Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Are You a Hacker Helper? Here you go, let me get the door for you.  Are you looking for access to my company’s network?  One moment, let me get those login credentials for you. Of course, this sounds ridiculous.  But in reality, it is exactly what is happening.  Cybercriminals use advanced social engineering to get to the weakest link in any organization, and that link is the same at every business, in every vertical, in every market.   Humans....
Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority.  Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern.  With an annual spend of less than $1000, these businesses are likely spending more on coffee than they are on cyber safety....
A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one....
HIPAA - Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around since 1996, with the intent to protect patients by properly handling their protected health information (PHI). With good intentions, HIPAA set forth to provide both security provisions and data privacy. The legislation was passed in the age of paper records, a time that required much different security measures than what we see today....
Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it’s off before doing it again.  If you run out of gas on a highway, on future drives, you’ll be on the lookout for a gas station anytime the tank hits the last notch.  These are valuable lessons that mark a moment in time that we move onward from, and our behavior changes as a result....
There is a rise in awareness with small to medium-sized businesses (SMBs) of the threat to their cybersecurity.  The problem is, it causes a subsequent rise in a risk factor to Managed Service Providers (MSPs).  That risk is of them losing their business....
The Excuses  It’s not easy! It’s a lot to keep track of. I have no idea where I’ve used that before. There’s nothing in there that anyone would want. You want me to go back and change ALL of my accounts? These are all responses when a user is told that their passwords need changed and updated because their credentials have been breached.  And quite honestly, none of them justify the lack of action that is usually taken....
Filing and Smiling  When is the last time that you filed a piece of paper?    It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file cabinet had everything necessary to keep things humming along.  Each drawer’s value was dependent on the information that it contained within.  ...
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees.   ...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach....
I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This recent breach is all a part of their announced intent to put data of 1 billion users up for sale.   And he/she seems to be making progress because by April, they had reportedly stolen 932 million user credentials from a whopping 44 companies....
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach.  You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you were affected, what I found interesting was that this was now coming across in the newsfeed of my “friend” group, not my professional feed where I would expect it....
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts.  Generally, clients assume that since the anti-virus icon in the corner was there, they were protected.  Firewall?  Not sure what it is, but I get an alert every now and then about it, so it must be doing something.  Passwords?  I use them.  Sure, they aren’t the most complicated, but c’ mon, why would a hacker want my bank account?...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a data breach. With the stakes so high, SMBs must be prepared to respond to a data breach in the event one was to occur....
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996.  It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch.  Over the years there’s been a lot of private information exchanged between her and these individuals, including salary ranges and other personal anecdotal information.  LinkedIn isn’t her bank account or email, so she just uses her standard “go-to” username and password – the easy one that she knows she won’t forget....
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for....
Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like they could be legitimate, or scams that direct you to a fraudulent webpage so that you can avoid potential catastrophe. This can be done via training programs that are ongoing and keep you always learning new approaches and tactics as they change (which is constantly!)...
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes. ...
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  And also, because if you are a target of a ransomware attack, it could very likely be how the hacker demands payment. Now, we are not suggesting you pay that ransom demand, but getting familiar with cryptocurrency will help you in understanding how these cybercriminals are able to fly under the radar....
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies....
It can be so frustrating to try to convince people that we “know better” than they do.  Especially when it comes to health or safety right?  You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic....
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses. ...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, this is a good thing for everyone.  A focus on cybersecurity and guarding individual privacy and rights is necessary, but when it comes to doing the same for government data, it is imperative to the collective good of our country. ...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie has been recognized and named to CRN's prestigious Channel Chiefs list for 2024. This acknowledgment underscores Tracie Crites' outstanding leadership, influence, innovation,...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive cybersecurity solutions. ScalePad Lifecycle Manager offers a cutting-edge platform designed to streamline IT asset management and enhance overall security posture....
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets. What Are Attack Surfaces? Digital Attack Surfaces: Digital attack surfaces refer to the various points through which cybercriminals can infiltrate a computer system, network, or application. These may include ...
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer.  This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to compromise systems, networks, or individuals. These attacks are typically more aggressive and intrusive,...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code scams are and how to identify them? Here are some crucial...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong behaviors and safeguard them against potential threats?...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been created to leverage this digital highway, and vast amounts of data have been created and categorized....
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn't imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.   ...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning season.  In a business, your team roster is your employees.  And having talent that is well trained and ready for whatever comes at them during the business day is going to provide you with a consistent game-winning approach. ...
Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They have a formula that works, they stick with it and are in it for the long game....
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy or game plan for cybersecurity, that isn’t always easy.  Sure, you can take a class or watch a video online, but if you take that singular approach, you aren’t always physically there to see just how engaged the participants are or how much information they are retaining. ...
Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between.  And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there!  Tell Me a Little Bit About Yourself… Breach Secure Now (BSN) makes cybersecurity and HIPAA compliance training easy for managed service providers (MSP) so that automating, supporting, and empowering their clients is simple....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: