Healthcare

Top 3 Phishing Tools for 2022

Need Protection on a Minimal Budget? We've Identified 3 the Top Phishing Tools You Should Implement Now. Human element continues to drive breaches, with 82% of 2022 attacks involving a human element (2022 Verizon Data Investigations Report).  As phishing continues to be the most common go-to attack,  we've (with [...]

Catch-IT: Latest Phishing Scam Involves Direct Deposit

Warning for Employees and Businesses that use Direct Deposit The latest phishing scam involves direct deposit, with emails being specially crafted to the targeted organization.  Scammers impersonate an employee, often by establishing an email address using the employee’s name and utilizing display name spoofing in the messages. The malicious [...]

Security Alert – Vulnerability in Google Chrome

Google Chrome’s latest update has a security fix - users are urged to apply when notified Google has released a security update for the Chrome browser on Windows, Mac and Linux to fix a newly discovered zero-day vulnerability that is being exploited actively by cyberattacks.  Successful exploitation of the [...]

Magnitude Earthquake Hits Morris County, NJ. Are You Prepared?

Did you know a magnitude-2.3 earthquake struck parts of northern New Jersey Tuesday evening, according to the U.S. Geological Survey. This recent event, coupled with the incoming storm season serves as a reminder to have a Disaster Recover plan in place.  Developing a plan offers assurance to both employers and their [...]

Still Using an iPhone 5S or 6? Check Out this Update.

On Wednesday, Apple backported security updates to older iPhones, iPads, and iPod touch devices to address a critical security flaw that has been actively exploited in the wild.  If you own the following devices an update is needed:  iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini [...]

Last Pass was Breached, Master Passwords Still Safe

Another BMT Recommendation Proven Safe! As you probably have heard by now, Last Pass, the world's largest password manager was breached last week.  The breach appears to have been of the development servers, facilitated by a compromise of a LastPass developer account.  The breach has been contained and there [...]

Cyber Insurance 101

It seems hardly a day goes by without a new report of a cyberattack.  The average ransom payment shot up 82 percent from 2020 to 2021. By the middle of 2021, the number of ransomware attacks was up more than 150 percent over the entirety of 2020.  These numbers are [...]

Top 3 Phishing Attack Simulators to Defend Your Network

Did you know the median financial impact of a breach over the past year is $21,659, with 95 percent of incidents falling between $826 and $653,587?  Of these attacks 85% involved a human element.  Phishing emails are one of the most popular attack vectors for cybercriminals, with scams becoming [...]

Email Not Working? Reach us via Social!

Two weeks ago we reported an issue Microsoft was having with Outlook.  Emails were unusually slow/delayed.  We wanted to take this opportunity to remind you of other ways to connect with us if email is not the best option.  You can always connect with BMT! Connect With Us Via [...]

Clear Your Cache!

Let's face it, your iPhone is a workhorse.  It wakes you up in the morning, manages your texts, lets you browse through  preferred social media apps and allows you to search up those weird, one-off facts you want to know. But that web browsing adds up over time, which [...]

The Best in Customized Office Security Solutions

BMT Offers Comprehensive Security Solutions to Meet your Everyday Needs From security system design and integration, to cabling and hardware installation, our experienced team protects your business at every location, 24/7.   We plan, design, install, implement, test and service your security system across all your business locations. Our ongoing [...]

The Most Important Tool To Prevent a Breach

The Most Important Security Tool You Should Be Using. Yes, it's FREE*! It's a fact, more than 90% of successful hacks and data breaches start with phishing scams. One of the simplest and most effective techniques used by cybercriminals to achieve their goals are what is known as phishing [...]

Go to Top