CyberSecurity

Business Machine Technologies Named Top Cybersecurity Firm in New Jersey by NJBIZ Readers

Business Machine Technologies, Inc. (BMT) continues to be recognized as one of the top cybersecurity firms in New Jersey.  Recently, we were named as the #2 Cybersecurity Company in New Jersey by NJBIZ’s 2017 Reader Rankings. BMT understands the increasing threats associated with cybercrime and has made significant investments [...]

By |2019-07-31T13:22:10-05:00September 25th, 2017|Categories: Awards, BMT Announcement, News|Tags: , , |

BMT Webinar – Better Password Practices: Your Guide to Improving Online Security

Passwords are becoming an increasingly bigger challenge for individuals and companies. As majority of hacking-related breaches leveraged either stolen and/or weak passwords, how can you better protect yourself? Join the BMT Webinar on October 4 at 12:30PM for a free, non-technical webinar that provides simple techniques and tools you can [...]

By |2018-01-02T11:39:22-05:00September 25th, 2017|Categories: BMT Announcement, Events|Tags: , , |

NotYourAverageITCompany

Threats are moving so fast it's hard to keep up Petya/NotPetya? On June 27, there was news of a cyber attack affecting the Ukraine. It was thought to be a worm known as Petya spreading ransomware. 24-hours later it was reclassified as NotPetya because, you guessed it,  it was [...]

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Killer USB’s!

Don’t Plug in that strange flash drive! Worse than containing Malware it may be wired to destroy your device We’ve warned about plugging in USB flash drives, from unknown sources, to your devices in before. This is because of the Malware they may contain. But there are also USB drives out [...]

By |2018-11-20T14:11:35-05:00October 31st, 2016|Categories: Catch IT|Tags: , |

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |

BMT’s Cyber Security Awareness Training Program

Today we are pleased to announce the launching of our: Cyber Security Awareness Training Program Cyber Security Ignorance No one wants to be the person that: clicks on a link that encrypts all the data on the company servers until a hefty ransom is paid, wires thousands of dollars to a [...]

By |2018-05-18T09:39:07-05:00August 18th, 2016|Categories: BMT Announcement, CyberSecurity|Tags: , , , |

Fingerprint Biometric Security Hacked

Threat: Researchers at Michigan State University have developed a method to print scans of lifted fingerprints using a common inkjet printer.  Anyone in possession of this print can unlock the associated device. While the ink and paper must be of a special type (AgIC) they are readily available from online retailers, as are latent fingerprint kits. Risk: Fingerprint biometric security [...]

By |2018-05-18T09:59:25-05:00March 10th, 2016|Categories: CyberSecurity, News|Tags: |
Go to Top