What’s New

Celebrate World Backup Day!

March 31, 2017 marks the sixth anniversary of World Backup Day.  Six years of generating awareness about the importance of protection from data loss and doing data backup.  Don’t be an April Fool – be sure to back up your data this Friday! Leading Causes of Data Loss Hardware Malfunctions [...]

By |2018-01-02T12:38:54-05:00March 29th, 2017|Categories: News|Tags: , , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Major Security Flaws Discovered in Western Digital’s My Cloud NAS Drives

Western Digital (WD) Corporation network-attached storage owners were warned of critical flaws in the company’s My Cloud line of hardware that exposed data stored on the devices to attack. The flaws impact a dozen Western Digital drives that could allow remote adversaries to bypass logins, insert commands, upload files without permission, and gain control [...]

By |2018-01-02T12:45:59-05:00March 13th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , |

Beware of “The “HoeflerText” font wasn’t found” scam

Hackers have crafted a new Google Chrome scam that could infect your computer with malware. A popup, which contains the message “The ‘HoeflerText’ font wasn’t found,” urges users to download an updated “Chrome Font Pack” to their computers. The update, however, is actually a malware download. How You Can Avoid [...]

By |2018-01-02T12:57:52-05:00February 27th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Top 5 Reasons Why Your Business Should Adopt a BYOD Policy

Bring your own device (BYOD) is an organizational arrangement that permits workers to utilize their own cell phones, tablets, and portable PCs in the work environment. Traditionally, company-owned devices are provided to employees, but a growing number of businesses are opting for a BYOD policy for a variety of reasons. [...]

By |2018-05-16T15:06:20-05:00February 22nd, 2017|Categories: News|Tags: |

Solid State Drives – Longevity tips

While they can make an old SATA based system run faster than it did when newly purchased, the Achilles heal of Solid State Drives (SSDs) is the amount of data that can be written to them. While late model SSDs will last hundreds if not thousands of years there are still [...]

By |2019-07-31T12:41:45-05:00February 22nd, 2017|Categories: News|Tags: , |

BMT Joins Mahwah Regional Chamber of Commerce

BMT is pleased to announce they have joined the Mahwah Regional Chamber of Commerce (MRCC). A recognized voice in the community, the Chamber’s mission consists of advancing the general welfare and prosperity of the greater Mahwah region so that its citizens and its business community may prosper. The BMT team [...]

By |2018-05-16T15:21:28-05:00February 20th, 2017|Categories: BMT Announcement|

Small Businesses, Contact Your Bank. Fraudulent Money Transfers Are On The Rise.

Cyber thieves steal hundreds of millions of dollars a year from the bank accounts of U.S. businesses.  Hijacking business email accounts, cyber criminals will often impersonate company CEOs/CFOs and send bogus emails that lead to fraudulent withdraws from business accounts.  Often dubbed “whale phishing”, this practice is on the rise [...]

By |2018-05-16T15:23:25-05:00February 3rd, 2017|Categories: Advisory, Catch IT|

BMT becomes a Citrix ShareFile Partner

Business Machine Technologies, Inc. is excited to announce we have recently become part of the Citrix ShareFile partner network.  This endeavor allows us to offer our clients an affordable solution to securely store and share data. ShareFile offers a number of security features to comply with the needs of [...]

By |2020-11-12T10:34:12-05:00February 1st, 2017|Categories: BMT Announcement, Partner|

Netgear Routers have critical flaw

Threat: Several Netgear routers are vulnerable to remote hacking. Real World Scenarios: A hacker can take over your router and use it for other nefarious purposes. While compromised the router would most likely perform poorly affecting your Internet Access. Mitigation: Here's what you can do - Check for updates for your router [...]

By |2018-05-16T15:28:32-05:00December 14th, 2016|Categories: Catch IT, CyberSecurity|
Go to Top