Mon - Fri: 8:30am - 5pm24/7 Customer Support
Question? Let's TalkWe're here to help!

Our Blog

Tip of the Week: How to Type Special Symbols

Posted on: January 10, 2018
Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy […]

Read More

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Posted on: January 8, 2018
Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start […]

Read More

Hitman Email Scam Threatens Your Life, Instead of Your Data

Posted on: January 5, 2018
Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life. This email appears in the target’s inbox with […]

Read More

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Posted on: January 3, 2018
Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean. […]

Read More

Why ROBOT is a Risk After Nearly 20 Years

Posted on: January 1, 2018
Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such […]

Read More
Learn More About Bmore Technology
Testimonials
See What People Are Saying:

We recently made the decision to switch IT companies and Bmore Technology offered everything we required. As with any large change, there was some apprehension involved. (more…)

More Testimonials
A Few of Our Partners
Latest News
Our Family Has Grown: Bmore Technology Acquires Carolina Phone & Data Services

Bmore Technology expands footprint in South Carolina BALTIMORE, MD – December 5, 2018 – Bmore Technology has announced the acquisition of Carolina Phone & Data Services (CPDS). (more…)