Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

SMB icon

Announcing: The AI Risk to Adoption Programâ„  (R2A Program)

Gain visibility and control over AI usage. Adopt AI safely. Avoid disruption. Drive measurable business impact in just 90 days.

Featured

Generative AI is reshaping the phishing landscape, making attacks more polished, personalized, and difficult to detect. As AI-assisted phishing campaigns achieve dramatically higher click rates,...
Traditional cybersecurity training isn’t changing behavior because it isn’t relevant to how people actually work. This blog explores why role-based training is the future and...
AI is already being used across your organization, often without visibility or control. This blog explores a structured path to adoption and introduces the AI...
A recent LinkedIn poll reveals why organizations are prioritizing employee productivity training. Learn how cybersecurity awareness, AI adoption, and compliance demands are shaping today’s workplace....
Bell bottoms, neon colors…kale…trends come, and trends go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends? That’s one...
The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look...
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors...
Regardless of whichever way you lean politically, the recent announcement of a few incoming Presidential government staff appointments is hopefully good news to those who...
Let’s try to make lemonade out of these lemons we keep getting with COVID-19. Yes, there is an uptick in the number of cases and...
With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty...
As the need for cybersecurity awareness increases across the entire business landscape, so does the need for strong programs and a trained and competent workforce....
There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and...
Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of...
Hot Spots New York and California. The mention of these two locations may have you conjuring up images of entertainment, celebrities, and people living the...
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts. Generally, clients assume that since the...
Missed Opportunities Missed opportunities. They come in many forms, shapes, and sizes. It might be personal, professional, or just for the fun of a moment....
Business email compromises (BEC) scams made a big statement in 2018, seeing a 133% increase over 2017, according to a recent report by Beazley Breach...
How many times do I have to tell you? Sadly, if you’re reading this, odds are that you are an adult now, but you should...
Tis the season! You’re making mental plans with what is hopefully a generous tax refund and deciding what to do with the surplus of cash...
We are all aware of federal compliance regulations when it comes to the privacy and security of our information. For example, you’d be hard pressed...
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether...
October kicks off 2020’s cybersecurity awareness month, and if this year has given us any type of certainty, it’s that smart cyber practices are a...
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent...
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity - and COVID-19 gave them so much bang for...
You can’t help someone effectively if you don’t know the details of their situation. So how can you determine what your clients need if you...
The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) division announced a final directive this week that requires all individual federal civilian...
The conversation around selling your services can get uncomfortable for a variety of reasons. We all have our own beliefs as to how we should...
Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’re not familiar with...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: