Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

SMB icon

Announcing: The AI Risk to Adoption Program℠ (R2A Program)

Gain visibility and control over AI usage. Adopt AI safely. Avoid disruption. Drive measurable business impact in just 90 days.

Featured

Breach Secure Now’s integration with ScalePad Lifecycle Manager gives MSPs greater visibility into client security training data, phishing performance, and employee risk trends. By connecting...
Generative AI is reshaping the phishing landscape, making attacks more polished, personalized, and difficult to detect. As AI-assisted phishing campaigns achieve dramatically higher click rates,...
Traditional cybersecurity training isn’t changing behavior because it isn’t relevant to how people actually work. This blog explores why role-based training is the future and...
AI is already being used across your organization, often without visibility or control. This blog explores a structured path to adoption and introduces the AI...
The arrival of COVID-19 restructured the world in countless ways. We have had to rethink how we socialize, live day-to-day, and in order to keep...
Effective Immediately As the Novel Coronavirus pandemic continues to greatly impact our nation, working from home is no longer an occasional benefit for many Americans,...
We’ve all been through challenging times personally and professionally, and in our heads and hearts, we know that “this too shall pass”. But with the...
The Untapped Vertical With the cannabis industry growing rapidly in the United States, and more states legalizing marijuana, this sector of business is one that...
An Easy Target The value of stolen data increases when it is more easily manipulated and used. With a social security number, you can apply...
Malvertising We are in a time when “fake news” has become a term thrown around so frequently it is now part of our vernacular. In...
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees. And now, over 2 years later,...
We are excited to announce a webinar with our technology partner Trusted Metrics. The webinar is geared towards MSPs and will provide insight into monitoring...
The following article appeared in ChannelPro Network Want to increase the number of security solutions your clients purchase? Give them something of value up front...
Travelers Insurance put together the top 5 cyber risks for businesses. There are no surprises in their list. They not only look at each risk...
The New York Times has a very good article titled: No Business Too Small to Be Hacked. We have been saying for the past few...
A form of malware called Dridex is targeting finance employees at small to midsize companies. The criminals are sending emails with Microsoft Word and Excel...
In a Verizon Data Breach Investigations Study, they found that 71% of breaches occurred in businesses with less than 100 employees. You would think that...
According to an article over at SC Magazine, hackers are using brute force to crack their way into Remote Desktop / Terminal Servers and installing...
There is a very good article over at the Grand Forks Herald that makes a compelling case that employees are the biggest security threat a...
End of Windows 7 They say when one door closes another one opens, but in this case, it’s a window. On January 14th, 2020, Microsoft...
I just fell for a phishing email. Yep, the guy who builds services to protect clients from phishing emails was tricked by a phishing email!...
The team here at Breach Secure Now curated a lot of content in 2019 that we hope you found informative and thought-provoking when it came...
Evil Twin You’re out and about for any number of reasons. Traveling for work. Killing time while waiting for co-workers or family members. But you...
It isn’t breaking news that there is a steady - and alarming - rise in cybersecurity breaches and overall compromises in data and hardware. What...
Nothing Random in this Ransom The end of the year always gives one reason to reflect back and review the past 12 months in a...
Alexa, What Are You Collecting? At the top of many holiday gift lists was a smart speaker device. They can make our life easier and...
You can teach your clients how to spot a phishing email and hope that they take heed. You can warn them about the dangers of...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: