Catch-IT

The Hidden Dangers of Your Aging UPS

The uninterruptible power supply (UPS) offers guaranteed power protection for connected electronics. When power is interrupted or fluctuates outside safe levels, the UPS will instantly provide clean battery backup power and surge protection for plugged-in, sensitive equipment. Warning! We have seen some UPS units older than 6 years fail [...]

SIM Swapping Fraud, What is it and How Can You Protect?

SIM Swapping Fraud is on the Rise.  Here's What You Need to Know. The FBI has warned of criminals increasingly using “SIM swap” scams in which criminals duplicate cellphone SIM cards from unknowing victims and steal their personal information, including their cell phone numbers and bank account details.  These scams rose [...]

Cybersecurity Measures to Protect Against New Critical Threats

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a bulletin warning organizations of recent cyber threats and how to best combat and protect against these intrusions.  These recent attacks include website defacement and destructive malware, resulting in damage to critical infrastructure. What Should You Do? Here are steps [...]

Beware of BadUSB, the latest cyberattack comes via USPS

The FBI recently put out a warning that cybercriminal group FIN7, has started mailing USB drives filled with "BadUSB" malware to various companies.  There are two variations of packages: Those imitating HHS [US Department of Health and Human Services ], often accompanied by letters referencing COVID-19 guidelines and enclosed [...]

Update – Log4j Vulnerability

A joint Cybersecurity Advisory was recently released by Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), the Computer Emergency Response Team New Zealand (CERT NZ), the New Zealand National Cyber [...]

Log4j Vulnerability

By now, you have probably heard about the recent Log4j vulnerability. First, what is Log4j?   Log4j is a framework software developers use to record user activity and the behavior of applications for subsequent review. Distributed free by the nonprofit Apache Software Foundation, Log4j has been downloaded millions of times [...]

Natural Disaster Survival Guide – Winter Storms

Disaster #1 - Extreme Storms Did you know in the Northeast businesses typically lose 1-3 days of work every winter season? These events are unplanned and not budgeted so it’s a company-wide loss in production and profits.  As we head into the storm season, what type of technology plan do you have in place?  Extreme Storms [...]

By |2021-12-01T13:33:18-05:00December 1st, 2021|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Office 365 to Boost Default Protection for all Users

Microsoft is rolling out Built-In Protection to Defender for Office 365, a new feature that would automatically enable recommended settings and policies to make sure all new and existing users get at least a basic level of protection.  Microsoft Defender for Office 365 provides Office 365 enterprise email accounts with [...]

By |2021-11-29T11:57:15-05:00November 24th, 2021|Categories: BMT Announcement, Catch IT, CyberSecurity, News|Tags: , , , , |

Natural Disaster Survival Guide – Flood

Disaster #1 - Flood The severity and length of business disruptions caused by flooding can vary considerably.  Even a relatively small flood can have a very disruptive impact on a business, putting some or all of a business’s technology infrastructure out of commission.  To be prepared for extended or [...]

By |2021-11-18T14:41:38-05:00November 18th, 2021|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Windows 11 Patch Released to Fix Features Failing to Load

A headache for early Windows 11 adopters, Microsoft has fixed several features that were failing to load after an expired certificate was recently discovered.  Some Windows 11 users haven’t been able to open apps like the Snipping Tool, touch keyboard, or emoji panel since a certificate expired on October [...]

By |2021-11-10T12:49:36-05:00November 9th, 2021|Categories: BMT Announcement, Catch IT, CyberSecurity, News|Tags: , , , , |

Google Enforcing Two-Factor Authentication (2FA): What You Need to Know

For years, the BMT team has been touting the importance of implement two-factor authentication (2FA) on accounts.  A simple yet necessary additional layer of security, 2FA utilizes two forms of authentication - Knowledge-based authentication verifies the user’s identity based on “something they know”, such as passwords, security codes, and answers to [...]

By |2021-10-28T12:41:25-05:00October 28th, 2021|Categories: BMT Announcement, Catch IT, CyberSecurity, News|Tags: , , , , |

Your Identity Was Stolen. Now What?

It can happen to anyone.  Last year, $16.9 billion was lost as a result of identity fraud, according to the 2020 Identity Fraud Study from research and advisory firm Javelin. In the first half of 2020 alone, 571,188 identity theft reports were made to the Federal Trade Commission, and people [...]

By |2021-08-19T10:31:18-05:00August 17th, 2021|Categories: BMT Announcement, Catch IT, CyberSecurity, News|Tags: , , , , |
Go to Top