The Big Role of Cloud Networking Security for Small Businesses

The Big Role of Cloud Networking Security for Small Businesses

FRESNO, California – Cody Sarhan, Communications Specialist

Cloud networking has emerged as a game-changer for small businesses. The ability to access and manage data and applications from anywhere, at any time, has irrevocably fueled innovation and growth. However, amidst the many benefits, a significant concern looms large — security. As small businesses increasingly migrate their operations to the cloud, the importance of robust cloud networking security cannot be overstated.

“We believe we’re moving out of the Ice Age, the Iron Age, the Industrial Age, the Information Age, to the participation age. You get on the Net and you do stuff. You IM (instant message), you blog, you take pictures, you publish, you podcast, you transact, you distance learn, you telemedicine. You are participating on the Internet, not just viewing stuff.” — Scott McNealy, Former CEO of Sun Microsystems

The Rising Trend of Cloud Adoption

Before delving into the realm of security, it’s crucial to understand the trajectory of cloud adoption among small businesses. The pandemic saw a paradigm shift in the industry as more and more companies, big and small, shifted their business to the cloud. As of 2022, nearly 6 out of 10 businesses utilize cloud services in some capacity. That number is expected to go up drastically over the coming years as technology accelerates, and the benefits of cloud services increase. The ubiquity of cloud computing in the modern business ecosystem is undeniable and only getting more cost-effective, and more efficient.

“I don’t need a hard disk in my computer if I can get to the server faster… carrying around these non-connected computers is byzantine by comparison.”  Steve Jobs, Late Chairman of Apple (1997)

In a recent survey, Deloitte concluded that small and medium businesses that used cloud computing made 21% more profit and grew 26% faster.

Learn more: How BCT can elevate your business with cloud technology

How Poor Cloud Security Impacts Small Businesses

While cloud networking empowers small businesses with agility and scalability, it also introduces a new set of security challenges. Cybercriminals are well aware that small businesses might have limited resources devoted to cybersecurity, making them potential targets. A recent study by Verizon’s Data Breach Investigations Report indicated that 28% of breaches involved small businesses. This alarming figure underscores the pressing need for fortified security measures.

The aftermath of a security breach can be financially crippling for a small business. Not only is there the cost of data recovery and system restoration, but also potential legal and regulatory penalties, as seen with the implementation of data protection regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). According to IBM’s Cost of a Data Breach Report in 2020, the average cost of a data breach for a small business was approximately $3.86 million.

Key Elements of Cloud Networking Security

  • Data Encryption. Utilizing encryption techniques ensures that even if unauthorized access occurs, the stolen data remains indecipherable. End-to-end encryption, where data is encrypted from its point of origin to its final destination, offers an extra layer of protection.
  • Multi-Factor Authentication (MFA). MFA bolsters user authentication by requiring multiple forms of verification before granting access. This prevents unauthorized users from gaining entry even if they possess the correct password.
  • Regular Updates and Patch Management. Outdated software and systems are often exploited by hackers. Regular updates and patch management help to seal potential vulnerabilities and enhance overall security.
  • Threat Detection and Prevention. Regular monitoring enables the early identification of suspicious activities, such as unauthorized logins or data transfers, enabling timely intervention before they escalate into major security breaches.
  • Vulnerability Management. By monitoring system performance and software behavior, businesses can quickly identify and address vulnerabilities that could potentially be exploited by cybercriminals.
  • Incident Response. Effective incident response relies on real-time data. Continuous monitoring provides the information necessary to understand the nature and scope of an incident, allowing for a quicker and more targeted response.
  • Compliance and Auditing. Many industries have regulatory compliance requirements that necessitate regular monitoring and reporting of security practices. Consistent monitoring helps businesses demonstrate compliance and maintain their reputation.
  • Employee Training. Human error is a significant factor in security breaches. Educating employees about best practices, such as recognizing phishing attempts and safeguarding sensitive information, is paramount.

Learn more: How BCT can protect your small business from cyber threats

How BCT Can Help You Embrace Security as a Competitive Edge

Beyond mitigating risks, robust cloud networking security can be a competitive advantage for small businesses. It acts as both a sword and a shield in defense against cybercriminals. BCT Consulting demonstrates a commitment to safeguarding client data through our state-of-the-art services, commitment to trust, and outstanding expertise in the field.

At BCT, your data is secured in our Level 3 datacenter and secured by 3-factor authentication. You will never have to worry about data loss due to physical theft, fire, or vandalism.

For more information about how BCT Consulting can help elevate your business with cloud services, contact one of our highly skilled technicians today.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco & The Bay Area, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, Palm Springs, and more.

Cody Sarhan | Communications Specialist, Xobee Networks

Data Gold Rush: How Meta, TikTok, and X Are Using Your Data to Raise Stocks

Data Gold Rush: How Meta, TikTok, and X Are Using Your Data to Raise Stocks

FRESNO, California – Cody Sarhan, Communications Specialist

Social media has become an interconnected part of our lives, for better or worse. It provides us with a way to stay connected in a world that is becoming increasingly less social. However, with its widespread use, and rise to prominence, concerns about data collection and privacy have loomed large. Recent events, including the TikTok court hearing, the launch of Threads, and the rebranding of the artist formerly known as Twitter, have further underscored the urgency of addressing these issues.

We at Xobee Networks want to offer tips on safeguarding your personal information from companies like Meta or X Corp., and platforms such as Facebook, Instagram, and TikTok. By highlighting the growing apprehension surrounding social media data collection, we aim to offer a toolkit to help you stay both aware and protected.

Learn more: How BCT can help protect your privacy and data

How Big Data Can Be a Big Problem

Social media platforms are designed to encourage users to share their thoughts, experiences, and personal information openly. However, this openness has paved the way for a complex web of data collection mechanisms that often occur unnoticed. Every click, like, share, and comment generates valuable data points that platforms can use to build detailed user profiles, which can then be leveraged for targeted advertising, selling to data brokers, interfere with elections, and other purposes. This isn’t to mention the information users fill out for their bios which can include, age, region, gender, and more.

Data brokers are among the biggest concern when it comes to data harvesting. It’s one thing for a company like Meta to have your data, but when a data broker has purchased your personal and sometimes private information from multiple companies, it can achieve some astonishing things.  Take Acurian for example, a company that recruits people for various drug trials on behalf of medical companies. They can employ powerful guesswork based on your data to paint a digital portrait of you and your history with terrifying accuracy.

“We are now at a point where, based on your credit-card history, and whether you drive an American automobile and several other lifestyle factors, we can get a very, very close bead on whether or not you have the disease state we’re looking at” — Acurian’s senior vice president of operations told the Wall Street Journal in 2013.

It’s easy to see how companies can leverage this data to advertisers, solicitors, brands, and more. What is even more scary is the idea of what happens to this data, when a platform like Facebook gets hacked, and how bad actors can weaponize that data for all kinds of nefarious reasons.

— Video Courtesy of CNN Business

TikTok vs User Privacy

In a significant legal battle, TikTok recently found itself in the crosshairs of a court hearing related to data privacy concerns. The Chinese-owned social media giant faced allegations that it had been illicitly collecting and mishandling user data, raising red flags about the potential misuse of personal information. This incident exemplifies the broader problem of social media platforms potentially exploiting user data for their gain, raising questions about the extent to which our personal information is being harvested without our consent.

Meta and its platform Facebook, has been a focal point in the data privacy debate. Its vast network of services and apps enables it to collect an immense amount of user data. The same concerns that emerged with the TikTok court hearing are applicable here, as the line between data collection for customization and data exploitation becomes increasingly blurred.

Protecting Yourself in the Age of Data Collection

While complete avoidance of social media might not be a realistic solution for many, there are steps you can take to protect your personal data and maintain some semblance of privacy:

  • Review Privacy Settings Regularly. Social media platforms often update their privacy settings. Make it a habit to review these settings both in the app and on your phone, and adjust them to limit the amount of information you share with the platform and third-party advertisers.
  • Mindful Sharing. Think twice before sharing personal information online. Consider whether the benefits of sharing outweigh the potential risks to your privacy.
  • Limit Third-Party App Access. Many platforms allow third-party apps to access your data. Be cautious about granting access and revoke it for apps you no longer use.
  • Two-Factor Authentication (2FA). Enable two-factor authentication wherever possible to add an extra layer of security to your accounts.
  • Regular Log Out. Remember to log out of your accounts when you’re done using them, especially on shared devices.
  • Educate Yourself. Stay informed about the data privacy policies of the platforms you use. Being aware of what data is being collected and how it’s being used empowers you to make better choices.

As the digital landscape evolves, the concern surrounding social media data collection and privacy remains at the forefront. The TikTok court hearing serves as a reminder that our personal data is a valuable commodity, and it’s crucial to be proactive about protecting it. By staying informed, adjusting privacy settings, and being mindful of what you share, you can strike a balance between enjoying the benefits of social media while safeguarding your personal information from the ever-watchful eyes of these mega corporations.

For more information about how BCT Consulting can help protect your privacy and your data, contact one of our highly skilled technicians today.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco & The Bay Area, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, Palm Springs, and more.

Invasive Innovation: How Stalkers Abuse Apple AirTags & Tile Devices to Monitor Movements

Invasive Innovation: How Stalkers Abuse Apple AirTags & Tile Devices to Monitor Movements

FRESNO, California – Cody Sarhan, Communications Specialist

In an era of rapidly advancing technology, the convenience and functionality offered by tracking devices such as Apple AirTags and Tile cannot be denied. These small, unassuming devices are designed to help individuals keep tabs on their belongings, but their potential for misuse raises significant concerns about personal privacy and security. In the third article we’ve covered on privacy protections, we’re tackling these rising concerns and how they relate to your personal privacy safety. As more people adopt these devices into their daily lives, it’s crucial to recognize the potential dangers they pose in enabling stalking and tracking, and to understand how to safeguard against these risks.

“If you want to track somebody, that’s what these are designed for, and that’s where the problem really comes in. You have something that its intended use and its malicious use are almost identical.” — Justin Cappos, Associate Professor of Computer Science and Engineering at NYU Tandon School of Engineering

One of the most alarming concerns is the potential for unintended surveillance. While these devices were initially intended to make our lives easier, they can be misused for malicious purposes. Stalkers and individuals with ill intentions can easily attach these tiny devices to personal items, allowing them to monitor someone’s movements without their consent or knowledge. The prospect of being unknowingly tracked raises significant ethical, privacy, and personal safety concerns.


— Video courtesy of ABC News

Another issue to contend with is the potential for data breaches. The data collected by these tracking devices, including location information and personal data, can be vulnerable to hacking and exploitation by cybercriminals. This puts individuals at risk of having their sensitive information exposed and potentially misused for financial gain or personal harm.

Learn more: How BCT can help protect your privacy and data

Steps to Protect Yourself

In light of these concerns, it’s essential to take steps to protect ourselves from potential misuse of tracking devices. While some accessories like Tile have their own tracking app, company’s like Apple and Android are doing their part to help implement features created specifically to discourage people from trying to track you without your knowledge. Tile also has a step-by-step guide to help with privacy protection.

Prevention and Monitoring for iOS Devices

  • The Find My Network: If you have an iPhone, iPad, or iPod touch, Find My will send a notification to your Apple device. This feature is available on iOS or iPadOS 14.5 or later. To receive alerts, make sure that you:
    • Go to Settings > Privacy & Security > Location Services, and turn Location Services on.
    • Go to Settings > Privacy & Security > Location Services > System Services. Turn Find My iPhone on.
    • Go to Settings > Privacy & Security > Location Services > System Services. Turn Significant Locations on to be notified when you arrive at a significant location, such as your home.
    • Go to Settings > Bluetooth, and turn Bluetooth on.
    • Go to the Find My app, tap the Me tab, and turn Tracking Notifications on.
    • Turn off airplane mode. If your device is in airplane mode, you won’t receive tracking notifications.
  • Use NFC Scanner: Some iPhone’s are able to use the built-in NFC scanner to detect nearby AirTags. Using this Control Center you can scan to find items to ensure you’re not being tracked without your knowledge.
  • An AirTag, AirPods Pro (2nd generation) charging case, or Find My network accessory that isn’t with its owner for a period of time will emit a sound when it’s moved.

Prevention and Monitoring for Android Devices:

  • Check Connected Devices: In your Bluetooth and Location settings, review connected devices and active location-sharing apps. Disconnect any unfamiliar devices and revoke permissions from suspicious apps.
  • Regularly Review App Permissions: Periodically review the permissions granted to your apps. Disable location access for apps that don’t require it for core functionality.
  • Use Anti-Tracking Apps: In response to the growing concern regarding AirTags, Apple has launched the Tracker Detect app on Android, which isn’t as feature rich as the Find My network on Apple devices, and you have to manually scan your surroundings instead of it running in the background. Outside of this, some third-party apps are designed to detect tracking devices. Research and install reputable apps that help identify potential threats.

Stay Informed. Stay protected.

Staying informed about the latest developments and potential risks associated with tracking devices is crucial. Organizations like the Electronic Frontier Foundation (EFF) and the Cybersecurity and Infrastructure Security Agency (CISA) provide valuable resources and insights into digital privacy and security.

We at BCT Consulting put privacy and personal security at the forefront of everything we do. While the convenience offered by tracking devices like Apple AirTags and Tile comes with its benefits, it also comes with a with a price – the potential for stalking, digital surveillance, and data breaches. It’s important to approach their use with caution and a strong emphasis on personal security. By remaining informed and taking proactive measures, we can strike a balance between convenience and protecting our privacy in an increasingly connected world.

For more information about how BCT Consulting can help protect your privacy and your data, contact one of our highly skilled technicians today.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco & The Bay Area, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, Palm Springs, and more.

The Risky Business of Operating Without a Privacy Policy

The Risky Business of Operating Without a Privacy Policy

FRESNO, California – Cody Sarhan, Communications Specialist

Transparency and trust, those two things are key when it comes to operating a business on today’s privacy-conscious Internet. You may have noticed a significant rise in privacy-related news regarding our online footprint. From recent court cases involving TikTok, Facebook data collection outrage, or even cookie consent being needed to view certain websites, privacy regulations are being noticed everywhere. In part two of our series covering privacy protections, we explore the nature of privacy policies and how they pertain to business websites.

As technology advances, privacy has become a significant concern for individuals and businesses alike. Small businesses, in particular, need to pay careful attention to privacy regulations to protect their customers’ data and avoid legal repercussions. In the state of California, recent legislation has highlighted the importance of having a privacy policy on your business’s website.

But what has brought this change on, and why should businesses operating in ignorance or indifference of this shift in both the global and legal consciousness be concerned?

“The data collected by the vast majority of products people use every day isn’t regulated. Since there are no federal privacy laws regulating many companies, they’re pretty much free to do what they want with the data, unless a state has its own data privacy law.” — Thorin Klosowski, Wirecutter

The Significance of Privacy Policies

To establish the importance of why businesses need privacy policies it’s important we first establish what a privacy policy is. Privacy policies serve as legal documents that outline how businesses collect, use, and protect user data. They inform individuals about the type of information gathered, its purpose, and the measures taken to ensure data security. Privacy policies are vital for establishing trust between businesses and their customers, demonstrating transparency, and complying with relevant privacy regulations

California is one of three states with comprehensive data privacy laws

Source: NY Times

Image: IAPP

Recent California Legislation: CalOPPA, CCPA, and CPRA

California has been at the forefront of privacy legislation with the introduction of several significant laws in recent years. Understanding these laws is crucial for small businesses operating within the state, and without proper adherence to this new legislation, businesses may find themselves on the wrong side of a lawsuit.

  • California Online Privacy Protection Act (CalOPPA): CalOPPA was enacted in 2004 and requires commercial websites and online services that collect personally identifiable information (PII) from California residents to post a privacy policy on their websites. This law aims to protect consumers’ online privacy and inform them about data collection practices.
  • California Consumer Privacy Act (CCPA): In 2018, CCPA came into effect, granting California consumers more control over their personal information. It applies to businesses that meet specific criteria, such as those with an annual gross revenue of over $25 million, or those that handle the personal information of at least 100,000 consumers. The CCPA mandates that covered businesses provide detailed privacy policies, inform consumers about their rights, and offer opt-out mechanisms.
  • California Privacy Rights Act (CPRA): Approved by California voters in November 2020, CPRA builds upon CCPA and strengthens privacy protections further. CPRA introduces additional requirements for businesses, such as enhanced disclosure obligations, increased rights for consumers, and the creation of the California Privacy Protection Agency (CPPA) to enforce privacy regulations effectively.

Lawsuits & Legal Consequences

Failure to comply with privacy regulations can lead to severe legal consequences for small businesses. Lawsuits filed against companies for non-compliance with privacy laws, including the absence of a privacy policy, have been on the rise. These legal actions can result in substantial fines and damage to a business’s reputation.

“In reality, the list of lawsuits regarding privacy policy changes is fairly long, and I suspect that it will get longer over the next few years.” — Dan Lohrmann, Field CISO for Presidio

How BCT Can Help You Meet Compliance

In California, small businesses must recognize the importance of privacy policies and comply with the evolving privacy regulations. Laws like CalOPPA, CCPA, and CPRA place significant emphasis on transparency, user rights, and data protection. Neglecting to have a privacy policy or violating privacy regulations can result in legal repercussions and damage to a business’s reputation.

As the leading MSP across all of California, BCT Consulting can help you meet state compliance when it comes to privacy protection rights. By prioritizing privacy, small businesses can not only meet legal obligations but also build trust with their customers and foster a secure and transparent online environment.

Contact us to learn more today.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco & The Bay Area, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, Palm Springs, and more.

Cody Sarhan | Communications Specialist, Xobee Networks

Privacy Protection: The Risk & Reward of AI & Cybersecurity

Privacy Protection: The Risk & Reward of AI & Cybersecurity

FRESNO, California – Cody Sarhan, Communications Specialist

With the rapid advancements in technology, particularly in the realm of artificial intelligence, concerns surrounding internet privacy have become more pronounced. The convergence of AI, privacy policies, network vulnerabilities, and social engineering has created a complex landscape where personal and company information is increasingly at risk. In the first of a three-part series of articles concerning internet privacy protections, we look to address the advancements in AI tools and how they can both help and hurt a small business.

“Security experts have noted that AI-generated phishing emails actually have higher rates of being opened — [for example] tricking possible victims to click on them and thus generate attacks — than manually crafted phishing emails.” — Brian Finch, co-leader of the cybersecurity, data protection & privacy practice at Pillsbury Law

AI Is A Double-Edged Sword

As technology continues its rapid advancement, AI capabilities stand out amongst various other innovations as revolutionary transformations in how we interact online. However, despite their strengths, like better consumer experiences with and more customization than ever thought possible, AI algorithms utilized today are capable of aggregating mass amounts of data collected from individual user behaviors and information. These algorithms have the power to enhance user experiences and improve services, but they can also be weaponized.

Learn more: How BCT can protect your business data and systems

Social Engineering, Manipulation, & Fake News

AI-driven chatbots and voice assistants may quickly deceive unsuspecting users through impersonation; tricking users into giving away sensitive data. Additionally, by analyzing large amounts of personal data, AI algorithms can create sophisticated social engineering attacks that are difficult to detect.

The damage caused by these security violations, from increasingly sophisticated imposters and social engineering scams is profound and far-reaching.

New tools are hitting the market every day from advanced photo generation, video manipulation, widespread bot propagation, synthesized voice technology, language models, and so much more. These things combined have the power to generate advanced takedowns, infringe on copywrite trademarks, and create propaganda machines aimed at companies to tarnish reputations enough to drive stocks down, or worse shutter them completely.

Learn more: How BCT can protect your email from viruses, phishing, malware, and more

How AI Model Poisoning Affects SMBs

AI model poisoning, also known as adversarial attacks or data poisoning attacks, occurs when an individual or entity intentionally manipulates the training data of an AI model to compromise its performance or cause it to produce incorrect results. This manipulation is aimed at exploiting vulnerabilities in the model and can have serious consequences.

As a small business owner, AI model poisoning should be a significant concern for several reasons:

  • Compromised Decision-Making: If your business relies on AI models for critical decision-making processes such as fraud detection, customer recommendations, or risk assessments, a poisoned model could produce inaccurate results. This can lead to financial losses, reputational damage, and even legal consequences.
  • Data Security & Privacy: Poisoning attacks involve injecting malicious data into the training process, potentially jeopardizing the security and privacy of sensitive business information or customer data. This can result in data breaches, unauthorized access, and misuse of confidential information.
  • Reputation & Trust: If your AI systems are compromised due to model poisoning, it can erode the trust your customers have in your business. Loss of trust impacts customer satisfaction, loyalty, and overall reputation, which can ultimately affect your bottom line.

By taking proactive steps to secure your AI models and staying informed about potential threats, you can minimize risks and enjoy the benefits of AI in a safer manner.

How BCT Can Help Protect Your Business

At BCT Consulting, we keep a sharp eye on industry standards and emerging technologies to help better serve our clients. By being on the cutting edge of these technological advancements, we can help build better systems for our clients — no matter if we’re converting an older system or creating a fully tailored solution for our clients’ specific needs.

We conduct risk assessments, identify vulnerabilities, and provide tailored security solutions. Through our robust security measures, detection systems, and advance encryption protocols we have the power to secure your business against the most aggressive AI-enabled intrusions. In the event of a breach, our constant monitoring, validation, and authentication procedures enable us to offer rapid incident response. We can assist with data recovery and though continuous monitoring, maintenance, and employee training we can enhance security.

By partnering with BCT, your businesses can benefit from expert support, proactive security measures, and the ability to focus on core activities while safeguarding your systems and data.

Contact one of our highly skilled technicians to learn more today.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco & The Bay Area, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, Palm Springs, and more.

Cody Sarhan | Communications Specialist, Xobee Networks

BCT Consulting Seeks Bitwise Applicants

BCT Consulting Seeks Bitwise Applicants

The City of Fresno is partnering with the Fresno Regional Workforce Development Board (Workforce-Connection) to host a job fair this Friday, aimed towards assisting former Bitwise employees find employment following the tech company’s high-profile fall from grace late last month.

The job fair is scheduled outside Fresno City Hall from 10 a.m.-1 p.m., and will serve to assist the more than 400 families impacted by the recent closure of the tech company.

“The goal really is to turn something that was very evil into something that is very, very good,” Dyer said during a press conference Friday. “We want to demonstrate our support today for the more than 400 Bitwise employees that call Fresno home who abruptly got furloughed, as we all know.”

Dyer went on to say that the way Bitwise Industries shuttered its doors was unusual not in just the city or state, but throughout the country, locking email accounts and discontinuing all communications with past employees, in addition to the unexpected loss of both jobs and benefits.

Diane Jensen, Workforce Connection’s government relations coordinator, said that as of Monday afternoon, 47 businesses and/or organizations will be participating in the fair, including Trillium Flow Technologies, Producers Dairy, Excelsior Inc., Fowler Packing and Mid Valley Disposal, as well as several city and government agencies including Central and Fresno Unified School districts, State Center Community College District and the City of Fresno itself.

“Our goal, of course, is to get all of our Bitwise employees working again,” Jensen said. “From the number of employees I don’t think that would be too far fetched if we have the match.”

Jensen said that the variety of employee specializations that former Bitwise employees display will help to fill a large number of available positions.

Workforce-Connection’s Rapid Response team assists recently furloughed or laid off employees, but Jensen said that due to the lack of a Worker Adjustment and Retraining Notification (WARN) Act filing, the urgency of the situation is unprecedented.

The California WARN Act requires employers with 100 or more employees to provide 60-days notice prior to mass layoffs and furloughs.

According to reports, Bitwise did not file any WARN Act notice prior to last month’s furloughs — prompting a class-action lawsuit from some employees filed last week.

“Our goal with Rapid Response is to get them employed within 45 days of their layoff,” she said. “When we have that advance notice, we can provide them with the resources.”

Several businesses and organizations, including BCT Consulting and the City of Fresno, have voiced their support and interest in former Bitwise employees.

“Our hearts go out to all those who have been impacted by this unfortunate event, as we recognize the challenges faced when unexpected changes disrupt lives and careers,” said BCT Consulting Founder and CEO Eric Rawn in a press release Friday.

Rawn added that BCT Consulting is in the process of expansion and would like to extend an invitation to former employees to apply for positions with the Fresno-based IT support and web design company.

“We, as a City, will also have many of our departments that will be here as well offering jobs to people,” Dyer said. “We have several hundred jobs that are open and if there’s a way that we can match skillsets…we want to take advantage of that and hire these Bitwise employees.”

Friday’s job fair, while geared toward former Bitwise employees, is open to all Fresno and Fresno County residents.

“It’s not just for Bitwise employees,” Jensen said. “Anyone in the Fresno area or Fresno County — if they’re looking for work, come out. There are so many opportunities.”

In addition to the job fair, Workforce-Connection will also host resume and interview workshops at its 1455 E. Shaw Ave. office on Tuesday to assist prospective employees with on-the-spot training. A resume writing workshop will run from 9 a.m.-noon, with interview prep workshops scheduled from 1 p.m.-3 p.m.

BCT Consulting now has engineers servicing clients within Fresno, Clovis, Madera, San Jose, Sacramento, San Francisco, Los Angeles, Santa Monica, Las Vegas, Bakersfield, San Diego, San Luis Obispo, Anaheim, and Palm Springs. If you wish to learn more about our services, contact a team member here.

Call Us Today!