CBM Technology named one of 2018 Tech Elite Solution Providers

CBM Technology Named One of 2018 Tech Elite Solution Providers by CRN® Tech Elite 250 list recognizes IT solution providers with deep technical expertise and premier certifications. CBM Technology announced today that CRN®, a brand of The Channel Company, has named to its 2018 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers,…

2018 Top IT Security Threats – Crime as a Service

Crime as a Service Crime as a Service is when a professional criminal or group of criminals develop advanced tools which are offered up for sale or rent to other criminal or criminal-wanna-be who are usually less experienced.  This is going to have a major effect in cybercrime because it lowers the bar for inexperienced actors to launch sophisticated cyber attacks and scams.  This allows helps accelerate attacks towards small businesses over enterprises, because small…

Critical Security Vulnerability – Meltdown & Spectre

  Update As of 2-8-2018 Meltdown-Spectre patching have been put on a slight hold for the moment.  Intel has not been able provide stable microcode updates.  The effort has been more complicated than Intel thought.  Intel has pulled back many patches due to the instability of the updates.  When the stable releases of microcode updates will come out is still unknown. CBM Technology security team is monitoring the activity for when Intel releases these patches.…

Beware: Holiday Phishing and Ransomware

Holiday Phishing and Ransomware Holiday Phishing and Ransomware   Hackers are ready for the holidays too! How much shopping do you plan on doing in the coming weeks? If you’re like most people, probably a lot! Well in that same trend, hackers are planning their own “shopping trips” on your dime. This year we have seen a major hike in Phishing and Ransomware Attacks. The percentage of Phishing attacks containing Ransomware is also rapidly increasing.…

WPA2 KRACK Wifi Vulnerability

WPA2 KRACK Wifi Vulnerability     We hope that most of you have heard of the recent discovery of the WPA2 KRACK Wifi Vulnerability. If you haven't, read more here. Look at the image above and you will see several pictures from sites showing you how to hack the WPA2 network "easily." So the information is at the fingertips of the hackers, and thinking you're protected could cost you more than the time it would…

Zombie Threat Protection

      I am not sure if you enjoy watching killer zombie movies.  Not to offend the hardcore zombie fans, I always thought the idea of zombies was silly.  Before you start trying to eat my arm, I do like the story behind the guts and gore.  The story of how people come together to defend themselves.  If you break down these stories, it is a lot like keeping the zombies out of your…

October: The Month of Spooks & Cyber Security Awareness

October is National Cyber Security Awareness Month.   CBM Technology is honoring Cyber Security Awareness Month with a string of articles educating the business community about Cyber Security and adding a little Halloween fun!  We hope that you learn something and apply some of it to protect your business.   Types of Cyber Creatures   1. Social Engineering – Vampire Clans  Social Engineering is a psychological manipulation of people to trick people into performing actions or…

What is a Phishing Attack?

Phishing Attacks- Guard Your Info IT threats are becoming more and more complex and creative. With ransomware, major firms being hacked, and numerous scams, one of the fastest and most successful threats are phishing scams. If you think this couldn't happen to you, you're wrong. Phishing ExplainedPhishing scams are typically fraudulent email messages appearing to come from legitimate contacts. These messages usually direct you to a spoofed website, get you to disclose private information such as passwords…

Employee Spotlight- Geno Felix

Geno Felix Account Executive 2 Months with CBM Technology ___________________   So far, what is your favorite part of working at CBM? The knowledge of our engineers and the professionalism of the office atmosphere.   What drew you to CBM? Great leadership; products and services offered to clients   In your opinion, what 3 words best describe CBM Technology? Innovative Leader Visionary   What are your hobbies/passions and how do they translate into your role?…

Office 365 Email Scam

Be Aware: If you receive an email like this, Delete it!Office 365 Email Scam  We received this email and thought it was necessary to share it with our customers and our audience. Email scams are definitely on the rise, and they are getting more and more believable. They are getting better at branding, so you need to be skeptical.  If you receive an email that contains a link, hover over the link to see the destination.In…

CBM Technology Recognized by MSPmentor as a Top 501 Managed Service Provider for 2017

CBM Technology is thankful to have been ranked among the Top 501 Managed Service Providers by MSPmentor, an industry-leading list of the World’s top 501 Managed Service Providers 10th Annual MSP 501 Ranking and Study IdentifiesWorld’s Most Progressive MSPs in Information Technology June 22, 2017: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top MSP 501 companies ranked this year include organizations…