News

Favorite Shortcuts for Windows 10

We've Compiled our Top 5 Favorite Shortcuts for Windows 10 Who doesn't like a faster, easier way when it comes to completing everyday computer tasks?! We've come up with 5 of our favorite shortcuts you can utilize when you are using Windows 10.  These simple tips are sure to [...]

Mobile Malware Attacks Up 500% in 2022

Scams are on the Rise! In early February, researchers identified a 500% increase in attempted mobile malware attacks affecting Apple and Android smartphones.  Typically, the cybercriminals behind these attacks have a common goal to achieve: stealing confidential information from the users. These include bank account details, email addresses, passwords, [...]

The Hidden Dangers of Your Aging UPS

The uninterruptible power supply (UPS) offers guaranteed power protection for connected electronics. When power is interrupted or fluctuates outside safe levels, the UPS will instantly provide clean battery backup power and surge protection for plugged-in, sensitive equipment. Warning! We have seen some UPS units older than 6 years fail [...]

Stew Smith Named 2022 NJBIZ Digi-Tech Innovators Award Recipient

We are proud to announce that BMT's Stew Smith has been selected as a recipient of this year’s NJBIZ’s Digi-Tech Awards! These awards recognize innovators who have demonstrated excellence in technology and leadership.  This year's list includes trailblazers from a wide swath of industries from real estate to health [...]

Shields Up! Cyberattacks Loom in Russia-Ukraine Crisis

As the Russia-Ukraine conflict escalates, the less visible are Russia’s formidable cyber forces that would be preparing to unleash a new wave of cyber-attacks on Ukrainian and western energy, finance, and communications infrastructure.  While there are not currently any specific credible threats to the U.S. homeland, it’s important to [...]

Time to Update! Zero-Day Exploit Found Affecting Chrome and Edge Browsers

Using Google Chrome or Microsoft Edge?  Time to Update Your Browser Google announced that a zero-day exploit has been found in Google Chrome that could allow hackers to perform malicious activities on your computer. In addition, Microsoft announced Edge has also been affected. Zero-day exploits are particularly worrisome because [...]

BMT Recognized on CRN’s 2022 MSP 500 List

Business Machine Technologies, Inc. (BMT), NJ's leading managed services provider, announced today that CRN®, a brand of The Channel Company, has named BMT to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2022. CRN's annual MSP 500 list identifies the leading service providers inNorth America whose [...]

SIM Swapping Fraud, What is it and How Can You Protect?

SIM Swapping Fraud is on the Rise.  Here's What You Need to Know. The FBI has warned of criminals increasingly using “SIM swap” scams in which criminals duplicate cellphone SIM cards from unknowing victims and steal their personal information, including their cell phone numbers and bank account details.  These scams rose [...]

Google Account Hacks Drop 50% After 2FA Enrollment

Statistical Proof that 2FA is one of the Most Important Controls an Organization can Implement In October 2021, the Google announced plans to turn on two-factor authentication by default for 150 million Google users who were not currently using the service and to require 2 million YouTube creators to [...]

In Latest Scam Attempt, Hackers Turn to the Phone Lines

The Latest Ransomware Twist Involves Unsuspected Phone Calls No email or text, the latest in scam involves phone calls to unsuspected individuals.  Here is an example: Recently, the Allen Independent School District in Dallas suffered a breach.  Typically, hackers would then reach out to the IT or admin for [...]

Cybersecurity Measures to Protect Against New Critical Threats

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin warning organizations of recent cyber threats and how to best combat and protect against these intrusions.  These recent attacks include website defacement and destructive malware, resulting in damage to critical infrastructure. What Should You Do? Here are steps [...]

How to Use the Phish Alert Button (Video)

Did you know more than 90% of successful hacks and data breaches start with phishing scams? One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are known as phishing attacks.   It is often much easier to trick someone to click on [...]

Go to Top