What’s New

BMT Recognized on CRN’s 2022 MSP 500 List

Business Machine Technologies, Inc. (BMT), NJ's leading managed services provider, announced today that CRN®, a brand of The Channel Company, has named BMT to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2022. CRN's annual MSP 500 list identifies the leading service providers inNorth America whose [...]

SIM Swapping Fraud, What is it and How Can You Protect?

SIM Swapping Fraud is on the Rise.  Here's What You Need to Know. The FBI has warned of criminals increasingly using “SIM swap” scams in which criminals duplicate cellphone SIM cards from unknowing victims and steal their personal information, including their cell phone numbers and bank account details.  These scams rose [...]

Google Account Hacks Drop 50% After 2FA Enrollment

Statistical Proof that 2FA is one of the Most Important Controls an Organization can Implement In October 2021, the Google announced plans to turn on two-factor authentication by default for 150 million Google users who were not currently using the service and to require 2 million YouTube creators to [...]

In Latest Scam Attempt, Hackers Turn to the Phone Lines

The Latest Ransomware Twist Involves Unsuspected Phone Calls No email or text, the latest in scam involves phone calls to unsuspected individuals.  Here is an example: Recently, the Allen Independent School District in Dallas suffered a breach.  Typically, hackers would then reach out to the IT or admin for [...]

Cybersecurity Measures to Protect Against New Critical Threats

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin warning organizations of recent cyber threats and how to best combat and protect against these intrusions.  These recent attacks include website defacement and destructive malware, resulting in damage to critical infrastructure. What Should You Do? Here are steps [...]

How to Use the Phish Alert Button (Video)

Did you know more than 90% of successful hacks and data breaches start with phishing scams? One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what are known as phishing attacks.   It is often much easier to trick someone to click on [...]

BMT Celebrates 30 Years of IT Excellence

Business Machine Technologies, Inc. (BMT) is excited to celebrate its 30th Anniversary this year!   Over the past three decades, BMT evolved from a 6-person computer & printer repair company to a leading IT Services provider, offering a range of technology solutions for small to medium-sized businesses throughout the tri-state [...]

Microsoft’s New Commerce Experience and What it Means to You

Microsoft’s New Commerce Experience (NCE) subscription model will be implemented in March 2022. This new model brings a price increase to commercial and business users of Microsoft’s software as a service (SaaS) offerings. Beginning in March, new orders will have to go through the new pricing model (below), and [...]

Beware of BadUSB, the latest cyberattack comes via USPS

The FBI recently put out a warning that cybercriminal group FIN7, has started mailing USB drives filled with "BadUSB" malware to various companies.  There are two variations of packages: Those imitating HHS [US Department of Health and Human Services ], often accompanied by letters referencing COVID-19 guidelines and enclosed [...]

12 Days of What to Look For – Day 12, Don’t Share Your Social Security Number

We close out our holiday campaign with this final tip (#12) for you...Don't Share Your Social Security Number! Your Social Security number (SSN) is a high-value target for ID theft.  Stolen SSNs make it easy for criminals to open new lines of credit and accounts, file fraudulent tax returns, [...]

12 Days of What to Look For – Day 11, Update Your Software

Counting down to Tip #11...Update Your Software! We know it's easy to skip software updates because they can take up a few minutes of our time, and may not seem that important. But this is a mistake that keeps the door open for hackers to access your private information, [...]

Go to Top