Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

badge w light burst white (1)

Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

image 1
image 2

Featured

Artificial Intelligence (AI) is no longer a future trend—it’s happening right now. Your clients are hearing about it in meetings, reading about it in the...
Breach Secure Now has launched the first-ever Generative AI Certification designed specifically for MSPs. This new certification program gives providers the tools to lead meaningful...
Most surveys about AI in the workplace show two extremes: excitement or fear. But in reality, most people are somewhere in between. They’re curious, but...
MSPs are already their clients’ trusted security partner. Adding AI guidance to your services isn’t a stretch - it’s the logical next step....
In this "always connected" society being without Wi-Fi and Internet access makes a lot of people uncomfortable. Many people have heard about the dangers of...
Ransomware that crippled Hollywood Presbyterian Hospital made national headlines but ransomware continues to be a major menace for small to midsize businesses. A print shop...
The following article appeared in ChannelPro Network Want to increase the number of security solutions your clients purchase? Give them something of value up front...
Travelers Insurance put together the top 5 cyber risks for businesses. There are no surprises in their list. They not only look at each risk...
The New York Times has a very good article titled: No Business Too Small to Be Hacked. We have been saying for the past few...
According to an article over at The Register, the FCC has fined Cox Communication $595,000 over a 2014 data breach. Hacker disguised as IT support...
The Computer Fraud and Abuse Act CFAA is not a very widely known piece of federal legislation but could help companies that have been victims...
A form of malware called Dridex is targeting finance employees at small to midsize companies. The criminals are sending emails with Microsoft Word and Excel...
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees. And now, over 2 years later,...
I’d Like a Word with You In fact, I’d like a word with all 218 million of you. Yes, that is the number of users...
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to...
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts. Generally, clients assume that since the...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In...
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996. It’s been a great tool for listing her employment...
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations...
Being on guard can be exhausting in any situation. Learning behaviors that can offset the risk of danger can help, but it isn’t always a...
Working from home. It was fun while it lasted for many of us. Some people are scrambling to get back to the office to escape...
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon....
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how...
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals. These are...
It can be so frustrating to try to convince people that we “know better” than they do. Especially when it comes to health or safety...
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records. This now...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in...
Breach Secure Now is thrilled to announce a strategic revolution in our offering for our Managed Service Providers (MSPs) partners to build and expand upon...
At Breach Secure Now, we've been thinking about and working on solutions that address the need for MSPs to lead their clients through the Productivity...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive...
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets....
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer. This is done to exploit...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the...
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’ Short for malicious software, or malware advertising, this is the practice of...
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if...
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is:...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone. The...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility...
Sports fans undoubtedly have their favorite teams. Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”....
As an MSP, your clients know you’re there to “take care of the computers”. The scenario is often (but not always) that they have their...
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board:...
In today’s fast-paced business environment, adapting to technology changes and staying ahead of the competition is difficult. As an MSP, you can help your clients...
A hacker claims to have stolen every Social Security number (SSN). This alarming breach has sparked significant concerns, with potential implications for identity theft, financial...
Breach Secure Now is excited to announce its integration with Gradient MSP's newly released Pricing Benchmark Assessment tool. This collaboration underscores BSN's commitment to providing...
Staying ahead of the curve is more than a necessity; it's a survival tactic when it comes to cybersecurity. Recently, Meta took a significant step...
We are excited to announce a new appointment to our leadership team at Breach Secure Now. Please join us in welcoming Dan Dufault as our...
At Breach Secure Now, we are thrilled to announce our exclusive partnership with Lyra Technology Group, a leading provider of advanced technology solutions for Managed...
Cybersecurity is a critical component of business operations and the responsibility of the business and the individual. A recent breach involving TeamViewer's employee credentials underscores...
The consulting firm PwC rolled out ChatGPT to all of their employees. The goal was to use the tools on themselves before helping clients implement...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: