CyberSecurity

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Killer USB’s!

Don’t Plug in that strange flash drive! Worse than containing Malware it may be wired to destroy your device We’ve warned about plugging in USB flash drives, from unknown sources, to your devices in before. This is because of the Malware they may contain. But there are also USB drives out [...]

By |2018-11-20T14:11:35-05:00October 31st, 2016|Categories: Catch IT|Tags: , |

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |

BMT’s Cyber Security Awareness Training Program

Today we are pleased to announce the launching of our: Cyber Security Awareness Training Program Cyber Security Ignorance No one wants to be the person that: clicks on a link that encrypts all the data on the company servers until a hefty ransom is paid, wires thousands of dollars to a [...]

By |2018-05-18T09:39:07-05:00August 18th, 2016|Categories: BMT Announcement, CyberSecurity|Tags: , , , |

Fingerprint Biometric Security Hacked

Threat: Researchers at Michigan State University have developed a method to print scans of lifted fingerprints using a common inkjet printer.  Anyone in possession of this print can unlock the associated device. While the ink and paper must be of a special type (AgIC) they are readily available from online retailers, as are latent fingerprint kits. Risk: Fingerprint biometric security [...]

By |2018-05-18T09:59:25-05:00March 10th, 2016|Categories: CyberSecurity, News|Tags: |
Go to Top