Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

When it comes to needing a strong cybersecurity program, don't overlook the opportunity that the healthcare industry presents. There is a market here that MSPs should be focused on as a way to grow their business. Why Focus Here? Healthcare continually remains one of the largest targeted industries for cybercriminals. The payoff for a data breach in healthcare is high given the value of patient health data. The difference between responding to a hacker can mean life and death - not to mention the hefty HIPAA fines that can go along with a data breach....
Sloppy social media habits can lead to a compromise that extends beyond an individual's personal account. Many people don't realize that their login credentials tie them together with an invisible thread in the dark web. A hacked social account could lead to access to business credentials or more. Hackers 101 Being in IT, you're familiar with the various ways that hackers work to gain trust. That trust innocently leads to providing information that an individual deems irrelevant, but is not. It could be the one missing answer to a question that provides access to a password. Let's take a quick look at the different ways that data can be unsuspectingly compromised....
Can your mobile phone be infected with malware? It sure can. You're holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is stalkerware, which is often the most unethical and malicious of the spyware varieties. How Does My Phone Get Malware? If you notice that your mobile phone is getting unusual messages, has modified settings that you didn't adjust, or is not running optimally, it may be infected....
A deepfake is a portmanteau (more on that in a moment) of "deep learning" and "fake". What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If you take a photo, audio, or video and replace one person in it with someone else's image, you've created a deepfake. If you create an audio file with a voice that impersonates someone else, you've created deepfake content. With today's technology, this goes beyond cropping your face over someone else's in a photograph....
Breach Secure Now is a partner-focused business. We work for the MSP community to provide them with the most comprehensive cybersecurity solutions for their clients. Gradient MSP also works with MSPs to provide the tools that integrate their solutions. The Right Partnership Because BSN was founded by an MSP for MSPs, we know the importance of building the solutions that you want and need. As a result, our integrations have come from your requests. With each of those, also comes its own potential risks and complexities....
This month we celebrate National Cybersecurity Awareness Month. The year's campaign theme of "See Yourself in Cyber" focuses on the individual. This collaborative effort is done to raise awareness between government and industry. It is overseen by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) working together. The theme this year aligns with that of our own here at Breach Secure Now. Humans are the key element in cybersecurity. CISA simplifies this by saying that 'while cybersecurity may seem like a complex subject, ultimately, it's really all about people.'...
October is National Cybersecurity Awareness Month and Breach Secure Now is here to make sure that we get everyone involved in the cybersecurity ‘celebration’! Everyone – and we mean every single person needs to be aware of cybersecurity and the best practices that keep their world secure.  The ripple effect of breached information can travel wide and far. And repercussions are sometimes not seen for months, or even years, ahead.  As an individual, you must protect your own identity and that of your family....
Small businesses often make the mistake that they have to be cybersecurity experts to have strong security programs in place. Remind them that as their MSP, you can be their expert. The concern is often that learning how to protect their business will be overwhelming. One more thing to do. Or that they need to hire someone internally. So they put it off until they fill that role, or find the right product to enable their team....
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years....
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended by security experts as a necessity for optimum security online. 2FA is a great added security feature to protect your account because an unauthorized individual is unlikely to supply the factors required to successfully gain access....
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if you have any, and more. Even more alarming, if Exactis does have that information, so too may a hacker who discovered it leaked publicly on the internet. Marketwatch explores the breach and what it means for nearly every American involved....
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises (SMEs). An article on SME dives into a recent study of how prepared SMEs are for a security incident when it comes to their data breach response plan....
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure your business does not suffer from its devastation....
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats itself, it will not. An article on MorningStar goes into detail on why this massive cyberattack will not be enough to convince people to care about their online security....
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing?...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive – or fail – within their own economies....
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven't yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business's reputation and finances....
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let's take a closer look at the 20 years...
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or "smishing" (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages...
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned...
The weakest link in any organization's cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built....
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce is ...
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify any gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it comes to identifying the risk factors.  But having a “place to start” is sometimes comforting to people when they are venturing into the unknown, and while a security risk assessment is critical to a business and an invaluable tool to you as an MSP, sometimes management has a hard time accepting that their team may be part of the risk landscape....
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to supporting clients in the healthcare industry and those are: support their network and leave HIPAA out of it, or to avoid taking on those clients altogether because of the complexity of HIPAA....
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in Orlando this month.  If you are not familiar with this event, it is the annual ConnectWise convention held in Orlando Florida where IT professionals get together to taut their wares, discuss new technologies, and have a great time being social.  We’ll get to that social part in a minute, but first, let’s cover the basics. ...
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their various platforms.  Which is great…but shouldn’t every day be a day that we’re aware of cybersecurity? This should be true especially if you’re in any way associated with the technology sector. ...
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the same time, there is another group that might not be getting as much press when it comes to feeling overwhelmed. The IT industry....
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: