Beware: Holiday Phishing and Ransomware

Holiday Phishing and Ransomware Holiday Phishing and Ransomware   Hackers are ready for the holidays too! How much shopping do you plan on doing in the coming weeks? If you’re like most people, probably a lot! Well in that same trend, hackers are planning their own “shopping trips” on your dime. This year we have seen a major hike in Phishing and Ransomware Attacks. The percentage of Phishing attacks containing Ransomware is also rapidly increasing.…

WPA2 KRACK Wifi Vulnerability

WPA2 KRACK Wifi Vulnerability     We hope that most of you have heard of the recent discovery of the WPA2 KRACK Wifi Vulnerability. If you haven't, read more here. Look at the image above and you will see several pictures from sites showing you how to hack the WPA2 network "easily." So the information is at the fingertips of the hackers, and thinking you're protected could cost you more than the time it would…

Zombie Threat Protection

      I am not sure if you enjoy watching killer zombie movies.  Not to offend the hardcore zombie fans, I always thought the idea of zombies was silly.  Before you start trying to eat my arm, I do like the story behind the guts and gore.  The story of how people come together to defend themselves.  If you break down these stories, it is a lot like keeping the zombies out of your…

October: The Month of Spooks & Cyber Security Awareness

October is National Cyber Security Awareness Month.   CBM Technology is honoring Cyber Security Awareness Month with a string of articles educating the business community about Cyber Security and adding a little Halloween fun!  We hope that you learn something and apply some of it to protect your business.   Types of Cyber Creatures   1. Social Engineering – Vampire Clans  Social Engineering is a psychological manipulation of people to trick people into performing actions or…

What is a Phishing Attack?

Phishing Attacks- Guard Your Info IT threats are becoming more and more complex and creative. With ransomware, major firms being hacked, and numerous scams, one of the fastest and most successful threats are phishing scams. If you think this couldn't happen to you, you're wrong. Phishing ExplainedPhishing scams are typically fraudulent email messages appearing to come from legitimate contacts. These messages usually direct you to a spoofed website, get you to disclose private information such as passwords…

Employee Spotlight- Geno Felix

Geno Felix Account Executive 2 Months with CBM Technology ___________________   So far, what is your favorite part of working at CBM? The knowledge of our engineers and the professionalism of the office atmosphere.   What drew you to CBM? Great leadership; products and services offered to clients   In your opinion, what 3 words best describe CBM Technology? Innovative Leader Visionary   What are your hobbies/passions and how do they translate into your role?…

Office 365 Email Scam

Be Aware: If you receive an email like this, Delete it!Office 365 Email Scam  We received this email and thought it was necessary to share it with our customers and our audience. Email scams are definitely on the rise, and they are getting more and more believable. They are getting better at branding, so you need to be skeptical.  If you receive an email that contains a link, hover over the link to see the destination.In…

CBM Technology Recognized by MSPmentor as a Top 501 Managed Service Provider for 2017

CBM Technology is thankful to have been ranked among the Top 501 Managed Service Providers by MSPmentor, an industry-leading list of the World’s top 501 Managed Service Providers 10th Annual MSP 501 Ranking and Study IdentifiesWorld’s Most Progressive MSPs in Information Technology June 22, 2017: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top MSP 501 companies ranked this year include organizations…

Internet Security Report- Are You Doing Enough?

  WatchGuard Technologies recently released their 2016 Internet Security Report. This report takes information collected from firewalls to determine the security trends over the quarter. This report was published by Secplicity.org, the full report can be found here. The fireboxes tested blocked a combined 18 million malware infections and 3 million network attacks.   The report shows the most common types of attacks: 30 percent of malware is new or “zero day” Old attack techniques are…

CBM Technology Recognized for Excellence in Managed IT Services

CRN, a brand of The Channel Company, has named CBM Technology to its 2017 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This prestigious list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.  In today's fast-paced business environments, MSPs plan an important role in helping companies leverage new…