Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer.  This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to compromise systems, networks, or individuals. These attacks are typically more aggressive and intrusive,...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code scams are and how to identify them? Here are some crucial...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong behaviors and safeguard them against potential threats?...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been created to leverage this digital highway, and vast amounts of data have been created and categorized....
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn't imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause...
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
Cultivating Partnerships: Crites, Spearheads Channel Growth Breach Secure Now (BSN), a pioneering cybersecurity training and productivity company, proudly announces the appointment of Tracie Crites as the company's new Channel Chief. This strategic move reiterates BSN's commitment to elevating its channel strategy and advancing its ...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees.   ...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach....
I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This recent breach is all a part of their announced intent to put data of 1 billion users up for sale.   And he/she seems to be making progress because by April, they had reportedly stolen 932 million user credentials from a whopping 44 companies....
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach.  You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you were affected, what I found interesting was that this was now coming across in the newsfeed of my “friend” group, not my professional feed where I would expect it....
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts.  Generally, clients assume that since the anti-virus icon in the corner was there, they were protected.  Firewall?  Not sure what it is, but I get an alert every now and then about it, so it must be doing something.  Passwords?  I use them.  Sure, they aren’t the most complicated, but c’ mon, why would a hacker want my bank account?...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a data breach. With the stakes so high, SMBs must be prepared to respond to a data breach in the event one was to occur....
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996.  It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch.  Over the years there’s been a lot of private information exchanged between her and these individuals, including salary ranges and other personal anecdotal information.  LinkedIn isn’t her bank account or email, so she just uses her standard “go-to” username and password – the easy one that she knows she won’t forget....
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for....
Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like they could be legitimate, or scams that direct you to a fraudulent webpage so that you can avoid potential catastrophe. This can be done via training programs that are ongoing and keep you always learning new approaches and tactics as they change (which is constantly!)...
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was replaced with people filling gasoline in plastic containers of all sorts and sizes. ...
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  And also, because if you are a target of a ransomware attack, it could very likely be how the hacker demands payment. Now, we are not suggesting you pay that ransom demand, but getting familiar with cryptocurrency will help you in understanding how these cybercriminals are able to fly under the radar....
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies....
It can be so frustrating to try to convince people that we “know better” than they do.  Especially when it comes to health or safety right?  You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic....
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses. ...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, this is a good thing for everyone.  A focus on cybersecurity and guarding individual privacy and rights is necessary, but when it comes to doing the same for government data, it is imperative to the collective good of our country. ...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie has been recognized and named to CRN's prestigious Channel Chiefs list for 2024. This acknowledgment underscores Tracie Crites' outstanding leadership, influence, innovation,...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive cybersecurity solutions. ScalePad Lifecycle Manager offers a cutting-edge platform designed to streamline IT asset management and enhance overall security posture....
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets. What Are Attack Surfaces? Digital Attack Surfaces: Digital attack surfaces refer to the various points through which cybercriminals can infiltrate a computer system, network, or application. These may include ...
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer.  This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to compromise systems, networks, or individuals. These attacks are typically more aggressive and intrusive,...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code scams are and how to identify them? Here are some crucial...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong behaviors and safeguard them against potential threats?...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been created to leverage this digital highway, and vast amounts of data have been created and categorized....
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn't imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.   ...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning season.  In a business, your team roster is your employees.  And having talent that is well trained and ready for whatever comes at them during the business day is going to provide you with a consistent game-winning approach. ...
Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They have a formula that works, they stick with it and are in it for the long game....
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy or game plan for cybersecurity, that isn’t always easy.  Sure, you can take a class or watch a video online, but if you take that singular approach, you aren’t always physically there to see just how engaged the participants are or how much information they are retaining. ...
Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between.  And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there!  Tell Me a Little Bit About Yourself… Breach Secure Now (BSN) makes cybersecurity and HIPAA compliance training easy for managed service providers (MSP) so that automating, supporting, and empowering their clients is simple....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: