Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

As we talk to potential MSP partners and give presentations at ASCII and MAXfocus events, we are starting to hear a common message: I worried about providing security services to my clients because they may hold me legally responsible if they have a data breach. You can understand why MSPs might think that not discussing security would help them avoid legal liability. No one wants to be in the position where they told a client "if you implement these security measures, you will not have a data breach". Then if the client does have a data breach the MSP bears the responsibility....
An article in Forbes discusses the risk of cyberattacks on businesses. Many companies are unprepared to prevent a cyberattack. Yet many are still ill-prepared for the new age of cybercrime. Recently, PwC indicated less than half of companies surveyed are taking necessary steps to protect their business. This lack of action is not only leading to significant costs, but can result in immeasurable damage to corporate reputation....
Large scale data breaches such as Target and Home Depot make the news but smaller organizations are victims of data breaches as well. The problem is that most data breaches that happen to small or midsize companies are either not reported or do not make the news headlines. This in turn leads many small to midsize businesses (SMBs) to underestimate the risk that their company may be a victim of a data breach....
The US Securities and Exchange Commission (SEC) Division of Investment Management has issued cybersecurity guidance (PDF) to registered investment companies ("Funds") and registered investment advisers ("Advisers"). The SEC has identify cybersecurity as an issue for both Funds and Advisers....
Spear phishing emails are highly effective and have been the cause of many successful hacking attempts. Unlike a regular phishing email that could be sent to thousands or millions of recipients, a spear phishing email is created to target just one victim. And if that victim falls for the bait, there is a good chance that they will turn over valuable information including network user accounts and passwords or confidential information such as bank account login credentials....
A survey by Mayer Brown shows companies consider the disclosure of PII the biggest cyber related threat. Survey respondents overwhelmingly considered the disclosure of personally, identifiable information as the biggest cyber-related threat to their companies (63%). Concern about interruption of business operations such as system sabotage ranked second (24%)....
The CEO of Lloyd's of London, one of the largest insurance companies in the world, says that cyber risk is the most serious threat to businesses Inga Beale, chief executive of Lloyd's, said: “Cyber risk poses the most serious threat to businesses and national economies, and it’s an issue that’s not going to go away. This threat is driving a big push for Cyber Insurance...
Market intelligence from ABI Research estimates the current global market for managed security services will be around $15.4 billion by the 2015. They state that there is a big push by businesses to use managed security service providers (MSSP) to help with outsourced security. ABI Research estimates the market for MSSPs will be around $33 billion by 2020....
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years....
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended by security experts as a necessity for optimum security online. 2FA is a great added security feature to protect your account because an unauthorized individual is unlikely to supply the factors required to successfully gain access....
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if you have any, and more. Even more alarming, if Exactis does have that information, so too may a hacker who discovered it leaked publicly on the internet. Marketwatch explores the breach and what it means for nearly every American involved....
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises (SMEs). An article on SME dives into a recent study of how prepared SMEs are for a security incident when it comes to their data breach response plan....
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure your business does not suffer from its devastation....
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats itself, it will not. An article on MorningStar goes into detail on why this massive cyberattack will not be enough to convince people to care about their online security....
We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left the planet in nearly a year.  So, we’re all a little uncertain.  We’re all a little confused about what is actually ok or normal.  It’s all new. ...
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. ...
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue....
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your house is an unlocked door – or doors - that may be giving access to information that can be accessed and stolen much more easily than the family heirlooms and jewels. Your home network is an entry point that is far too often overlooked....
And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we inadvertently putting a spy in our home? Do smart appliances have the ability to hear and see what we are doing?...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information. These are well organized and structured businesses that thrive – or fail – within their own economies....
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let's review the importance of various tasks that ensure business is well-prepared for the year ahead. Software Updates...
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023....
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven't yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business's reputation and finances....
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let's take a closer look at the 20 years...
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or "smishing" (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages...
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned...
The weakest link in any organization's cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built....
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce is ...
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, employees are an easy entry point for cybercriminals. While a security risk assessment will identify any gaps in a business environment, the human element should never be overlooked or assumed to be foolproof....
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it comes to identifying the risk factors.  But having a “place to start” is sometimes comforting to people when they are venturing into the unknown, and while a security risk assessment is critical to a business and an invaluable tool to you as an MSP, sometimes management has a hard time accepting that their team may be part of the risk landscape....
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to supporting clients in the healthcare industry and those are: support their network and leave HIPAA out of it, or to avoid taking on those clients altogether because of the complexity of HIPAA....
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in Orlando this month.  If you are not familiar with this event, it is the annual ConnectWise convention held in Orlando Florida where IT professionals get together to taut their wares, discuss new technologies, and have a great time being social.  We’ll get to that social part in a minute, but first, let’s cover the basics. ...
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their various platforms.  Which is great…but shouldn’t every day be a day that we’re aware of cybersecurity? This should be true especially if you’re in any way associated with the technology sector. ...
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the same time, there is another group that might not be getting as much press when it comes to feeling overwhelmed. The IT industry....
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in this situation as well as any IT provider that oversees clients and their cybersecurity....
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take full advantage of the situation regardless of how much worse it could make things for people during their time of need or vulnerability....
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: