Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

New Lures for Phishing A recent security alert from the online payment processing company Stripe has informed users of a phishing scam that shows just how fast hackers adapt to the efforts used to counter their tactics. Stripe is successfully used by small business owners, charities, and individual consumers for payment & donation processing.  Recently, some customers may have received a fake email claiming to be from Stripe Support indicating that their account details are not valid, and until the user updates their information, no pending payments can be issued. ...
There’s a tweet that has Twitter aflutter. It includes the news that Twitter inadvertently sent users’ email addresses and phone numbers that were provided for security purposes, including two-factor authentication (2FA) phone numbers, to advertisers for targeted marketing....
It’s the Little Things When we think about cybersecurity, we might first imagine big data centers being guarded.  Hackers working diligently in the shadows to compromise a large network or company and “maybe” get to our information at some point.  But like all things in life, the little things add up....
I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This recent breach is all a part of their announced intent to put data of 1 billion users up for sale.   And he/she seems to be making progress because by April, they had reportedly stolen 932 million user credentials from a whopping 44 companies....
October 1, 2019 — Breach Secure Now! today announced its commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to this year’s NCSAM theme of ‘Own IT. Secure IT. Protect IT.’ which encourages everyone to #BeCyberSmart through cybersecurity best practices....
Knowledge is power.  And when it comes to fighting hackers, we need all the power we can collectively find.  Educating your employees is the key to preventing cyberattacks, and Chubb’s Third Annual Cyber Report confirms this. With small businesses having a tendency to have limited funds and resources when it comes to “extras”, cybersecurity training is no longer an extra to be dismissed until the time is better.  The time is now and the best defense is to make sure you are taking the steps to protect your business. ...
Instant Money…Maybe? The popular commercial asks, “What’s in your wallet?” and if you ask most anyone, it probably isn’t cash.  The slow death of bill carrying was first hit by the credit and debit card.  Then we were able to pay via our watches and smartphones.  Now, you can just click an app and send cash to be delivered instantly....
Sunday funnies Remember the Jetsons?  Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks?  Flying cars aside, we aren’t too far off from the technology that seemed so unlikely and impossible.  The future – it’s here....
In the mistaken belief that their companies are not big enough to attract data thieves, small and midsize businesses notoriously resist tightening their IT security, ranking it as a low priority. Yet, when those same SMBs experience a data breach, they sometimes point the finger at their MSPs. Worse, they may file lawsuits and haul their providers into court to recoup financial losses from the breach....
Ransomware that crippled Hollywood Presbyterian Hospital made national headlines but ransomware continues to be a major menace for small to midsize businesses. A print shop in Lubbock, Texas was shut down last week due to ransomware. An employee opened an infected file and ransomware took control of the network....
A survey by Mayer Brown shows companies consider the disclosure of PII the biggest cyber related threat. Survey respondents overwhelmingly considered the disclosure of personally, identifiable information as the biggest cyber-related threat to their companies (63%). Concern about interruption of business operations such as system sabotage ranked second (24%)....
The CEO of Lloyd's of London, one of the largest insurance companies in the world, says that cyber risk is the most serious threat to businesses Inga Beale, chief executive of Lloyd's, said: “Cyber risk poses the most serious threat to businesses and national economies, and it’s an issue that’s not going to go away. This threat is driving a big push for Cyber Insurance...
Breach Secure Now! can help your MSP move from Managed Services to Managed Security Services....
An article over at The Guardian called Cybercrime and hacking are even bigger worries for small business owners gives good advice on how a small business can protect themselves from cyber-crime. A lot of small businesses do not properly protect company and customer information...
There is a good article over at Privacy Risks Advisors that discusses what to consider when buying cyber insurance. Consider the Need for Cyberinsurance There are now a number of cyberinsurance products available, and the scope of coverage varies from insurer to insurer. These policies typically cover losses and liabilities such as:...
It’s holiday blockbuster season!  The time of year when the big screens are full of movie releases that are expected to pull in the crowds that want to watch Marvel and DC Comic heroes unite to save the world. They come from all realms to fight the dark forces that threaten humanity.  Together they will save the planet and it usually happens while the human race is blissfully unaware of the dangers that lurk in unknown territories, as they work silently and slowly to initiate our demise and take over the planet. ...
We often discuss the proactive approach that you should take when it comes to cybersecurity.  Security risk assessments will identify the gaps, ongoing training will help to strengthen the human risk factor, and tools like Catch Phish will keep the team engaged and learning along with those training programs.  But the fact is, you can’t eliminate all the risks that your clients face when it comes to experiencing a data breach.  That means that having an incident response plan (IR) should be on your list of "must-haves" when it comes to smart cybersecurity....
This past week Howard University had to cancel classes due to “unusual activity on the University’s network”. As a result, their Enterprise Technology Services (ETS) team shut down the school’s classes for the day to investigate the situation which they identified as a ransomware attack.  This incident brought to light the consideration of how deep and wide the net can be cast when an attack takes place on an entity such as this. While nothing is confirmed with the Howard University incident, it does mean that we must pause to consider the range of data that could be compromised. ...
Last week the President met with leaders in the private sector as well as those in education to discuss the need to address cybersecurity threats to the nation and efforts needed across the board.  The increase in incidents and the ongoing threat of attack is something that transcends all the invisible borders that we put on humans or businesses.  In other words, cybercriminals don’t care about your race, religion, income, or the industry that you work within.  Data is valuable to them however it needs to be obtained and whatever information it can provide – it all adds up....
Last week we saw the mobile phone carrier T-Mobile fall victim to cybercriminal activity when a hacker accessed the personal data of their users.  They learned of the breach via claims that were made on an online forum.  This led to an investigation and hiring of cybersecurity experts to help with the situation....
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
SmileDirectClub (SDC) is a business that offers teledentistry services throughout the world.  They produce and sell transparent retainers that fix crooked teeth in the way that traditional braces work.  With 60-75% of people in need of their services, they are poised for long term success, with a large audience of potential patients....
There’s a March Madness of a different kind that happens each year during this time of tournaments: the onslaught of phishing emails that users fall for over and over again. With pools that take place in our offices, among friends, or to the individual who wants to join a group online, hackers are handed a very easy way to get us to click as we look to participate and enter our bracket choices....
Cybersecurity Awareness Month is the perfect time to “shine a light” on the ways that your clients can be aware of the threats that they face when it comes to cybersecurity, as well as provide ways to mitigate the risk factors that can allow cybercriminals easier access.  In addition to our very own marketing toolkit that you can download for free, we’ve also found other items that you can use to complement the resources that we’ve provided for this month – or year-round!...
The work of an MSP is often taken for granted – until something goes wrong.  And then you are the first phone call that a client makes and it’s a hurry up and rush scenario.  At Breach Secure Now, our partner-focused mission is the foundation for all that we do.  Our founder Art Gross was (is) an MSP and knows the challenges that you face not only as a professional in the IT industry but as a business leader as well!  So, when there is an opportunity to ‘shine’, we want to make sure you take it and maximize the opportunity!...
In the past year, we’ve all seen how changes can be thrown at us unexpectedly.  We are presented with the need to evolve and grow in ways that can sometimes feel uncomfortable, or even rushed when the landscape that we work within changes.  Despite how it may feel at the time, this is usually a good thing.  We learn what our capabilities are, and we may adapt to learn new behaviors and see new strengths rise within us....
All of the minutes add up! There’s a lot to do when it comes to keeping up with multiple clients who are often in “crisis mode” or reacting to things that they might not understand, which can lead to panic.  You need to have solutions that deploy quickly and do the job right the first time....
This week we welcome Scott McClain, owner of Network Design Consultants as he discusses his experience as an MSP with healthcare clients and how his partnership with Breach Secure Now has contributed to that. After speaking with dozens of medical professionals, we realized the lack of understanding and confusion surrounding HIPAA Compliance. We also have found that most practices are not HIPAA compliant at all. To add to the problem, there are many companies offering “HIPAA Compliance” solutions that they package and sell to the medical community....
October kicks off 2020’s cybersecurity awareness month, and if this year has given us any type of certainty, it’s that smart cyber practices are a necessity. The uncertain, the unexpected, and the unknown all allow for hackers to gain our trust, and eventually access, into our personal and professional records without knowledge or permission....
You can’t help someone effectively if you don’t know the details of their situation.  So how can you determine what your clients need if you are not aware of what they are looking to achieve, the problems that they are trying to solve, or their behavioral tendencies when it comes to decision making?...
Marketing Magic Having an in-house marketing team is not always possible for small businesses.  Also, it can be difficult to maintain an ever-growing and ever-changing list of vendors and products to market. As a Managed Service Provider you face the struggle of not only supporting your clients full time but also carrying the full-time weight of being a business owner.  This can leave little time – or headcount – for a marketing department that is hitting on all of the needs you require to get leads, maintain clients, and educate yourself on what is new to you as a managed service provider....
Zero Trust Access Zero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified.  The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term was first coined in 1994 by Stephan Paul Marsh at the University of Stirling as part of his doctoral thesis that focused on trust. Over the next ten years, it became part of the tech vernacular as it relates to defining the perimeter of security access....
It's back-to-school time, and no matter the age of the student, or the location of the school, there's one class that everyone needs to pass. Smart cybersecurity habits need to be on all of our minds, and we can't afford to fail. We've put together some reminders about staying safe online and with your technology. Before You Start Classes Make sure that you're starting off the academic year on solid footing....
Misrepresenting yourself is easy to do in a world where many of our interactions exist online.  Why not put that profile photo of yourself up at the gym from a few years ago when you actually went there regularly?  You’ll eventually get back to working out.  There’s no harm in it. Deceptive? Sort of.  But in a situation like that, while misleading, it likely won’t cause issues if uncovered.  But what about misrepresentation when it comes to your business? If you apply for cyber insurance and have cybersecurity measures and tools that you’ve purchased but don’t use, is it lying to say that they are “in place”? ...
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’  Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem by initiating multiple redirects after the user clicks or views an infected advertisement....
Imagine if a locksmith created a key for your home or business, then sold a copy of that key to a burglar.  They didn’t steal your belongings, but they provided access, making them integral to the process for it to occur.  Initial Access Brokers (IABs) work in a similar fashion.  The name says it all, they provide the initial access to your account and do this by brokering or selling your credentials to the cybercriminals who will then take it a step further and steal data or deploy ransomware for extortion of funds....
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image data—as its primary function (e.g., optical discs, external or removable hard drives, external or removable solid-state disk drives, magnetic or optical tapes, flash memory devices, flash memory cards, and other external or removable disks).”...
It is so easy to become complacent in our cybersecurity behaviors.  But Android users should be given a shake this week and alerted to malware that is being deployed unknowingly by users who think that they are downloading anti-virus apps via the Google Play store.  There were six different cases found to contain the Sharkbot malware in recent days.  Initially discovered in October of 2021, this banking trojan makes money transfers by stealing credentials and banking information. ...
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Small and medium-sized businesses (SMBs) face unique challenges and opportunities today with the threat of cybercrime and the rise of artificial intelligence. Training employees in these domains is not just a matter of keeping up with trends; it’s a strategic move that can significantly impact your business's success....
Artificial Intelligence (AI) is no longer a futuristic concept; it's a present-day reality transforming industries worldwide. Managed Service Providers (MSPs) are uniquely positioned to lead this AI revolution, guiding small and medium-sized businesses (SMBs) towards enhanced productivity,...
We continue the conversation regarding Artificial Intelligence and how important it is for executive leadership to embrace AI and convey that value to their team in their messaging. BSN is a passionate advocate for leveraging technology to improve workplace efficiency and employee well-being and we...
Microsoft and LinkedIn released their joint Work Trend Index "AI at Work Is Here. Now Comes the Hard Part" which explores the significant impact of AI on the workplace, emphasizing its potential and also addressing the challenges it brings. Key Findings Adoption and Optimism: 70% of workers are eager to delegate as much work as possible...
More than just traditional leadership skills are necessary for businesses to stay ahead of the curve. With the exponential growth of artificial intelligence (AI) technologies, businesses are finding themselves at a crossroads: adapt and thrive or risk falling behind. At the heart of this transformation lies the importance...
Most of us know how Artificial Intelligence (AI) stands out as an innovative and promising transformative solution across industries. Yet, amidst the hype and excitement surrounding AI's potential, its true power lies not in its autonomous capabilities but in its ability to ...
Breach Secure Now, the channel leader in providing cybersecurity and productivity training and solutions, is pleased to announce the appointment of Dan Cucchi as its new Vice President of Sales. In this role, Cucchi will oversee the company's sales strategy, drive revenue growth, and lead the sales team...
This comes from a recent post "Why I Strongly Believe MSPs Need to Embrace AI — From the Guy Who Has Literally Seen It All" The other day, I posted on LinkedIn and in MSP Facebook groups about why I think MSPs should be building an AI practice. I compared this to how MSPs have built cybersecurity practices. I thought it was a logical argument....
Businesses face a range of challenges related to data security.  The threats are ever-changing and evolving to offset our ability to recognize them easily. With human error at the top of the list of risk factors, employees giving away sensitive information is a challenge.  The advent of large language models (LLM), chatbots, and other digital assistants like ChatGPT makes this concern particularly relevant.  Especially for companies that deal with confidential client information or proprietary data. In those cases, the consequences of a data breach can be severe....
The threat of phishing remains prevalent in all aspects of digital life. Both personal and professional. But a recent deep dive by Mandient into the details of a more specific kind of attack that is on the rise. This shines a light on the threat of industrial-themed email attacks and how they can affect operational technology. What is Operational Technology? Operational technology is the hardware or software that monitors and sometimes controls industrial equipment....
Major Impact Earlier this week the Federal Aviation Administration (FAA) announced a nationwide ground stop of all flights.  Approximately 9,000 flights were delayed, and over 1,000 flights were canceled. The reason why?  The NOTAM system (short for Notice to All Air Missions), which is designed to provide real-time information to pilots and air traffic controllers with critical information before takeoff, was down. This system is designed to alert you of such things as runway hazards or unsafe weather conditions and is therefore critical to safety....
Which resolutions have you set for yourself in 2023? Let me guess: get fit, eat healthily, and hit the gym on a regular basis. These are good choices, but how about another way to incorporate training into your schedule? And this one may pay off in dollars saved, not pounds lost. Why Train? Cybersecurity training should not be a negotiable part of any business structure....
You are familiar with phishing. You've taught your clients and colleagues to be on alert for fraudulent emails. But are you changing your approach to education and training to match the sophistication of cybercriminals and their tactics? Smart Phishing Teaching effectively doesn't necessarily mean endless bits of content and methodologies. It means that each lesson and tool should have an impact on users....
A deepfake is a portmanteau (more on that in a moment) of "deep learning" and "fake". What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If you take a photo, audio, or video and replace one person in it with someone else's image, you've created a deepfake. If you create an audio file with a voice that impersonates someone else, you've created deepfake content. With today's technology, this goes beyond cropping your face over someone else's in a photograph....
Small businesses often make the mistake that they have to be cybersecurity experts to have strong security programs in place. Remind them that as their MSP, you can be their expert. The concern is often that learning how to protect their business will be overwhelming. One more thing to do. Or that they need to hire someone internally. So they put it off until they fill that role, or find the right product to enable their team....
You may hear the word ‘bot’ used in conversations, especially around cybersecurity.  But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network.  It describes a network of computers that are infected by malware.  This malware is controlled by a single party, known as the bot-herder.  And each computer that is under that control is known as a bot. ...
How to Get Found  We know that running a business is more than ensuring that you have the right products to resell.  It’s more than having the right people in place to sell, deploy and support those products.  It is about having all of those pieces in place and then having the right people and clients find you.  Ideally, you are a smooth-running machine with all of these components in place, and the best relationships supporting them.  ...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: