Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

As a Managed Service Provider (MSP), your healthcare clients rely on you to ensure their IT systems are secure and compliant with regulations. With the increasing threat of cyber-attacks, it is crucial to emphasize cybersecurity alongside HIPAA regulations to your healthcare clients. What is HIPAA? HIPAA compliance is a critical aspect of healthcare IT, and it should not be taken lightly. However, it is not the only concern when it comes to healthcare...
Understanding the many facets of cybersecurity includes an understanding of hacking.  We hear the word hacker, and we immediately think of a character in a dark room, surrounded by monitors as code flashes on the screen where he or she is attempting to compromise a website or business. But that’s not always the case.  What is a Hacker?  Hackers are individuals or groups who exploit security weaknesses in computer systems and networks...
As a Managed Service Provider (MSP) or Small and Medium-sized Business (SMB) owner, you hopefully recognize the importance of cybersecurity. You have invested in security measures to prevent cyberattacks. However, even with the best defenses in place, a breach can still occur. In such a scenario, having a cyber liability insurance plan can be the difference between financial ruin and recovery....
The Biden administration recently announced the new National Cybersecurity Strategy for 2023. This strategy is aimed at safeguarding American infrastructure, businesses, and government agencies against the increasing threat of cyberattacks. The National Cybersecurity Strategy 2023 recognizes the need to address cybersecurity risks in a rapidly changing technological landscape....
In what is perhaps a surprising bit of news, our fears have flipped. In fact, recent studies have shown that Americans are now more fearful of cyberattacks than they are of nuclear war. This shift in perception has significant implications for small and medium-sized businesses (SMBs), as they are particularly vulnerable to cybercrime. According to recent surveys including one by Gallup Americans are more afraid of cyberattacks than nuclear war....
Scammers don't need a reason to take advantage of your trust. And they certainly don't mind if you look or feel foolish. This April Fools, don't be fooled by any of their attempts. Here are some tips to help you avoid falling victim to online impersonators: Verify websites before providing personal information When entering personal information online, make sure you're on a secure website. Check for the "https" in the URL and the lock icon in the address bar, which indicates that the website...
Cybersecurity is a critical concern for all organizations, regardless of their size or industry. Cyber threats continue to evolve, and the stakes for security breaches are higher than ever before. The Cybersecurity Maturity Report 2023, published by CyEsec, is a comprehensive analysis of cybersecurity maturity across various industries. The report analyzed data from over 500 organizations globally and assessed their cybersecurity maturity level...
As most of us are aware, and especially in the tech industry, cybersecurity is a critical concern for businesses of all sizes. With the increasing number of cyber-attacks and data breaches, it's more important than ever for businesses to prioritize ongoing cybersecurity training for their employees. Not only can a lack of training lead to costly data breaches and reputational damage, but it might also impact a business's ability to successfully...
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look back on. This year was one of extraordinary circumstances, and while the situation was unprecedented, the summary of what transpired lends itself to the age’s old advice: Preparation is key. The poet Maya Angelou is credited with saying “When you know better, you do better.” And in knowing better, would that have meant that:...
With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty of our times.  (When does the list of uncertainties stop growing, I wonder?) And again, we find hackers and cybercriminals in a power position to take advantage of our uncertainty of not only what is true, but also who to look for when it comes to dispersing accurate information.  This isn’t discrediting any individual or organization, but we can all agree to admit, chaos can prevail in the current climate of COVID-19....
There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and the opinions are strong. We aren’t here to discuss that side of politics; we’re here to look at how cybersecurity factors into this election process and how it affects all of us, regardless of which “side” you fall on. What Are the Factors?...
No, this is not a political post.  In fact, we know that there are some topics that don’t even merit an effort to try to discuss.  They’re important, but differing opinions each hold their own value.  But when it comes to cybercrime, we should all be a united front.  There is one choice, and that is to make it a top priority with a solid plan to defend and uphold a business’s cybersecurity and the entire network from end to end....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
There is no way to emphasize enough, just how important it is for small businesses to be prepared for a cyberattack. But according to a recent survey by the Wall Street Journal Pro Research of 400 companies and their security officers, many companies are not taking it seriously enough to improve their readiness and risk of exposure....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
It’s holiday blockbuster season!  The time of year when the big screens are full of movie releases that are expected to pull in the crowds that want to watch Marvel and DC Comic heroes unite to save the world. They come from all realms to fight the dark forces that threaten humanity.  Together they will save the planet and it usually happens while the human race is blissfully unaware of the dangers that lurk in unknown territories, as they work silently and slowly to initiate our demise and take over the planet. ...
We often discuss the proactive approach that you should take when it comes to cybersecurity.  Security risk assessments will identify the gaps, ongoing training will help to strengthen the human risk factor, and tools like Catch Phish will keep the team engaged and learning along with those training programs.  But the fact is, you can’t eliminate all the risks that your clients face when it comes to experiencing a data breach.  That means that having an incident response plan (IR) should be on your list of "must-haves" when it comes to smart cybersecurity....
Don’t Be Scammed By a Turkey It’s Thanksgiving week and that also means that the holiday season has officially started for most of us.  And just the holiday season of our youth, as in summer vacation from school, this is the time of year when we as adults tend to put our feet up and let our guard down. ...
Performing a Security Risk Assessment (SRA) is one of the things that Managed Service Providers can utilize as a way to solidify their client relationships and grow their business.  Offering it to existing clients is a way of showing your value as well as helping them to strengthen their security posture.  You can engage with potential clients by offering to do an assessment for them. Additionally, businesses that are in healthcare and fall under HIPAA compliance are required to perform an assessment annually, so it can be used as a tool to strengthen and build those relationships. However, doing so with all of your clients should be a part of your plan regardless of the industry that they work within....
With summertime in full swing, many of us are heading out on vacations that are long overdue.  Whether you’re visiting family, friends, the mountains, or the beach, be “shore” to travel with smart cyber habits that will keep you and your loved ones protected in ways that can’t be fixed with that first aid kit that you stashed in the trunk....
Last week, we discussed the opportunity that is present to best support your healthcare clients, the importance of those organizations being HIPAA compliant, and how cybersecurity comes into play in healthcare. This week, we’re taking an even deeper dive into healthcare cybersecurity to answer the question, Why Is Healthcare Such a Target for Cybercrime?...
1. What would you do if a ransomware attack impacted your business for more than 2 weeks? Most MSPs are really good at backing up and restoring data. That is a core service that MSPs provide to their clients. It would be natural for a client to minimize the impact of downtime of a ransomware attack. MSPs need to discuss the impact of ransomware on systems that are not managed by the MSP. ...
Breach Secure Now is excited to unveil the latest venture with ScalePad...ControlMap integration! Why Integrate with ControlMap? With Breach Secure Now, MSPs can monitor security training within the ControlMap platform and map employee training data directly to compliance controls. This helps MSPs...
Breach Secure Now, a leading cybersecurity training provider, has recently earned recognition as a training leader in the industry. This acknowledgment comes with high praise from Kevin Lancaster, CEO of Navistack, who highlighted Breach Secure Now's exceptional contributions to cybersecurity education in a recent...
At Breach Secure Now, ongoing training is critical to strengthening a business’s cybersecurity posture.  Informed employees make better decisions, including being aware of, and keeping up with, how to respond to cybercriminals’ ever-evolving tactics.  We’ve recently launched ...
Increase in Impersonation Scams According to recent findings by cybersecurity experts, in 2023 there has been a 53% surge in daily cyber threats that target Microsoft Office. And within that statistic, an average of 411,000 malicious files were detected each day. These findings underscore a growing trend of cybercriminals targeting document formats, particularly Microsoft Office and PDFs, and the importance of cybersecurity training....
Having the right tools at your disposal can make all the difference between being busy and being productive. Many businesses, if not most, use Microsoft 365, a cloud-based comprehensive suite of productivity tools that offers many features designed to streamline tasks and enhance efficiency. From email management to document collaboration and everything in between, it has become an indispensable resource in business....
Working remotely, hybrid options, and busier lifestyles... Each of these is now the norm and sets the landscape for how we maintain our work and life balance. This means that collaboration platforms like Microsoft Teams are indispensable when it comes to maintaining that balance. As data breaches increase, organizations face a significant challenge in maintaining productivity while safeguarding their data with smart cybersecurity practices....
Breach Secure Now is thrilled to announce a strategic revolution in our offering for our Managed Service Providers (MSPs) partners to build and expand upon their offering. BSN CEO Art Gross stated, "We are thrilled to evolve the BSN platform for our partners and their clients." At the heart of this evolution is the groundbreaking At the heart of this evolution is the groundbreaking introduction...
At Breach Secure Now, we've been thinking about and working on solutions that address the need for MSPs to lead their clients through the Productivity Revolution. With that in mind, we're excited to share about the expansion of our cybersecurity training to include Microsoft 365 productivity training. One of the advantages of merging cybersecurity...
As an MSP, your business is designed to serve your clients.  That means fixing what breaks and preparing them for what might break.  You encourage behaviors that eliminate the breaking altogether.  As a Breach Secure Now partner, you’re likely approaching this from multiple angles.  Ongoing training, social media reminders, and products that integrate with their business to assess a candidate's cybersecurity know-how before they become a team member. You are there to show them how to reduce the risk of a cybersecurity breach.  ...
With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will stand in line for hours to be the first to have a new phone when it is released.  Camp out on Black Friday to get a good deal on electronics and smart devices.  We make it a priority to have the latest and greatest.  But why aren’t we integrating the latest or greatest habits into protecting ourselves? Ignoring the human element in cybersecurity is a notion that must change.  We continue to put emphasis on prioritizing the technology and not the behaviors....
Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far gone to recapture. Additionally, as an MSP, there are so many clients relying on you, that it can be difficult to take time for yourself.  Enter Breach Secure Now We are built by an MSP, for MSPs.  And that means that when we create a product, it is built on that foundation. And moreover, with the goal of making your life easier and your cybersecurity stack as robust and complete as anything on the market. ...
We are excited to announce that our annual training is now mobile device ready!  Your clients can now complete their full training courses just as they did on their desktop, but in a mobile format as well.  What Does This Mean? You will now be able to offer your client’s users access to watch the Annual Training class videos on mobile devices.  Additionally, they will be able to take the training quizzes there as well.  And access to their certificate?  It’s available via their mobile device too!...
Last year our team developed an innovative and one-of-a-kind security risk assessment, with a one-of-a-kind name. The Baseline Employee Cybersecurity Assessment, or BECA, was released in December and has been successfully used by our MSP partners as both a prospecting tool for prospective clients and a relationship-building tool for their existing clients! Since then, our team has been working to leverage the success of BECA to create its HR doppelgänger: The Pre-Employment Cybersecurity Assessment. Similar...
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’  Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem by initiating multiple redirects after the user clicks or views an infected advertisement....
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if they don’t know how to recognize a fraudulent email.   In fact, Google recently warned nearly 5 million people in a recent week about potentially harmful sites that they are about to visit!  FIVE MILLION in one week. And with that in mind, if you aren’t using our Catch Phish in-email phishing training tool, you’ll want to make sure you integrate that into your offering asap!...
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image data—as its primary function (e.g., optical discs, external or removable hard drives, external or removable solid-state disk drives, magnetic or optical tapes, flash memory devices, flash memory cards, and other external or removable disks).”...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: