Security

Check out our New CoPilot for Office 365 Resources!

Started Using Copilot? We've Got You Covered! The team at BMT has compiled targeted videos to help better utilize the features offered by CoPilot for Office 365. New content is added weekly, so check back often! Make BMT your go-to resource for all things CoPilot Office 365. You can [...]

Beware of Fake Google Meet Invites Hiding Malware

How Hackers Are Using Meeting Invitations To Spread Malware As email security protocols become better able to identify phishing links, hackers are constantly on the lookout for new ways to launch their campaigns. Fake Google Meet links are an ideal solution because most email programs will not identify them [...]

Catch-IT: Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines

Hackers are using ZIP file concatenation to bypass security solutions and infect their targets with malware through email messages, experts have warned. A new method in cyberattacks uses ZIP file concatenation to deliver malicious payloads undetected. By leveraging differences in ZIP parser handling, attackers can hide trojans in ZIP files, targeting [...]

By |2024-11-12T15:12:57-05:00November 12th, 2024|Categories: Catch IT, News|Tags: , , , , , , |

Norton LifeLock Identity Theft Protection Alert

Individuals who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system. They are aware of the problem and are [...]

Android Vulnerability Warning – Update Now

A vulnerability (CVE-2024-43093) has been discovered in Google Android that could allow for remote code execution.  Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context [...]

Cloud Storage: The Best Solution for Managing Business Data

It’s no secret that managing business data can be tricky. Sure, you can store information on separate hard drives. But is that the best strategy for your business?Let’s take a closer look at how cloud storage can benefit your operations. Cloud Storage: The Basics So, what exactly is cloud [...]

Organizing Your Cybersecurity Strategy into Left and Right of Boom

Navigating the fight for data security is ongoing and requires a dual strategy. To best protect IT assets, businesses need to equip themselves with an advanced collection of cybersecurity tactics. These tactics fall into two categories: proactive prevention (Left of Boom) and robust recovery (Right of Boom). Left of Boom [...]

5 Tips for Cybersecurity Awareness Month 2024

Every year, a crazy high number of people face the consequences of cyberattacks. These attacks not only cost organizations billions. They also leave a devastating impact on individuals.  We know, if you’re reading this, you get it. You already understand the importance of safeguarding your organization and people from cyber [...]

Latest Cryptocurrency Scam Hits Victims Twice

The Federal Bureau of Investigation (FBI) has issued an announcement to inform the public of an emerging criminal tactic used to further defraud cryptocurrency scam victims. Using social media or other messaging platforms, fraudsters posing as lawyers representing fictitious law firms may contact scam victims and offer their services, [...]

Webinar: Cyber Insurance 2024

Learn from the Insurance Experts! Let us simplify Cyber Insurance for You.  As the world of cyber continues with complexities, we are here to break it down. Do small/medium-sized businesses really need coverage? What security measures do you need in place? How can you obtain the best coverage at [...]

High School Cyber Internship with NJCCIC

Is Your Teen Looking to Learn Something New This Summer? The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) has opened their 2024 Summer High School Internship Program application window! About the Program There are two opportunities for high school students to participate in this year's High School Summer Internship [...]

New Chrome Threat: Make Sure Your Browser is Up to Date

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update brings Chrome to version 124.0.6367.201 for Windows, Mac, and Linux users on the Stable release channel. The vulnerability, tracked as CVE-2024-4671, is a “use after free” flaw in the [...]

By |2024-05-10T13:01:08-05:00May 10th, 2024|Categories: Catch IT, News|Tags: , , , , , , |
Go to Top