CyberSecurity

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

3 Important Considerations for 2024

With 2024 in full swing, we know budgets have been prepared and are in full-swing implementation.  Hoping you made considerations in security investments for the coming year to better protect your organization from growing threats, we wanted to highlight 3 things for consideration.  If you haven't given these areas [...]

By |2024-01-17T12:25:24-05:00January 17th, 2024|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger

A new phishing attack is leveraging Facebook Messenger to propagate messages with malicious attachments from a "swarm of fake and hijacked personal accounts" with the ultimate goal of taking over the targets' accounts. "Originating yet again from a Vietnamese-based group, this campaign uses a tiny compressed file attachment that [...]

By |2023-09-12T07:35:24-05:00September 11th, 2023|Categories: BMT Announcement, CyberSecurity|

It’s Password Day! Our Tech Leaders List Best Practices for Secure Accounts

Not yet Cinco de Mayo, today we celebrate an equally festive day (in techie minds) - World Password Day!! Celebrated the first Thursday of May, Password Day was created to raise awareness about the importance of password security, the most prominent threats, and best practices for users to follow. [...]

By |2023-05-04T11:50:50-05:00May 4th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

Phishing Email Refresher – Know What to Look For!

Phishing emails continue to grow in volume and sophistication.  Hackers are doing due diligence and making emails more personalized, thus easier to fall for.  In addition, the availability of AI tools allows for generation of beautifully written, well-structured emails on just about any subject.  Foreign hackers can even write [...]

By |2023-04-27T12:26:45-05:00April 27th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

New Tool Prevents Company Secrets from Being Fed to ChatGPT

The surge in using artificial intelligence tools like ChatGPT has already resulted in workers leaking sensitive company data to bots, but a new technology aims to protect company data. In fact, it's already happening. Samsung recently experienced a series of leaks after employees purportedly pasted source code into the new bot, [...]

By |2023-04-26T11:59:03-05:00April 26th, 2023|Categories: CyberSecurity, News|Tags: , , , , , , |

Free Cybersecurity Tool You Need To Be Using

Cybersecurity Professionals use this Tool Every Day. Have You Tried It? Have I Been Pwned Created by award-winning cybersecurity thought leader and teacher Troy Hunt, Have I Been Pwned is a website where you enter your email address to check if your address has been revealed in a data breach. [...]

Tired of Being Tracked Online? Simple Steps to Opt Yourself Out!

Tired of Being Tracked Online? Get Your Privacy Back With These Simple Tools! It seems nowadays information is readily available anywhere online.  A simple Google search will likely provide your name, address, phone number, birth date and more.  This information is not only available for all to see, it [...]

Protection on a Minimal Budget? We’ve Got You Covered With These 3 Security Tools!

Protection on a Minimal Budget? We've Got You Covered With These 3 Security Tools! So much news continues to be revolved about breaches. As overwhelming as it may seem, there are simple, low cost tools available to protect yourself from everyday attacks. We've identified 3 cost-effective things you can easily [...]

2023 IT Investments – Where to Prioritize?

Not surprisingly, cybersecurity tops the list as a priority for 2023.  According to Red Hat's 2023 Tech Outlook report, the need for cybersecurity investments was cited as a priority across a variety of technology categories including cloud infrastructure, big data and analytics, and automation.  Network security and cloud security were [...]

Your New Years Resolution – Develop a Company Incident Response Plan

This Pops Up On Your Computer Screen.  What Do You Do Next? As the world of cybersecurity continues to evolve, it is no longer an option to not have a plan in place to deal with a crisis situation.   For many companies, one isolated incident (similar to above) can [...]

Internet Explorer Bytes the Dust (almost)

Microsoft will finally end support for Internet Explorer on multiple Windows versions on Wednesday, June 15, almost 27 years after its launch on August 24, 1995. After finally reaching its end of life, the Internet Explorer desktop application will be disabled. It will be replaced with the new Chromium-based Microsoft [...]

Go to Top