Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Major Impact Earlier this week the Federal Aviation Administration (FAA) announced a nationwide ground stop of all flights.  Approximately 9,000 flights were delayed, and over 1,000 flights were canceled. The reason why?  The NOTAM system (short for Notice to All Air Missions), which is designed to provide real-time information to pilots and air traffic controllers with critical information before takeoff, was down. This system is designed to alert you of such things as runway hazards or unsafe weather conditions and is therefore critical to safety....
Which resolutions have you set for yourself in 2023? Let me guess: get fit, eat healthily, and hit the gym on a regular basis. These are good choices, but how about another way to incorporate training into your schedule? And this one may pay off in dollars saved, not pounds lost. Why Train? Cybersecurity training should not be a negotiable part of any business structure....
Social Security Scams While many of us are taking time at the end of the year to enjoy our friends and family's company and goodwill, cybercriminals are using it as an opportunity to scam people. One such opportunity comes with the end-of-year renewal of programs and policies. And Social Security scams are one of the most reported to the government. They target individuals who receive benefits because this demographic can be more vulnerable when it comes to falling for scams....
Quick! Get to the store for that forgotten gift...order online and pay for overnight shipping...whatever it takes to get the gift in hand for the holiday ahead! We know the holidays are coming, but inevitably we are scrambling to get some things done at the last minute. And where there's an opportunity, there's a scam. As we scramble, scammers are on the prowl to find us. We're in a rush, preoccupied with a dozen things on our minds and our guard is down. The perfect target to take advantage of. We've discussed the holiday scams that are prevalent, but this increases as the date of gatherings and celebrations draw near....
Artificial Intelligence (AI) is gaining popularity among everyday consumers like so many technologies, through social media. Just take a quick look in your newsfeed and you're likely to see your friends in otherworldly scenarios they've created with Magic Avatars from Lensa. With over 4 million downloads in the first part of December, it's clearly a hit. But is it safe? With any app, you should read the privacy policy and terms of use before downloading, especially when it involves your biometric data. But users should be aware, the risks don't stop there....
End of year wrap-up has many of us in a hurry. We rush to get our businesses buttoned up, our shopping done, and our tasks completed so that we can enjoy the time off. Along with our tendency to rush, is the feeling of merriment and goodwill, and we may assume everyone else is operating from the same place or intent. That may be nice, but don't be fooled by cybercriminals waiting to take advantage of your own good intentions. Let's discuss a few of the more common scams that can be prevalent during the holiday season....
You are familiar with phishing. You've taught your clients and colleagues to be on alert for fraudulent emails. But are you changing your approach to education and training to match the sophistication of cybercriminals and their tactics? Smart Phishing Teaching effectively doesn't necessarily mean endless bits of content and methodologies. It means that each lesson and tool should have an impact on users....
'Tis the Season The unofficial official shopping season starts this week, and if there is a sale, there might be a scam close by. As the prices go down, so does our guard. We fear losing out on a deal and can act without thinking. A few quick reminders to stay cyber-safe. Fraudulent Websites Don't be quick to click when you get that email or text announcing the "biggest savings of the year!". If you are interested in the promotion that you see, go to the retailer's home page and look for the sale there. In this age of phishing scams, companies are unlikely to make it a 'click only' access knowing that is often the way that cybercriminals work....
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees.   ...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach....
I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This recent breach is all a part of their announced intent to put data of 1 billion users up for sale.   And he/she seems to be making progress because by April, they had reportedly stolen 932 million user credentials from a whopping 44 companies....
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach.  You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you were affected, what I found interesting was that this was now coming across in the newsfeed of my “friend” group, not my professional feed where I would expect it....
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts.  Generally, clients assume that since the anti-virus icon in the corner was there, they were protected.  Firewall?  Not sure what it is, but I get an alert every now and then about it, so it must be doing something.  Passwords?  I use them.  Sure, they aren’t the most complicated, but c’ mon, why would a hacker want my bank account?...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a data breach. With the stakes so high, SMBs must be prepared to respond to a data breach in the event one was to occur....
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996.  It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch.  Over the years there’s been a lot of private information exchanged between her and these individuals, including salary ranges and other personal anecdotal information.  LinkedIn isn’t her bank account or email, so she just uses her standard “go-to” username and password – the easy one that she knows she won’t forget....
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for....
Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like they could be legitimate, or scams that direct you to a fraudulent webpage so that you can avoid potential catastrophe. This can be done via training programs that are ongoing and keep you always learning new approaches and tactics as they change (which is constantly!)...
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes. ...
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  And also, because if you are a target of a ransomware attack, it could very likely be how the hacker demands payment. Now, we are not suggesting you pay that ransom demand, but getting familiar with cryptocurrency will help you in understanding how these cybercriminals are able to fly under the radar....
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies....
It can be so frustrating to try to convince people that we “know better” than they do.  Especially when it comes to health or safety right?  You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic....
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses. ...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, this is a good thing for everyone.  A focus on cybersecurity and guarding individual privacy and rights is necessary, but when it comes to doing the same for government data, it is imperative to the collective good of our country. ...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie has been recognized and named to CRN's prestigious Channel Chiefs list for 2024. This acknowledgment underscores Tracie Crites' outstanding leadership, influence, innovation,...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive cybersecurity solutions. ScalePad Lifecycle Manager offers a cutting-edge platform designed to streamline IT asset management and enhance overall security posture....
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets. What Are Attack Surfaces? Digital Attack Surfaces: Digital attack surfaces refer to the various points through which cybercriminals can infiltrate a computer system, network, or application. These may include ...
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer.  This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to compromise systems, networks, or individuals. These attacks are typically more aggressive and intrusive,...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code scams are and how to identify them? Here are some crucial...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong behaviors and safeguard them against potential threats?...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been created to leverage this digital highway, and vast amounts of data have been created and categorized....
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn't imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.   ...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning season.  In a business, your team roster is your employees.  And having talent that is well trained and ready for whatever comes at them during the business day is going to provide you with a consistent game-winning approach. ...
Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They have a formula that works, they stick with it and are in it for the long game....
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy or game plan for cybersecurity, that isn’t always easy.  Sure, you can take a class or watch a video online, but if you take that singular approach, you aren’t always physically there to see just how engaged the participants are or how much information they are retaining. ...
Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between.  And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there!  Tell Me a Little Bit About Yourself… Breach Secure Now (BSN) makes cybersecurity and HIPAA compliance training easy for managed service providers (MSP) so that automating, supporting, and empowering their clients is simple....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: