Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

badge w light burst white (1)
Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

image 1
image 2

Featured

AI is increasing the speed and volume of output, leaving many organizations feeling overwhelmed. But overwhelm is not the problem, it is a signal. The...
AI is helping teams move faster than ever, but more output doesn’t always mean more progress. As idea generation accelerates, many organizations are struggling to...
Employees are using AI tools like ChatGPT to work faster, but without oversight, it’s creating a new risk called Shadow AI. From leaked source code...
AI is transforming how organizations operate, but most are not seeing real results. The missing link is AI fluency, not just access to tools. Leaders...
The work of an MSP is often taken for granted – until something goes wrong. And then you are the first phone call that a...
This past week Howard University had to cancel classes due to “unusual activity on the University’s network”. As a result, their Enterprise Technology Services (ETS)...
The threat to a business from outside perpetrators is very real when it comes to cybercrime. But sometimes the threat comes from within, and it...
Watch this on-demand, 30-minute boot camp, "Microsoft & BSN: Azure AD, Defender, & Catch Phish", to sit down with Allison Kastel and Bo Chea as...
Last week the President met with leaders in the private sector as well as those in education to discuss the need to address cybersecurity threats...
Last week we saw the mobile phone carrier T-Mobile fall victim to cybercriminal activity when a hacker accessed the personal data of their users. They...
You can’t fix what you don’t know is broken. And that in a nutshell sums up why you need to do a security risk assessment...
Trends come and go and keeping up with them when it comes to pop culture or fashion might be challenging, but when it comes to...
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon....
This week we welcome Scott McClain, owner of Network Design Consultants as he discusses his experience as an MSP with healthcare clients and how his...
It’s that little alert on your desktop. The “upgrades available” indicator when you check your computer. Or when your smartphone tells you that it’s going...
In August of 2019, Facebook was the victim of a data breach that compromised information from 533 million people from 106 different countries. Why is...
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals. These are...
At this time of year, we all risk resembling Charlie Brown waiting on his Valentine in the mailbox. Has my check arrived? Is it in...
It can be so frustrating to try to convince people that we “know better” than they do. Especially when it comes to health or safety...
There’s a March Madness of a different kind that happens each year during this time of tournaments: the onslaught of phishing emails that users fall...
It's back-to-school time, and no matter the age of the student, or the location of the school, there's one class that everyone needs to pass....
With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will...
Misrepresenting yourself is easy to do in a world where many of our interactions exist online. Why not put that profile photo of yourself up...
Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far...
Strong password behavior is the foundation of many aspects of a cybersecurity program. There are still people that have the same password for all their...
Dashboard Tag Filtering Grouping items together with tags is an effective way to put order to the items that you write, collect, and store electronically....
We are excited to announce that our annual training is now mobile device ready! Your clients can now complete their full training courses just as...
Since Breach Secure Now was founded by an MSP. We have strong roots in understanding our partners' unique opportunities and challenges. We are proud to...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: