later it was reclassified as NotPetya because, you guessed it,  it was [...]

RansomWare sweeping Europe

For people using the following versions of Windows, make sure you have the following patches installed on your machine: Windows Vista and Windows Server 2008 - KB4012598 Windows 7 and Windows Server 2008 R2 - KB4012212 OR KB4012215 Windows Server 2012 - KB4012214 OR KB4012217 Windows 8.1 and Windows Server [...]

By |2018-01-02T11:53:19-05:00May 12th, 2017|Categories: Catch IT, CyberSecurity|

Critical Intel Chip Vulnerability

Threat: Critical Intel Chip Vulnerability from manufactures including: HP, Lenovo, Fujitsu, Dell, & Intel, allow hackers to remotely control the computer. Even if the PC is switched off! Real World Scenarios: A hacker can remotely: capture the keystrokes of your PC thereby stealing usernames and passwords. corrupt the BIOS making [...]

By |2018-01-02T12:31:06-05:00May 11th, 2017|Categories: Catch IT, CyberSecurity|

Solid State Drives – Longevity tips

While they can make an old SATA based system run faster than it did when newly purchased, the Achilles heal of Solid State Drives (SSDs) is the amount of data that can be written to them. While late model SSDs will last hundreds if not thousands of years there are still [...]

By |2019-07-31T12:41:45-05:00February 22nd, 2017|Categories: News|Tags: , |

Small Businesses, Contact Your Bank. Fraudulent Money Transfers Are On The Rise.

Cyber thieves steal hundreds of millions of dollars a year from the bank accounts of U.S. businesses.  Hijacking business email accounts, cyber criminals will often impersonate company CEOs/CFOs and send bogus emails that lead to fraudulent withdraws from business accounts.  Often dubbed “whale phishing”, this practice is on the rise [...]

By |2018-05-16T15:23:25-05:00February 3rd, 2017|Categories: Advisory, Catch IT|
Go to Top