Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Many of us dread this time of year for the obvious reason …tax time can be well, very taxing.  Add to the challenge of it all, that many of us are working from home, and find ourselves in a whole new and unfamiliar scenario of what we can claim as a tax write-off.  We’re all looking for ways to maximize our return and minimize what we owe to the government.  And in this new business landscape, we do our own research, and we seek answers online.  Often, we put little effort into validating the sites we use, because the amount of information is overwhelming and sometimes confusing.  Additionally, we’ve had a lot of communication this year from the government on different aid packages and relief options....
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning season.  In a business, your team roster is your employees.  And having talent that is well trained and ready for whatever comes at them during the business day is going to provide you with a consistent game-winning approach. ...
Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They have a formula that works, they stick with it and are in it for the long game....
As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know the words and phrases that are dropped in conversations today as cybersecurity becomes part of the mainstream.  They may acknowledge that the Dark Web exists, but the concept of exactly what that means may remain a little fuzzy....
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy or game plan for cybersecurity, that isn’t always easy.  Sure, you can take a class or watch a video online, but if you take that singular approach, you aren’t always physically there to see just how engaged the participants are or how much information they are retaining. ...
Well, today wraps up the month of February and the celebration of our love about being a part of an incredible community of MSPs and channel vendors dedicated to cybersecurity.  During the month of February, we shared some serious love for our partners, and really enjoyed seeing all of you that shared your #BSNLove on LinkedIn! We love our partners to pizzas, and are thrilled to reward those who participated in our Feelin’ the Love February challenge with pizza parties for their MSPs!...
We take thee for better or for worse, in good times and in bad, in sickness and in health…we will be there for you in your time of need…. ah, the familiar words we hear as two parties engage at the beginning of their road together.  You’re in it together and promise to stand by each other when the going gets…well, not so good. And what better partnership for when the going gets tough, than to have a good insurance provider?  That’s why we love Inskyber. ...
Find something you love to do, and you’ll never have to work a day in your life.  Whether or not you have heard that exact quote before, it likely will resonate with all of us.  Loving what you do means that you have fervor for finding answers, are delighted at discovering different ways to approach a situation, and above all, are filled with the desire to share with others that which you are passionate about.  And that’s just how we feel here at Breach Secure Now when it comes to empowering MSPs to provide complete human cybersecurity solutions and programs for their clients....
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years....
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended by security experts as a necessity for optimum security online. 2FA is a great added security feature to protect your account because an unauthorized individual is unlikely to supply the factors required to successfully gain access....
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if you have any, and more. Even more alarming, if Exactis does have that information, so too may a hacker who discovered it leaked publicly on the internet. Marketwatch explores the breach and what it means for nearly every American involved....
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises (SMEs). An article on SME dives into a recent study of how prepared SMEs are for a security incident when it comes to their data breach response plan....
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure your business does not suffer from its devastation....
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats itself, it will not. An article on MorningStar goes into detail on why this massive cyberattack will not be enough to convince people to care about their online security....
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing?...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive – or fail – within their own economies....
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven't yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business's reputation and finances....
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let's take a closer look at the 20 years...
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or "smishing" (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages...
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned...
The weakest link in any organization's cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built....
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce is ...
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify any gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it comes to identifying the risk factors.  But having a “place to start” is sometimes comforting to people when they are venturing into the unknown, and while a security risk assessment is critical to a business and an invaluable tool to you as an MSP, sometimes management has a hard time accepting that their team may be part of the risk landscape....
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to supporting clients in the healthcare industry and those are: support their network and leave HIPAA out of it, or to avoid taking on those clients altogether because of the complexity of HIPAA....
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in Orlando this month.  If you are not familiar with this event, it is the annual ConnectWise convention held in Orlando Florida where IT professionals get together to taut their wares, discuss new technologies, and have a great time being social.  We’ll get to that social part in a minute, but first, let’s cover the basics. ...
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their various platforms.  Which is great…but shouldn’t every day be a day that we’re aware of cybersecurity? This should be true especially if you’re in any way associated with the technology sector. ...
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the same time, there is another group that might not be getting as much press when it comes to feeling overwhelmed. The IT industry....
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: