Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will stand in line for hours to be the first to have a new phone when it is released.  Camp out on Black Friday to get a good deal on electronics and smart devices.  We make it a priority to have the latest and greatest.  But why aren’t we integrating the latest or greatest habits into protecting ourselves? Ignoring the human element in cybersecurity is a notion that must change.  We continue to put emphasis on prioritizing the technology and not the behaviors....
Misrepresenting yourself is easy to do in a world where many of our interactions exist online.  Why not put that profile photo of yourself up at the gym from a few years ago when you actually went there regularly?  You’ll eventually get back to working out.  There’s no harm in it. Deceptive? Sort of.  But in a situation like that, while misleading, it likely won’t cause issues if uncovered.  But what about misrepresentation when it comes to your business? If you apply for cyber insurance and have cybersecurity measures and tools that you’ve purchased but don’t use, is it lying to say that they are “in place”? ...
Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far gone to recapture. Additionally, as an MSP, there are so many clients relying on you, that it can be difficult to take time for yourself.  Enter Breach Secure Now We are built by an MSP, for MSPs.  And that means that when we create a product, it is built on that foundation. And moreover, with the goal of making your life easier and your cybersecurity stack as robust and complete as anything on the market. ...
Strong password behavior is the foundation of many aspects of a cybersecurity program. There are still people that have the same password for all their accounts. As an MSP, you can’t be there when they create passwords to oversee the process. But you can enable measures that will force them to engage with good habits....
Dashboard Tag Filtering Grouping items together with tags is an effective way to put order to the items that you write, collect, and store electronically.  Tagging records allows you to label and group data in the same way.  Breach Secure Now has built upon that approach with a new update for our partners! Our latest ESS update of dashboard tag filtering allows you to group statistics for users together using a particular tag - or across multiple tags! ...
We are excited to announce that our annual training is now mobile device ready!  Your clients can now complete their full training courses just as they did on their desktop, but in a mobile format as well.  What Does This Mean? You will now be able to offer your client’s users access to watch the Annual Training class videos on mobile devices.  Additionally, they will be able to take the training quizzes there as well.  And access to their certificate?  It’s available via their mobile device too!...
Since Breach Secure Now was founded by an MSP. We have strong roots in understanding our partners' unique opportunities and challenges. We are proud to be a company that focuses our platform and solutions on the needs of the MSP community and its clients. How do we accomplish that? By continuously seeking partner feedback to help drive our roadmap. We work to ensure that BSN can function complementary to the other solutions that help our partners run their businesses....
Last year our team developed an innovative and one-of-a-kind security risk assessment, with a one-of-a-kind name. The Baseline Employee Cybersecurity Assessment, or BECA, was released in December and has been successfully used by our MSP partners as both a prospecting tool for prospective clients and a relationship-building tool for their existing clients! Since then, our team has been working to leverage the success of BECA to create its HR doppelgänger: The Pre-Employment Cybersecurity Assessment. Similar...
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years....
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended by security experts as a necessity for optimum security online. 2FA is a great added security feature to protect your account because an unauthorized individual is unlikely to supply the factors required to successfully gain access....
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if you have any, and more. Even more alarming, if Exactis does have that information, so too may a hacker who discovered it leaked publicly on the internet. Marketwatch explores the breach and what it means for nearly every American involved....
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises (SMEs). An article on SME dives into a recent study of how prepared SMEs are for a security incident when it comes to their data breach response plan....
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure your business does not suffer from its devastation....
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats itself, it will not. An article on MorningStar goes into detail on why this massive cyberattack will not be enough to convince people to care about their online security....
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing?...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive – or fail – within their own economies....
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven't yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business's reputation and finances....
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let's take a closer look at the 20 years...
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or "smishing" (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages...
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned...
The weakest link in any organization's cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built....
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce is ...
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify any gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it comes to identifying the risk factors.  But having a “place to start” is sometimes comforting to people when they are venturing into the unknown, and while a security risk assessment is critical to a business and an invaluable tool to you as an MSP, sometimes management has a hard time accepting that their team may be part of the risk landscape....
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to supporting clients in the healthcare industry and those are: support their network and leave HIPAA out of it, or to avoid taking on those clients altogether because of the complexity of HIPAA....
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in Orlando this month.  If you are not familiar with this event, it is the annual ConnectWise convention held in Orlando Florida where IT professionals get together to taut their wares, discuss new technologies, and have a great time being social.  We’ll get to that social part in a minute, but first, let’s cover the basics. ...
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their various platforms.  Which is great…but shouldn’t every day be a day that we’re aware of cybersecurity? This should be true especially if you’re in any way associated with the technology sector. ...
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the same time, there is another group that might not be getting as much press when it comes to feeling overwhelmed. The IT industry....
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: