Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

As Managed Service Providers, you likely look at the world through ‘tech-colored glasses’.  While your business may focus on one vertical, in general, you’re able to support a business regardless of what they do or where their focus is, because you see them as a client with a technical infrastructure that you support.  What they focus on isn’t necessarily your concern....
1. What would you do if a ransomware attack impacted your business for more than 2 weeks? Most MSPs are really good at backing up and restoring data. That is a core service that MSPs provide to their clients. It would be natural for a client to minimize the impact of downtime of a ransomware attack. MSPs need to discuss the impact of ransomware on systems that are not managed by the MSP. ...
Watch this on-demand, 30-minute boot camp to sit down with Allison Kastel and Nick Vient as they cover all the ways Breach Secure Now makes training easy for MSPs!Learn how easy setting up ongoing, automated cybersecurity & HIPAA compliance training is within our easy-to-use interface! Watch until the end as they answer questions from Managed Service Providers just like you!...
Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like they could be legitimate, or scams that direct you to a fraudulent webpage so that you can avoid potential catastrophe. This can be done via training programs that are ongoing and keep you always learning new approaches and tactics as they change (which is constantly!)...
In the past year, we’ve all seen how changes can be thrown at us unexpectedly.  We are presented with the need to evolve and grow in ways that can sometimes feel uncomfortable, or even rushed when the landscape that we work within changes.  Despite how it may feel at the time, this is usually a good thing.  We learn what our capabilities are, and we may adapt to learn new behaviors and see new strengths rise within us....
Watch this on-demand, 30-minute boot camp to sit down with Allison Kastel and John DeBlasio as they cover everything you need to know about Breach Secure Now’s phishing platform.Learn how easy setting up and managing routine phishing simulations is within our easy-to-use interface! Watch until the end as they answer questions from Managed Service Providers just like you!...
Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination situation, where you are putting in hours both at home and in the office.  Either way, you’re back, and you’re ready to go....
The three largest network morning news shows are often what Americans have on in the background as we get ready for work or school. You’ll find the headlines, pop culture, and maybe some shopping bargains from time to time. They generally cover the top stories of the day but are not known for their likelihood to always address the hard-hitting stories in detail....
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years....
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended by security experts as a necessity for optimum security online. 2FA is a great added security feature to protect your account because an unauthorized individual is unlikely to supply the factors required to successfully gain access....
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if you have any, and more. Even more alarming, if Exactis does have that information, so too may a hacker who discovered it leaked publicly on the internet. Marketwatch explores the breach and what it means for nearly every American involved....
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises (SMEs). An article on SME dives into a recent study of how prepared SMEs are for a security incident when it comes to their data breach response plan....
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure your business does not suffer from its devastation....
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats itself, it will not. An article on MorningStar goes into detail on why this massive cyberattack will not be enough to convince people to care about their online security....
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing?...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive – or fail – within their own economies....
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven't yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business's reputation and finances....
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let's take a closer look at the 20 years...
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or "smishing" (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages...
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned...
The weakest link in any organization's cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built....
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce is ...
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify any gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it comes to identifying the risk factors.  But having a “place to start” is sometimes comforting to people when they are venturing into the unknown, and while a security risk assessment is critical to a business and an invaluable tool to you as an MSP, sometimes management has a hard time accepting that their team may be part of the risk landscape....
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to supporting clients in the healthcare industry and those are: support their network and leave HIPAA out of it, or to avoid taking on those clients altogether because of the complexity of HIPAA....
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in Orlando this month.  If you are not familiar with this event, it is the annual ConnectWise convention held in Orlando Florida where IT professionals get together to taut their wares, discuss new technologies, and have a great time being social.  We’ll get to that social part in a minute, but first, let’s cover the basics. ...
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their various platforms.  Which is great…but shouldn’t every day be a day that we’re aware of cybersecurity? This should be true especially if you’re in any way associated with the technology sector. ...
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the same time, there is another group that might not be getting as much press when it comes to feeling overwhelmed. The IT industry....
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: