Shop Smart

‘Shop smart’ and not to click on links in emails and text messages if a deal seems too good to be true. It could be that this is a phishing email, designed to outright steal usernames, passwords and payment details.

Happy Thanksgiving

Enjoy and relax, Thanksgiving is also a great day to catch up with family and friends. Happy Thanksgiving from the CBM team.

Security Tips

Planning on shopping online for Black Friday or Cyber Monday? Make sure you aren’t falling prey to scammers and crooks with these security tips.

Consulting Services

We develop IT plans that take into account your budget, projections, customer and employee needs, and business goals to guarantee that your IT infrastructure can always support the changes your company undergoes well into the future.

Move To The Cloud

Our cloud computing services make updating, installing and managing your technology easier, so you can focus on growing your business instead of worrying about IT solutions that are holding you back.

Solving Your Problems

When restarting your computer does not do the trick, contact our CBM Tech Support.

The Software Gurus

Jean-Luc Ahlers, Director of Software Development. He speaks 7 languages (English, Afrikaans, Zulu, French, HTML, CSS, Java Script). He’s the office globetrotter, he should host a Ted Talk Award, because he always has a good story to tell. Contact him today for all your software needs.

Security Patch

Think of a software patch as an armor that repels attacks and protects against various exploits.

IT Support

Designed for small to medium sized businesses to lower the cost of supporting IT systems, deliver at a fixed price with no hidden expenses, no surprises – just one single monthly bill.

CBM Technology Named Top 250 Managed Security Services Providers

Of all the recognitions, being acknowledged as one of the top 250 Managed Security Service Providers 2 years in a row is probably one of the items that I am most excited about. CBM Technology is one of the highest ranking Cyber Security providers in Louisiana, behind CenturyLink according to MSSPAlert. While I am proud of our leadership team, I give the most credit to our technical services team [...]

CBM Technology Recognized on CRN’s 2020 MSP500 List

Breaux Bridge, Louisiana, February 18, 2020 – CBM Technology, announced today that CRN®, a brand of The Channel Company has named  CBM Technology to its 2020 Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category. This popular list identifies North American solution providers that deliver operational efficiencies, IT system improvements, and a higher rate of return on investments for their customers. These accomplished MSPs work tirelessly [...]

CBM Technology Ranked Among World’s Most Elite 501 Managed Service Providers

Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services JULY 28, 2020: CBM Technology has been named as one of the world’s premier managed service providers on the prestigious 2020 annual Channel Futures MSP 501 rankings. For the 13th year running, MSPs from around the globe completed an exhaustive survey and application this spring to self-report product offerings, annual total and recurring revenues, profits, [...]

Microsoft Office 2013 and Connectivity to Office 365

What Now? Starting on October 13, 2020, only these versions of Office will be supported for connecting to Office 365 (and Microsoft 365) services: Microsoft 365 Apps for enterprise (previously named Office 365 ProPlus) Microsoft 365 Apps for business (previously named Office 365 Business) Office 2019, such as Office Professional Plus 2019 Office 2016, such as Office Standard 2016 Examples of Office 365 services include Exchange Online, SharePoint Online, [...]

Microsoft releases a patch for a zero-day exploit – CVE-2020-1350

Today, July,14 2020, Microsoft released a security patch for a high risk, zero-day vulnerability where malware can spread to computers without user interaction through Windows DNS server.  It is a CVSS 10 rated vulnerability and it is critical that everyone applies this patch ASAP.  Click here to learn more about it. For clients who are on Managed IT Essentials or above, the patch will require a restart of all [...]

Are you receiving the CARE you need?

Are you getting the IT Care you need or expect? Is it taking too long to get a response from support? Do you feel you are spending too much for IT? Are you unhappy or uncomfortable with your current IT services? Take 15-20 minutes of your day to talk about your IT experiences with CBM Technology's Care Team and see how they can be better. You may end [...]

CBM Technology – Definition of Care

For over 45 years, CBM Technology’s core value and corporate culture is the very definition of care. Because our core values, it has allowed us to have strong relationships with clients that spans beyond 25 years.Care – NounThe provision of what is necessary for the health, welfare, maintenance and protection of someone or something.Serious attention or consideration applied to doing something correctly or to avoid damage or risk.Care – VerbFeel [...]

CBM Technology – IT Simplified

Located in the Acadiana area, CBM Technology is a simplified information technology (IT) solutions provider, specializing in Cyber Security, IT Help Desk Support, Networking, Cloud Solutions, and Software Development. With CBM Technology, you get a team of experts to back your business and/or your existing IT staff. You get a team who CARES about Your business. MANAGED SERVICES 24/7/365 Help Desk Support Controlled & Predictable Costs Stay Focused on [...]

Does your IT Provider put SOCs on every morning?

CBM Technology does and is SOC 2 Type 2 Compliant.What does that mean!?It is an industry indicator of quality cyber security controls. SOC 2 Compliance was developed by the Association of International Certified Professional (AICPA) to provide standardized best practices for service organizations like CBM Technology.It shows that CBM Technology manages clients’ data through a set of 5 trust principles - security, availability, processing integrity, confidentiality and privacy. A 3rd [...]

COVID-19 Themed Digital Virus

Not only do we all have to protect our family and friends against the COVID-19 virus, there are digital COVID-19 themed viruses out. Louisiana State Police has released an advisory that there are digital COVID-19 themed viruses that are starting to spread on computer networks. Because CBM Technology is considered to be an essential service, we will continue to service our clients throughout Louisiana and the rest of the [...]

EMOTET – Increased Phishing & Malware Activity

There is a variant of EMOTET trojan that is very dangerous and can bypass multiple endpoint protections. EMOTET is commonly delivered via email with an attachment or a link within the email similar to a number of phishing emails that you probably have received in the past. Why is this any different and why is it so IMPORTANT? Let's start with what happens if you were to be become [...]

Ransomware Attackers are Targeting IT Providers

Cyber Criminals are always looking for ways to hit the most people for the highest return. One of these ways is to target IT providers who have access to 100s of customers and 1,000s of workstations and servers. Unfortunately, there are a significant number of IT providers who are not protected against these types of attacks. In 2019, there have been dozens of IT providers across the U.S. who [...]

CBM Technology is expanding to the New Orleans area

Happy New Year & Welcome to 2020! I am very excited to let you know that CBM Technology is expanding to a new location in the New Orleans area to provide IT & Cyber Security Services. Located in Breaux Bridge, CBM Technology has been providing IT Services for southern Louisiana area since 1973. We have seen and experienced technology over the years and servicing every industry from financial to [...]

CBM Technology completes SOC 2 Type 2 Audit

CBM Technology is excited to share news about a major accomplishment for any Managed IT Solutions Provider. We have achieved a major milestone in its IT security efforts by becoming SOC 2 Type 2 compliant. CBM Technology is one of the only SOC 2 Type 2 compliant technology firms in the Acadiana region. SOC 2 Type 2 is one of the most difficult to obtain information security compliance. Obtaining [...]

What is SOC 2 Type 2?

What is SOC 2? Service Organization Control (SOC) – created by the American Institute of Certified Public Accountants (AICPA) – are internal control reports which provide important information to users to evaluate the risks involved with an outsourced service provider. An independent third-party performs a thorough examination of the service’s providers internal control policies and processes over a specified period of time. This independent review ensures that the organization meets [...]

DHS announced that hackers are targeting IT Service Providers

US Department of Homeland Security made a security announcement that hackers are targeting IT service providers to gain access to their clients’ networks around the world. IT service providers have a lot of confidential information such as detailed notes about client’s IT infrastructure, administrative passwords or have methods of accessing client’s network from within the IT service providers systems.There are no networks that are impenetrable as long as they are [...]

Faxploit – What should you know about it?

Some of us think of fax machines as a relic, but fields like healthcare and government still rely on faxes every day. Researchers have discovered serious vulnerabilities in fax machines that could let cybercriminals infiltrate any home or corporate network with just a fax number. Known as ‘Faxploit,’ the vulnerability research by Check Point’s Yaniv Balmas and Eyal Itkin illustrates how a hacker could easily exploit fax protocol and infiltrate [...]

What’s the biggest risk to your business?

What’s the biggest risk to your business? – Valuable infographs. While reviewing the Verizon 2018 Data Breach Investigations Report, there was some very interesting info graphs that quickly explains cyber breaches for each industry. The graphs explains where most attacks occur such as External – outside of the network and Internal – inside the network; what type of breaches; and how they attacked.  Out of all of the industries listed [...]

5 Tips for protecting your network from cyber security threats

5 Tips for protecting your network from cyber security threats Today and probably forever, business owners and management like yourselves should focus on protecting their company from sophisticated cyber adversaries. For business owners data security can feel like a daunting task. In a recent research from Verizon found that 60% of the time, attacks can compromise an organization in minutes. To make matter worst, the costs associated with lost business [...]

Security Alert – Expect increase in phishing attempts due to a large data leak.

Exactis, a marketing firm, left their databases exposed to the public that contained around 340 million records. These records included everything from email addresses, home addresses, phone numbers to details on purchasing history, religion, political preferences, pets, etc. However, no information such as credit card and social security information was leaked. What does this mean to you? Over the next few months you can expect an increase in very persuasive [...]

What is phishing?

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. Common Features of Phishing Emails Too Good To [...]

How to protect yourself from phishing attempts?

Common Indicators of phishing attempts Suspicious sender’s address. The sender's address may imitate a legitimate business. Cybercriminals often use an email address that closely resembles one from a reputable company by altering or omitting a few characters. Generic greetings and signature. Both a generic greeting—such as “Dear Valued Customer” or “Sir/Ma’am”—and a lack of contact information in the signature block are strong indicators of a phishing email. A trusted organization [...]

FBI Issues SOHO Router Cyberattack Warning

United States Computer Emergency Readiness Team states: “Devices known to be affected by VPNFilter include Linksys, MikroTik, NETGEAR, and TP-Link networking equipment, as well as QNAP network-attached storage (NAS) devices. Devices compromised by VPNFilter may be vulnerable to the collection of network traffic (including website credentials), as well as the monitoring of Modbus supervisory control and data acquisition (SCADA) protocols. VPNFilter has a destructive capability that can make the affected [...]

CBM Technology named one of 2018 Tech Elite Solution Providers

CBM Technology Named One of 2018 Tech Elite Solution Providers by CRN® Tech Elite 250 list recognizes IT solution providers with deep technical expertise and premier certifications. CBM Technology announced today that CRN®, a brand of The Channel Company, has named to its 2018 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical [...]

2018 Top IT Security Threats – Crime as a Service

Crime as a Service Crime as a Service is when a professional criminal or group of criminals develop advanced tools which are offered up for sale or rent to other criminal or criminal-wanna-be who are usually less experienced.  This is going to have a major effect in cybercrime because it lowers the bar for inexperienced actors to launch sophisticated cyber attacks and scams.  This allows helps accelerate attacks towards small [...]

Critical Security Vulnerability – Meltdown & Spectre

  Update As of 2-8-2018 Meltdown-Spectre patching have been put on a slight hold for the moment.  Intel has not been able provide stable microcode updates.  The effort has been more complicated than Intel thought.  Intel has pulled back many patches due to the instability of the updates.  When the stable releases of microcode updates will come out is still unknown. CBM Technology security team is monitoring the activity for [...]

Beware: Holiday Phishing and Ransomware

Holiday Phishing and Ransomware Holiday Phishing and Ransomware   Hackers are ready for the holidays too! How much shopping do you plan on doing in the coming weeks? If you’re like most people, probably a lot! Well in that same trend, hackers are planning their own “shopping trips” on your dime. This year we have seen a major hike in Phishing and Ransomware Attacks. The percentage of Phishing attacks containing [...]

WPA2 KRACK Wifi Vulnerability

WPA2 KRACK Wifi Vulnerability     We hope that most of you have heard of the recent discovery of the WPA2 KRACK Wifi Vulnerability. If you haven't, read more here. Look at the image above and you will see several pictures from sites showing you how to hack the WPA2 network "easily." So the information is at the fingertips of the hackers, and thinking you're protected could cost you more [...]

Zombie Threat Protection

I am not sure if you enjoy watching killer zombie movies.  Not to offend the hardcore zombie fans, I always thought the idea of zombies was silly.  Before you start trying to eat my arm, I do like the story behind the guts and gore.  The story of how people come together to defend themselves.  If you break down these stories, it is a lot like keeping the zombies out [...]

Cyber Monster Score Card

We created an infographic to show how devastating these Cyber Monsters can be! Don't fall victim to these spooky ghouls!

October: The Month of Spooks & Cyber Security Awareness

October is National Cyber Security Awareness Month.   CBM Technology is honoring Cyber Security Awareness Month with a string of articles educating the business community about Cyber Security and adding a little Halloween fun!  We hope that you learn something and apply some of it to protect your business. Types of Cyber Creatures 1. Social Engineering – Vampire Clans  Social Engineering is a psychological manipulation of people to trick people into [...]

What is a Phishing Attack?

Phishing Attacks- Guard Your Info IT threats are becoming more and more complex and creative. With ransomware, major firms being hacked, and numerous scams, one of the fastest and most successful threats are phishing scams. If you think this couldn't happen to you, you're wrong. Phishing Explained Phishing scams are typically fraudulent email messages appearing to come from legitimate contacts. These messages usually direct you to a spoofed website, get you to [...]

Employee Spotlight- Geno Felix

Geno Felix Account Executive 2 Months with CBM Technology ___________________ So far, what is your favorite part of working at CBM? The knowledge of our engineers and the professionalism of the office atmosphere. What drew you to CBM? Great leadership; products and services offered to clients In your opinion, what 3 words best describe CBM Technology? Innovative Leader Visionary What are your hobbies/passions and how do they translate into your [...]

Office 365 Email Scam

Be Aware: If you receive an email like this, Delete it!Office 365 Email Scam  We received this email and thought it was necessary to share it with our customers and our audience. Email scams are definitely on the rise, and they are getting more and more believable. They are getting better at branding, so you need to be skeptical.  If you receive an email that contains a link, hover over the [...]

CBM Technology Recognized by MSPmentor as a Top 501 Managed Service Provider for 2017

CBM Technology is thankful to have been ranked among the Top 501 Managed Service Providers by MSPmentor, an industry-leading list of the World’s top 501 Managed Service Providers 10th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology June 22, 2017: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top [...]

Internet Security Report- Are You Doing Enough?

  WatchGuard Technologies recently released their 2016 Internet Security Report. This report takes information collected from firewalls to determine the security trends over the quarter. This report was published by, the full report can be found here. The fireboxes tested blocked a combined 18 million malware infections and 3 million network attacks.   The report shows the most common types of attacks: 30 percent of malware is new or “zero [...]

CBM Technology Recognized for Excellence in Managed IT Services

CRN, a brand of The Channel Company, has named CBM Technology to its 2017 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This prestigious list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments. In today's fast-paced business environments, MSPs plan an important role [...]

Tax Season = Scam Season

  Tax season is now in full swing, and so are the spam attempts. We receive spam emails and calls every day, some more convincing than others. But there are a few things to remember before ever giving out your personal information. The IRS has a strict means of communication, so if you receive an email claiming to be an IRS agent, it is a tax scam. Tips from Here [...]

What is Your IT Company Doing to Protect your Business?

If your IT company isn't regularly seeking out the latest security knowledge & solutions, then you may need to reevaluate your choice. It takes a constant effort to learn & evolve in order to protect client's and their customers. Our management team is currently at the Ingram ONE expo. We attend this event every year to gain valuable knowledge about the current issues our industry faces, build partnerships, and help [...]

BBB Integrity Award 2016: CBM Technology

We are so honored to have been selected for this prestigious award. The BBB Integrity Award stands for trust and value, and that is what CBM Technology strives to achieve with every client and our entire community. We are so thankful for our loyal customers who helped make this possible.   "Better Business Bureau serving Acadiana congratulates Bryson Law Firm of Lafayette and NuNu’s Fresh Market of Youngsville as the [...]

Translate Printed Documents Securely & Easily with Xerox Easy Translator

Translate Printed Documents Securely  Translating sensitive documents is now easier & more secure than ever. Using your new Xerox printer, you can safely translate printed & digital documents in over 30 languages at the touch of a button. Mobile & Web capabilities for digital documents & document management. Available on Several Multifunction Printers, suited to your need. Already have Xerox printer? You may qualify for a trade-in bonus of up [...]

Securing Multiple Locations

Network Security for the Distributed Enterprise   Distributed Enterprises are evolving beyond the traditional model of corporate headquarters with remote branch offices. Today’s Distributed Enterprise increasingly supports multiple locations that operate like a typical small business, and this is especially true in the retail, hospitality, medical, and financial industries.  The relationship between a centralized entity and many independent business locations creates unique network security challenges. CBM Technology understands the challenges [...]

BBB Event: Start with Security

BBB News Release Contact President/CEO Sharane Gott (337) 989-8726 (direct) Start with Trust® 9/19/2016   Should I click on an email from an unknown sender? Is it safe to click on pop-ups when I am browsing the web? Is my computer safe from malware and viruses? All of these questions will be answered by BBB at their upcoming Cyber Security Seminars in New Iberia and Lafayette in October. Better [...]


August 2016 Flood Recovery Assistance Resources for Impacted Businesses Regarding August flooding, beginning August 11, 2016 - Parishes currently designated in the federal disaster declaration: Acadia, Ascension, Avoyelles, East Baton Rouge, East Feliciana, Evangeline, Iberia, Iberville, Jefferson Davis, Lafayette, Livingston, Pointe Coupee, St. Helena, St. Landry, St. Martin, St. Tammany, Tangipahoa, Vermilion, Washington and West Feliciana parishes. Damage assessments are continuing for other parishes. This list will be updated on [...]

Digium Phones can Save your Business Money

So you want to save your business money? You could be paying more for much less if you have a legacy phone system. You may be surprised to hear how many features you get with a Digium + Switchvox phone system. This system is fully customizable and perfect for small to midsized businesses. Larger sized businesses can benefit as well, especially if you have multiple locations. With 3 platform options, [...]

FREE Network Assessment

  Having network issues? We can help.If your business is falling behind on Network Upgrades, Security, and Compliance, let us give you a FREE assessment. We perform a walk-through to investigate your infrastructure and document any issues. Main Areas to Assess:  No ObligationThe security issues businesses face today are daunting. Having a strong infrastructure and plan in place is crucial. Planning for your yearly budget is a lot easier when you know what’s [...]

Cyber Security Talk with Local Law Firms

  CBM had the opportunity to speak to a group of local law firms about the issues with cyber security yesterday. We were so honored to have been asked to share our knowledge with this highly engaging group. We had Dan Geisler, from Watchguard Technologies, speak with us on the intricacies of Ransomware and Wi-fi security. The group had excellent questions about the security of travelling and using public wi-fi [...]

Risks of Malware Infection via Microsoft Office

  Today, the Department of Homeland Security released a statement about an increased risk of macro-based malware through Microsoft Office products.  I imagine that some of you are saying "what", "huh", "blah"...moving on to another article.    DON'T GO JUST YET, IT'S IMPORTANT! Macros are basically used to automate tasks inside Microsoft Office such as Word and Excel.  When opening a file that has macros, the Office application will provide you with this [...]

CBM Recognized on MSPmentor 501 List for 2016: Top 500 IT Service Providers

  CBM Technology Ranked Among Top 501 Managed Service Providers by Penton Technology’s MSPmentor 9th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology May 26, 2016: CBM Technology ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to Penton Technology’s 9th-annual MSP 501 list and study. The top MSP 501 companies ranked this year include organizations from around the world and [...]

Business E-Mail Scams on the Rise

If you haven't already heard, there is a rise in business leader identity theft and its costing businesses big time! Cyber criminals are getting creative with their attempts to exploit businesses for a profit. They do their research and impersonate the decision makers. Then, in company-specific jargon, they request a sum of money to be wired. It may sound unbelievable, but businesses fall for it more often than you would [...]

QuickTime No Longer Supported- Windows Users Delete!

Homeland Security’s US Computer Emergency Readiness Team advises to uninstall QuickTime from all Windows machines as Apple is ending support. This means Apple will no longer be providing security updates, and as we all know that leaves the threat of security holes wide open. As prevalent as Ransomware and Zero-Day Malware is these days, it is absolutely necessary to update and patch any security holes that arise. QuickTime for Windows currently [...]

Emergency Patch for Adobe Flash- Zero-Day Exploit

Emergency Flash Patch Issued After Zero-Day Exploit Uncovered   Cyber criminals have managed to find a vulnerability in the Adobe Flash software. Adobe issued an emergency security patch after being notified by a cybersecurity company. Having Flash on your computer allows for the Zero-Day virus to make its way into your computer. It doesn't require you to open the software or any application, making it all too easy for your [...]

Habitat for Humanity Lunch

The rain couldn’t stop these happy volunteers! Even though construction for the day was halted, they stepped up and helped out at the Lafayette, LA ReStore. We are always thankful for Habitat for Humanity Volunteers, and feeding them is the least we can do! Every chance we get, we try to put together a truly Louisiana meal for these helpful volunteers. This week we decided on red beans and rice. Every [...]

Watchguard Advisory Council

2016 Watchguard Advisory Council Member   We are so pleased to announce our placement on the Watchguard Technologies Advisory Council. We look forward to working in an advisory capacity in the coming year. It is critical for us to work closely with our partners to drive toward mutual success. We are happy to partner with a company that provides such quality products, a collaborative nature and a vision of a [...]

World Backup Day

BACKUP YOUR DATA Today is World Backup Day. Are you ready? Would your data be safe if a disaster happened? 29% of disasters are caused by accidents. It can happen to anyone. Backing up your data is painless with CBM's Backup and Disaster Recovery. We partner with Veeam, the best in the business for backup and disaster recovery, and virtualization. 1 in 10 computers is infected with a virus every month. [...]

LeChiffre, A New Ransomware to Look Out For

Ransomware Is On The Rise Be Careful What You Click   There is a new threat in the world of Ransomware. Read the article below from Malwarebytes LABS to learn more about what LeChiffre is and how to look out for it. Protect your business from this devastating malware with Managed Antivirus and  Watchguard APT Blocker from CBM Technology. Worry less about the threat of ransomware with free virus removal [...]

We Earned CompTIA Trustmark

  CBM Technology is the FIRST Louisiana technology company to earn the CompTIA Managed Services Trustmark.   CBM Technology announced today it has received the CompTIA Managed Services Trustmark™, a respected industry credential that signifies its adherence to best practices for technology service delivery and customer interaction. “Earning this credential identifies CBM Technology as a business that meets or exceeds the best business practices the IT industry has to offer,” [...]

Go to Top