Blog2019-02-25T21:56:18-06:00

CBM Technology completes SOC 2 Type 2 Audit

CBM Technology is excited to share news about a major accomplishment for any Managed IT Solutions Provider. We have achieved a major milestone in its IT security efforts by becoming SOC 2 Type 2 compliant. CBM Technology is one of the only SOC 2 Type 2 compliant technology firms in the Acadiana region. SOC 2 Type 2 is one of the most difficult to obtain information security compliance. Obtaining [...]

What is SOC 2 Type 2?

What is SOC 2? Service Organization Control (SOC) – created by the American Institute of Certified Public Accountants (AICPA) – are internal control reports which provide important information to users to evaluate the risks involved with an outsourced service provider. An independent third-party performs a thorough examination of the service’s providers internal control policies and processes over a specified period of time. This independent review ensures that the organization meets [...]

DHS announced that hackers are targeting IT Service Providers

US Department of Homeland Security made a security announcement that hackers are targeting IT service providers to gain access to their clients’ networks around the world. IT service providers have a lot of confidential information such as detailed notes about client’s IT infrastructure, administrative passwords or have methods of accessing client’s network from within the IT service providers systems.There are no networks that are impenetrable as long as they are [...]

Faxploit – What should you know about it?

Some of us think of fax machines as a relic, but fields like healthcare and government still rely on faxes every day. Researchers have discovered serious vulnerabilities in fax machines that could let cybercriminals infiltrate any home or corporate network with just a fax number. Known as ‘Faxploit,’ the vulnerability research by Check Point’s Yaniv Balmas and Eyal Itkin illustrates how a hacker could easily exploit fax protocol and infiltrate [...]

What’s the biggest risk to your business?

What’s the biggest risk to your business? – Valuable infographs. While reviewing the Verizon 2018 Data Breach Investigations Report, there was some very interesting info graphs that quickly explains cyber breaches for each industry. The graphs explains where most attacks occur such as External – outside of the network and Internal – inside the network; what type of breaches; and how they attacked.  Out of all of the industries listed [...]

5 Tips for protecting your network from cyber security threats

5 Tips for protecting your network from cyber security threats Today and probably forever, business owners and management like yourselves should focus on protecting their company from sophisticated cyber adversaries. For business owners data security can feel like a daunting task. In a recent research from Verizon found that 60% of the time, attacks can compromise an organization in minutes. To make matter worst, the costs associated with lost business [...]

Security Alert – Expect increase in phishing attempts due to a large data leak.

Exactis, a marketing firm, left their databases exposed to the public that contained around 340 million records. These records included everything from email addresses, home addresses, phone numbers to details on purchasing history, religion, political preferences, pets, etc. However, no information such as credit card and social security information was leaked. What does this mean to you? Over the next few months you can expect an increase in very persuasive [...]

What is phishing?

First, it is not fishing, its phishing. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. Common [...]

How to protect yourself from phishing attempts?

If you aren’t 100 percent certain of the sender’s authenticity, don’t click on attachments or embedded links; both are likely to result in malware being installed. Instead, open a new browser window and type the URL directly into the address bar. Often a phishing website will look identical to the original, so check the address bar to confirm the address.   Similarly, never submit confidential information via forms embedded in [...]

FBI Issues SOHO Router Cyberattack Warning

United States Computer Emergency Readiness Team states: “Devices known to be affected by VPNFilter include Linksys, MikroTik, NETGEAR, and TP-Link networking equipment, as well as QNAP network-attached storage (NAS) devices. Devices compromised by VPNFilter may be vulnerable to the collection of network traffic (including website credentials), as well as the monitoring of Modbus supervisory control and data acquisition (SCADA) protocols. VPNFilter has a destructive capability that can make the affected [...]

CBM Technology named one of 2018 Tech Elite Solution Providers

CBM Technology Named One of 2018 Tech Elite Solution Providers by CRN® Tech Elite 250 list recognizes IT solution providers with deep technical expertise and premier certifications. CBM Technology announced today that CRN®, a brand of The Channel Company, has named to its 2018 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical [...]

2018 Top IT Security Threats – Crime as a Service

Crime as a Service Crime as a Service is when a professional criminal or group of criminals develop advanced tools which are offered up for sale or rent to other criminal or criminal-wanna-be who are usually less experienced.  This is going to have a major effect in cybercrime because it lowers the bar for inexperienced actors to launch sophisticated cyber attacks and scams.  This allows helps accelerate attacks towards small [...]

Critical Security Vulnerability – Meltdown & Spectre

 Update As of 2-8-2018 Meltdown-Spectre patching have been put on a slight hold for the moment.  Intel has not been able provide stable microcode updates.  The effort has been more complicated than Intel thought.  Intel has pulled back many patches due to the instability of the updates.  When the stable releases of microcode updates will come out is still unknown. CBM Technology security team is monitoring the activity for [...]

Beware: Holiday Phishing and Ransomware

Holiday Phishing and Ransomware Holiday Phishing and Ransomware   Hackers are ready for the holidays too! How much shopping do you plan on doing in the coming weeks? If you’re like most people, probably a lot! Well in that same trend, hackers are planning their own “shopping trips” on your dime. This year we have seen a major hike in Phishing and Ransomware Attacks. The percentage of Phishing attacks containing [...]

WPA2 KRACK Wifi Vulnerability

WPA2 KRACK Wifi Vulnerability     We hope that most of you have heard of the recent discovery of the WPA2 KRACK Wifi Vulnerability. If you haven't, read more here. Look at the image above and you will see several pictures from sites showing you how to hack the WPA2 network "easily." So the information is at the fingertips of the hackers, and thinking you're protected could cost you more [...]

Zombie Threat Protection

I am not sure if you enjoy watching killer zombie movies.  Not to offend the hardcore zombie fans, I always thought the idea of zombies was silly.  Before you start trying to eat my arm, I do like the story behind the guts and gore.  The story of how people come together to defend themselves.  If you break down these stories, it is a lot like keeping the zombies out [...]

Cyber Monster Score Card

We created an infographic to show how devastating these Cyber Monsters can be! Don't fall victim to these spooky ghouls!

October: The Month of Spooks & Cyber Security Awareness

October is National Cyber Security Awareness Month.   CBM Technology is honoring Cyber Security Awareness Month with a string of articles educating the business community about Cyber Security and adding a little Halloween fun!  We hope that you learn something and apply some of it to protect your business. Types of Cyber Creatures 1. Social Engineering – Vampire Clans  Social Engineering is a psychological manipulation of people to trick people into [...]

What is a Phishing Attack?

Phishing Attacks- Guard Your Info IT threats are becoming more and more complex and creative. With ransomware, major firms being hacked, and numerous scams, one of the fastest and most successful threats are phishing scams. If you think this couldn't happen to you, you're wrong. Phishing Explained Phishing scams are typically fraudulent email messages appearing to come from legitimate contacts. These messages usually direct you to a spoofed website, get you to [...]

Employee Spotlight- Geno Felix

Geno Felix Account Executive 2 Months with CBM Technology ___________________ So far, what is your favorite part of working at CBM? The knowledge of our engineers and the professionalism of the office atmosphere. What drew you to CBM? Great leadership; products and services offered to clients In your opinion, what 3 words best describe CBM Technology? Innovative Leader Visionary What are your hobbies/passions and how do they translate into your [...]

Office 365 Email Scam

Be Aware: If you receive an email like this, Delete it!Office 365 Email Scam  We received this email and thought it was necessary to share it with our customers and our audience. Email scams are definitely on the rise, and they are getting more and more believable. They are getting better at branding, so you need to be skeptical.  If you receive an email that contains a link, hover over the [...]

CBM Technology Recognized by MSPmentor as a Top 501 Managed Service Provider for 2017

CBM Technology is thankful to have been ranked among the Top 501 Managed Service Providers by MSPmentor, an industry-leading list of the World’s top 501 Managed Service Providers 10th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology June 22, 2017: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top [...]

Internet Security Report- Are You Doing Enough?

 WatchGuard Technologies recently released their 2016 Internet Security Report. This report takes information collected from firewalls to determine the security trends over the quarter. This report was published by Secplicity.org, the full report can be found here. The fireboxes tested blocked a combined 18 million malware infections and 3 million network attacks.   The report shows the most common types of attacks: 30 percent of malware is new or “zero [...]

CBM Technology Recognized for Excellence in Managed IT Services

CRN, a brand of The Channel Company, has named CBM Technology to its 2017 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This prestigious list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments. In today's fast-paced business environments, MSPs plan an important role [...]

Tax Season = Scam Season

 Tax season is now in full swing, and so are the spam attempts. We receive spam emails and calls every day, some more convincing than others. But there are a few things to remember before ever giving out your personal information. The IRS has a strict means of communication, so if you receive an email claiming to be an IRS agent, it is a tax scam. Tips from www.irs.gov Here [...]

What is Your IT Company Doing to Protect your Business?

If your IT company isn't regularly seeking out the latest security knowledge & solutions, then you may need to reevaluate your choice. It takes a constant effort to learn & evolve in order to protect client's and their customers. Our management team is currently at the Ingram ONE expo. We attend this event every year to gain valuable knowledge about the current issues our industry faces, build partnerships, and help [...]

BBB Integrity Award 2016: CBM Technology

We are so honored to have been selected for this prestigious award. The BBB Integrity Award stands for trust and value, and that is what CBM Technology strives to achieve with every client and our entire community. We are so thankful for our loyal customers who helped make this possible.   "Better Business Bureau serving Acadiana congratulates Bryson Law Firm of Lafayette and NuNu’s Fresh Market of Youngsville as the [...]

Translate Printed Documents Securely & Easily with Xerox Easy Translator

Translate Printed Documents Securely  Translating sensitive documents is now easier & more secure than ever. Using your new Xerox printer, you can safely translate printed & digital documents in over 30 languages at the touch of a button. Mobile & Web capabilities for digital documents & document management. Available on Several Multifunction Printers, suited to your need. Already have Xerox printer? You may qualify for a trade-in bonus of up [...]

Securing Multiple Locations

Network Security for the Distributed Enterprise   Distributed Enterprises are evolving beyond the traditional model of corporate headquarters with remote branch offices. Today’s Distributed Enterprise increasingly supports multiple locations that operate like a typical small business, and this is especially true in the retail, hospitality, medical, and financial industries.  The relationship between a centralized entity and many independent business locations creates unique network security challenges. CBM Technology understands the challenges [...]

BBB Event: Start with Security

BBB News Release Contact President/CEO Sharane Gott (337) 989-8726 (direct) Start with Trust® www.acadiana.bbb.org 9/19/2016   Should I click on an email from an unknown sender? Is it safe to click on pop-ups when I am browsing the web? Is my computer safe from malware and viruses? All of these questions will be answered by BBB at their upcoming Cyber Security Seminars in New Iberia and Lafayette in October. Better [...]

2016 FLOOD RECOVERY ASSISTANCE

August 2016 Flood Recovery Assistance Resources for Impacted Businesses Regarding August flooding, beginning August 11, 2016 - Parishes currently designated in the federal disaster declaration: Acadia, Ascension, Avoyelles, East Baton Rouge, East Feliciana, Evangeline, Iberia, Iberville, Jefferson Davis, Lafayette, Livingston, Pointe Coupee, St. Helena, St. Landry, St. Martin, St. Tammany, Tangipahoa, Vermilion, Washington and West Feliciana parishes. Damage assessments are continuing for other parishes. This list will be updated on [...]

Digium Phones can Save your Business Money

So you want to save your business money? You could be paying more for much less if you have a legacy phone system. You may be surprised to hear how many features you get with a Digium + Switchvox phone system. This system is fully customizable and perfect for small to midsized businesses. Larger sized businesses can benefit as well, especially if you have multiple locations. With 3 platform options, [...]

FREE Network Assessment

 Having network issues? We can help.If your business is falling behind on Network Upgrades, Security, and Compliance, let us give you a FREE assessment. We perform a walk-through to investigate your infrastructure and document any issues. Main Areas to Assess:  No ObligationThe security issues businesses face today are daunting. Having a strong infrastructure and plan in place is crucial. Planning for your yearly budget is a lot easier when you know what’s [...]

Cyber Security Talk with Local Law Firms

 CBM had the opportunity to speak to a group of local law firms about the issues with cyber security yesterday. We were so honored to have been asked to share our knowledge with this highly engaging group. We had Dan Geisler, from Watchguard Technologies, speak with us on the intricacies of Ransomware and Wi-fi security. The group had excellent questions about the security of travelling and using public wi-fi [...]

Risks of Malware Infection via Microsoft Office

 Today, the Department of Homeland Security released a statement about an increased risk of macro-based malware through Microsoft Office products.  I imagine that some of you are saying "what", "huh", "blah"...moving on to another article.    DON'T GO JUST YET, IT'S IMPORTANT! Macros are basically used to automate tasks inside Microsoft Office such as Word and Excel.  When opening a file that has macros, the Office application will provide you with this [...]

CBM Recognized on MSPmentor 501 List for 2016: Top 500 IT Service Providers

 CBM Technology Ranked Among Top 501 Managed Service Providers by Penton Technology’s MSPmentor 9th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology May 26, 2016: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to Penton Technology’s 9th-annual MSP 501 list and study. The top MSP 501 companies ranked this year include organizations from around the world and [...]

Business E-Mail Scams on the Rise

If you haven't already heard, there is a rise in business leader identity theft and its costing businesses big time! Cyber criminals are getting creative with their attempts to exploit businesses for a profit. They do their research and impersonate the decision makers. Then, in company-specific jargon, they request a sum of money to be wired. It may sound unbelievable, but businesses fall for it more often than you would [...]

QuickTime No Longer Supported- Windows Users Delete!

Homeland Security’s US Computer Emergency Readiness Team advises to uninstall QuickTime from all Windows machines as Apple is ending support. This means Apple will no longer be providing security updates, and as we all know that leaves the threat of security holes wide open. As prevalent as Ransomware and Zero-Day Malware is these days, it is absolutely necessary to update and patch any security holes that arise. QuickTime for Windows currently [...]

Emergency Patch for Adobe Flash- Zero-Day Exploit

Emergency Flash Patch Issued After Zero-Day Exploit Uncovered   Cyber criminals have managed to find a vulnerability in the Adobe Flash software. Adobe issued an emergency security patch after being notified by a cybersecurity company. Having Flash on your computer allows for the Zero-Day virus to make its way into your computer. It doesn't require you to open the software or any application, making it all too easy for your [...]

Habitat for Humanity Lunch

The rain couldn’t stop these happy volunteers! Even though construction for the day was halted, they stepped up and helped out at the Lafayette, LA ReStore. We are always thankful for Habitat for Humanity Volunteers, and feeding them is the least we can do! Every chance we get, we try to put together a truly Louisiana meal for these helpful volunteers. This week we decided on red beans and rice. Every [...]

Watchguard Advisory Council

2016 Watchguard Advisory Council Member   We are so pleased to announce our placement on the Watchguard Technologies Advisory Council. We look forward to working in an advisory capacity in the coming year. It is critical for us to work closely with our partners to drive toward mutual success. We are happy to partner with a company that provides such quality products, a collaborative nature and a vision of a [...]

World Backup Day

BACKUP YOUR DATA Today is World Backup Day. Are you ready? Would your data be safe if a disaster happened? 29% of disasters are caused by accidents. It can happen to anyone. Backing up your data is painless with CBM's Backup and Disaster Recovery. We partner with Veeam, the best in the business for backup and disaster recovery, and virtualization. 1 in 10 computers is infected with a virus every month. [...]

LeChiffre, A New Ransomware to Look Out For

Ransomware Is On The Rise Be Careful What You Click   There is a new threat in the world of Ransomware. Read the article below from Malwarebytes LABS to learn more about what LeChiffre is and how to look out for it. Protect your business from this devastating malware with Managed Antivirus and  Watchguard APT Blocker from CBM Technology. Worry less about the threat of ransomware with free virus removal [...]

We Earned CompTIA Trustmark

 CBM Technology is the FIRST Louisiana technology company to earn the CompTIA Managed Services Trustmark.   CBM Technology announced today it has received the CompTIA Managed Services Trustmark™, a respected industry credential that signifies its adherence to best practices for technology service delivery and customer interaction. “Earning this credential identifies CBM Technology as a business that meets or exceeds the best business practices the IT industry has to offer,” [...]