The LMT Blog

Business Continuity vs. Disaster Recovery

Aug 19, 2020 8:30:00 AM / by Alma Vieru posted in IT, technology, Cybersecurity, COVID-19, Business Continuity, Disaster Recovery, BCDR, Small Business, Business

0 Comments

It was the early morning hours when the phone rang. A fire had broken out in the building where we had our business. We threw on our coats and raced to the location. All I saw were flames and smoke as the firefighters worked to gain control of the blaze. It wasn't a surprise when I was informed the structure was a total loss - and everything in it. Where do we go from here? 

Read More

Warning! Vendor Email Compromise on the Rise

Aug 12, 2020 9:00:00 AM / by April L. Sy and James Keeler posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Vendor Email Compromise, VEC, Cybercrime, Cyber Crime, Silent Starling

0 Comments

There’s a phishing attack out there that is stealthy and not easily detected until the damage is done. It’s called Vendor Email Compromise, and it’s worth billions worldwide.

Read More

As We All Re-Open

Jun 18, 2020 3:01:00 PM / by Alma Vieru posted in Coronavirus, COVID-19, New York Reopens

0 Comments

These past three months have truly been unprecedented. No one could have foreseen the dramatic effect COVID-19 would have on individuals, families, and businesses in New York State and around the globe. LMT has taken rigorous steps to reduce the risk of the spread of COVID-19 and other communicable diseases.

Read More

Alert from KnowBe4 - Massive Excel Phishing Attack

Jun 10, 2020 10:19:35 AM / by KnowBe4 posted in Cyber-Security, Cybersecurity, Email Compromise

0 Comments

Microsoft has reported a massive phishing campaign that uses an Excel attachment as bait. The phishing email looks like it is from the Coronavirus Research Center of John Hopkins University–a well known medical organization in the US. The email includes an Excel attachment that is disguised as an updated list of Coronavirus-related deaths, but the file actually contains a hidden piece of malware.

Read More
Share on Social:

    Subscribe to Email Updates


    New call-to-action

    Recent Posts