Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’  Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem by initiating multiple redirects after the user clicks or views an infected advertisement....
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if they don’t know how to recognize a fraudulent email.   In fact, Google recently warned nearly 5 million people in a recent week about potentially harmful sites that they are about to visit!  FIVE MILLION in one week. And with that in mind, if you aren’t using our Catch Phish in-email phishing training tool, you’ll want to make sure you integrate that into your offering asap!...
Scam Alert: Interview & Job Scams There are some topics that might seem irrelevant or not important when it comes to alerting your clients with regard to their online safety and cybersecurity.  One of those might be about the process of looking at other jobs for a career change or simply to supplement their current income.  It’s likely that your client’s employees are not going to be forthcoming that they are, or might be, looking for a new or additional job in the future. But as their IT liaison, you’d be remiss to not mention current scams with them.  And we are hearing a lot about interview scams. ...
Staying engaged and interacting with your clients just got easier.  And in the cybersecurity realm, no one can afford to stay complacent and ‘forget’ just how integral smart and secure habits are when it comes to lowering your risk of a breach.  You can’t be there onsite for your clients and calling them daily to remind them of the risk that accompanies poor behaviors is not an easier – or wise – path to choose.  While human interaction and actual conversations are genuinely valued, we are so inundated with information on an ongoing basis, that sometimes it can be overwhelming to take on more, especially in our already busy lives. And, with so much information flooding the internet, it can be difficult to determine what pieces of information and advice are legitimate and worth listening to....
Imagine if a locksmith created a key for your home or business, then sold a copy of that key to a burglar.  They didn’t steal your belongings, but they provided access, making them integral to the process for it to occur.  Initial Access Brokers (IABs) work in a similar fashion.  The name says it all, they provide the initial access to your account and do this by brokering or selling your credentials to the cybercriminals who will then take it a step further and steal data or deploy ransomware for extortion of funds....
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image data—as its primary function (e.g., optical discs, external or removable hard drives, external or removable solid-state disk drives, magnetic or optical tapes, flash memory devices, flash memory cards, and other external or removable disks).”...
It is so easy to become complacent in our cybersecurity behaviors.  But Android users should be given a shake this week and alerted to malware that is being deployed unknowingly by users who think that they are downloading anti-virus apps via the Google Play store.  There were six different cases found to contain the Sharkbot malware in recent days.  Initially discovered in October of 2021, this banking trojan makes money transfers by stealing credentials and banking information. ...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.   ...
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees.   ...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach....
I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This recent breach is all a part of their announced intent to put data of 1 billion users up for sale.   And he/she seems to be making progress because by April, they had reportedly stolen 932 million user credentials from a whopping 44 companies....
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach.  You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you were affected, what I found interesting was that this was now coming across in the newsfeed of my “friend” group, not my professional feed where I would expect it....
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts.  Generally, clients assume that since the anti-virus icon in the corner was there, they were protected.  Firewall?  Not sure what it is, but I get an alert every now and then about it, so it must be doing something.  Passwords?  I use them.  Sure, they aren’t the most complicated, but c’ mon, why would a hacker want my bank account?...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a data breach. With the stakes so high, SMBs must be prepared to respond to a data breach in the event one was to occur....
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996.  It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch.  Over the years there’s been a lot of private information exchanged between her and these individuals, including salary ranges and other personal anecdotal information.  LinkedIn isn’t her bank account or email, so she just uses her standard “go-to” username and password – the easy one that she knows she won’t forget....
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for....
Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like they could be legitimate, or scams that direct you to a fraudulent webpage so that you can avoid potential catastrophe. This can be done via training programs that are ongoing and keep you always learning new approaches and tactics as they change (which is constantly!)...
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes. ...
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  And also, because if you are a target of a ransomware attack, it could very likely be how the hacker demands payment. Now, we are not suggesting you pay that ransom demand, but getting familiar with cryptocurrency will help you in understanding how these cybercriminals are able to fly under the radar....
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies....
It can be so frustrating to try to convince people that we “know better” than they do.  Especially when it comes to health or safety right?  You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic....
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses. ...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, this is a good thing for everyone.  A focus on cybersecurity and guarding individual privacy and rights is necessary, but when it comes to doing the same for government data, it is imperative to the collective good of our country. ...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie has been recognized and named to CRN's prestigious Channel Chiefs list for 2024. This acknowledgment underscores Tracie Crites' outstanding leadership, influence, innovation,...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive cybersecurity solutions. ScalePad Lifecycle Manager offers a cutting-edge platform designed to streamline IT asset management and enhance overall security posture....
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets. What Are Attack Surfaces? Digital Attack Surfaces: Digital attack surfaces refer to the various points through which cybercriminals can infiltrate a computer system, network, or application. These may include ...
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer.  This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to compromise systems, networks, or individuals. These attacks are typically more aggressive and intrusive,...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code scams are and how to identify them? Here are some crucial...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong behaviors and safeguard them against potential threats?...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been created to leverage this digital highway, and vast amounts of data have been created and categorized....
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn't imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.   ...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning season.  In a business, your team roster is your employees.  And having talent that is well trained and ready for whatever comes at them during the business day is going to provide you with a consistent game-winning approach. ...
Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They have a formula that works, they stick with it and are in it for the long game....
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy or game plan for cybersecurity, that isn’t always easy.  Sure, you can take a class or watch a video online, but if you take that singular approach, you aren’t always physically there to see just how engaged the participants are or how much information they are retaining. ...
Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between.  And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there!  Tell Me a Little Bit About Yourself… Breach Secure Now (BSN) makes cybersecurity and HIPAA compliance training easy for managed service providers (MSP) so that automating, supporting, and empowering their clients is simple....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: