Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Bell bottoms, neon colors…kale…trends come, and trends go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends?  That’s one we can get behind and think that there can never be enough of! So, what can you expect to see as both a consumer, employee, employer, business owner or just a member of the general public who has a computer? Let’s take a look at what we are seeing. ...
The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look back on. This year was one of extraordinary circumstances, and while the situation was unprecedented, the summary of what transpired lends itself to the age’s old advice: Preparation is key. The poet Maya Angelou is credited with saying “When you know better, you do better.” And in knowing better, would that have meant that:...
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
Regardless of whichever way you lean politically, the recent announcement of a few incoming Presidential government staff appointments is hopefully good news to those who know the importance of strong cybersecurity. Why? Because these individuals come with a collective history of working in the industry. This means that there won’t be any lag time in getting them caught up on why a strong cybersecurity program is critical to all of us and the nation as a whole....
Let’s try to make lemonade out of these lemons we keep getting with COVID-19.  Yes, there is an uptick in the number of cases and yes, it appears we are heading towards additional restrictions and lockdowns in various ways.  One of two things has likely happened, you started working from home and are still there; OR, you were home, but now back in the office.  If you’re part of that second set, all signs are pointing to a work from home scenario again in the near future....
With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty of our times.  (When does the list of uncertainties stop growing, I wonder?) And again, we find hackers and cybercriminals in a power position to take advantage of our uncertainty of not only what is true, but also who to look for when it comes to dispersing accurate information.  This isn’t discrediting any individual or organization, but we can all agree to admit, chaos can prevail in the current climate of COVID-19....
As the need for cybersecurity awareness increases across the entire business landscape, so does the need for strong programs and a trained and competent workforce. This affects everyone in at least two ways. First, you need to have a designated leader in place who facilitates the program, and second, you need to ensure that the entire team is strong and informed in their skill set when it comes to ensuring that they are behaving in ways that reinforce the program set in place....
There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and the opinions are strong. We aren’t here to discuss that side of politics; we’re here to look at how cybersecurity factors into this election process and how it affects all of us, regardless of which “side” you fall on. What Are the Factors?...
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look back on. This year was one of extraordinary circumstances, and while the situation was unprecedented, the summary of what transpired lends itself to the age’s old advice: Preparation is key. The poet Maya Angelou is credited with saying “When you know better, you do better.” And in knowing better, would that have meant that:...
With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty of our times.  (When does the list of uncertainties stop growing, I wonder?) And again, we find hackers and cybercriminals in a power position to take advantage of our uncertainty of not only what is true, but also who to look for when it comes to dispersing accurate information.  This isn’t discrediting any individual or organization, but we can all agree to admit, chaos can prevail in the current climate of COVID-19....
There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and the opinions are strong. We aren’t here to discuss that side of politics; we’re here to look at how cybersecurity factors into this election process and how it affects all of us, regardless of which “side” you fall on. What Are the Factors?...
No, this is not a political post.  In fact, we know that there are some topics that don’t even merit an effort to try to discuss.  They’re important, but differing opinions each hold their own value.  But when it comes to cybercrime, we should all be a united front.  There is one choice, and that is to make it a top priority with a solid plan to defend and uphold a business’s cybersecurity and the entire network from end to end....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
There is no way to emphasize enough, just how important it is for small businesses to be prepared for a cyberattack. But according to a recent survey by the Wall Street Journal Pro Research of 400 companies and their security officers, many companies are not taking it seriously enough to improve their readiness and risk of exposure....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
It’s holiday blockbuster season!  The time of year when the big screens are full of movie releases that are expected to pull in the crowds that want to watch Marvel and DC Comic heroes unite to save the world. They come from all realms to fight the dark forces that threaten humanity.  Together they will save the planet and it usually happens while the human race is blissfully unaware of the dangers that lurk in unknown territories, as they work silently and slowly to initiate our demise and take over the planet. ...
We often discuss the proactive approach that you should take when it comes to cybersecurity.  Security risk assessments will identify the gaps, ongoing training will help to strengthen the human risk factor, and tools like Catch Phish will keep the team engaged and learning along with those training programs.  But the fact is, you can’t eliminate all the risks that your clients face when it comes to experiencing a data breach.  That means that having an incident response plan (IR) should be on your list of "must-haves" when it comes to smart cybersecurity....
Don’t Be Scammed By a Turkey It’s Thanksgiving week and that also means that the holiday season has officially started for most of us.  And just the holiday season of our youth, as in summer vacation from school, this is the time of year when we as adults tend to put our feet up and let our guard down. ...
Performing a Security Risk Assessment (SRA) is one of the things that Managed Service Providers can utilize as a way to solidify their client relationships and grow their business.  Offering it to existing clients is a way of showing your value as well as helping them to strengthen their security posture.  You can engage with potential clients by offering to do an assessment for them. Additionally, businesses that are in healthcare and fall under HIPAA compliance are required to perform an assessment annually, so it can be used as a tool to strengthen and build those relationships. However, doing so with all of your clients should be a part of your plan regardless of the industry that they work within....
With summertime in full swing, many of us are heading out on vacations that are long overdue.  Whether you’re visiting family, friends, the mountains, or the beach, be “shore” to travel with smart cyber habits that will keep you and your loved ones protected in ways that can’t be fixed with that first aid kit that you stashed in the trunk....
Last week, we discussed the opportunity that is present to best support your healthcare clients, the importance of those organizations being HIPAA compliant, and how cybersecurity comes into play in healthcare. This week, we’re taking an even deeper dive into healthcare cybersecurity to answer the question, Why Is Healthcare Such a Target for Cybercrime?...
1. What would you do if a ransomware attack impacted your business for more than 2 weeks? Most MSPs are really good at backing up and restoring data. That is a core service that MSPs provide to their clients. It would be natural for a client to minimize the impact of downtime of a ransomware attack. MSPs need to discuss the impact of ransomware on systems that are not managed by the MSP. ...
Breach Secure Now is excited to unveil the latest venture with ScalePad...ControlMap integration! Why Integrate with ControlMap? With Breach Secure Now, MSPs can monitor security training within the ControlMap platform and map employee training data directly to compliance controls. This helps MSPs...
Breach Secure Now, a leading cybersecurity training provider, has recently earned recognition as a training leader in the industry. This acknowledgment comes with high praise from Kevin Lancaster, CEO of Navistack, who highlighted Breach Secure Now's exceptional contributions to cybersecurity education in a recent...
At Breach Secure Now, ongoing training is critical to strengthening a business’s cybersecurity posture.  Informed employees make better decisions, including being aware of, and keeping up with, how to respond to cybercriminals’ ever-evolving tactics.  We’ve recently launched ...
Increase in Impersonation Scams According to recent findings by cybersecurity experts, in 2023 there has been a 53% surge in daily cyber threats that target Microsoft Office. And within that statistic, an average of 411,000 malicious files were detected each day. These findings underscore a growing trend of cybercriminals targeting document formats, particularly Microsoft Office and PDFs, and the importance of cybersecurity training....
Having the right tools at your disposal can make all the difference between being busy and being productive. Many businesses, if not most, use Microsoft 365, a cloud-based comprehensive suite of productivity tools that offers many features designed to streamline tasks and enhance efficiency. From email management to document collaboration and everything in between, it has become an indispensable resource in business....
Working remotely, hybrid options, and busier lifestyles... Each of these is now the norm and sets the landscape for how we maintain our work and life balance. This means that collaboration platforms like Microsoft Teams are indispensable when it comes to maintaining that balance. As data breaches increase, organizations face a significant challenge in maintaining productivity while safeguarding their data with smart cybersecurity practices....
Breach Secure Now is thrilled to announce a strategic revolution in our offering for our Managed Service Providers (MSPs) partners to build and expand upon their offering. BSN CEO Art Gross stated, "We are thrilled to evolve the BSN platform for our partners and their clients." At the heart of this evolution is the groundbreaking At the heart of this evolution is the groundbreaking introduction...
At Breach Secure Now, we've been thinking about and working on solutions that address the need for MSPs to lead their clients through the Productivity Revolution. With that in mind, we're excited to share about the expansion of our cybersecurity training to include Microsoft 365 productivity training. One of the advantages of merging cybersecurity...
As an MSP, your business is designed to serve your clients.  That means fixing what breaks and preparing them for what might break.  You encourage behaviors that eliminate the breaking altogether.  As a Breach Secure Now partner, you’re likely approaching this from multiple angles.  Ongoing training, social media reminders, and products that integrate with their business to assess a candidate's cybersecurity know-how before they become a team member. You are there to show them how to reduce the risk of a cybersecurity breach.  ...
With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will stand in line for hours to be the first to have a new phone when it is released.  Camp out on Black Friday to get a good deal on electronics and smart devices.  We make it a priority to have the latest and greatest.  But why aren’t we integrating the latest or greatest habits into protecting ourselves? Ignoring the human element in cybersecurity is a notion that must change.  We continue to put emphasis on prioritizing the technology and not the behaviors....
Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far gone to recapture. Additionally, as an MSP, there are so many clients relying on you, that it can be difficult to take time for yourself.  Enter Breach Secure Now We are built by an MSP, for MSPs.  And that means that when we create a product, it is built on that foundation. And moreover, with the goal of making your life easier and your cybersecurity stack as robust and complete as anything on the market. ...
We are excited to announce that our annual training is now mobile device ready!  Your clients can now complete their full training courses just as they did on their desktop, but in a mobile format as well.  What Does This Mean? You will now be able to offer your client’s users access to watch the Annual Training class videos on mobile devices.  Additionally, they will be able to take the training quizzes there as well.  And access to their certificate?  It’s available via their mobile device too!...
Last year our team developed an innovative and one-of-a-kind security risk assessment, with a one-of-a-kind name. The Baseline Employee Cybersecurity Assessment, or BECA, was released in December and has been successfully used by our MSP partners as both a prospecting tool for prospective clients and a relationship-building tool for their existing clients! Since then, our team has been working to leverage the success of BECA to create its HR doppelgänger: The Pre-Employment Cybersecurity Assessment. Similar...
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’  Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem by initiating multiple redirects after the user clicks or views an infected advertisement....
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if they don’t know how to recognize a fraudulent email.   In fact, Google recently warned nearly 5 million people in a recent week about potentially harmful sites that they are about to visit!  FIVE MILLION in one week. And with that in mind, if you aren’t using our Catch Phish in-email phishing training tool, you’ll want to make sure you integrate that into your offering asap!...
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image data—as its primary function (e.g., optical discs, external or removable hard drives, external or removable solid-state disk drives, magnetic or optical tapes, flash memory devices, flash memory cards, and other external or removable disks).”...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: