Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

badge w light burst white (1)

Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

image 1
image 2

Featured

Artificial Intelligence (AI) is no longer a future trend—it’s happening right now. Your clients are hearing about it in meetings, reading about it in the...
Breach Secure Now has launched the first-ever Generative AI Certification designed specifically for MSPs. This new certification program gives providers the tools to lead meaningful...
Most surveys about AI in the workplace show two extremes: excitement or fear. But in reality, most people are somewhere in between. They’re curious, but...
MSPs are already their clients’ trusted security partner. Adding AI guidance to your services isn’t a stretch - it’s the logical next step....
The US Securities and Exchange Commission (SEC) Division of Investment Management has issued cybersecurity guidance (PDF) to registered investment companies ("Funds") and registered investment advisers...
Spear phishing emails are highly effective and have been the cause of many successful hacking attempts. Unlike a regular phishing email that could be sent...
A survey by Mayer Brown shows companies consider the disclosure of PII the biggest cyber related threat. Survey respondents overwhelmingly considered the disclosure of personally,...
The CEO of Lloyd's of London, one of the largest insurance companies in the world, says that cyber risk is the most serious threat to...
Market intelligence from ABI Research estimates the current global market for managed security services will be around $15.4 billion by the 2015. They state that...
An article over at medium gives excellent insight into the real dangers of open public WiFi. After reading this article you will never use a...
Research by security company FireEye reveals that hackers are becoming much smarter in their methods to gain access to networks that they are trying to...
Breach Secure Now! can help your MSP move from Managed Services to Managed Security Services....
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United...
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees. And now, over 2 years later,...
I’d Like a Word with You In fact, I’d like a word with all 218 million of you. Yes, that is the number of users...
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to...
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts. Generally, clients assume that since the...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In...
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996. It’s been a great tool for listing her employment...
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations...
Being on guard can be exhausting in any situation. Learning behaviors that can offset the risk of danger can help, but it isn’t always a...
Working from home. It was fun while it lasted for many of us. Some people are scrambling to get back to the office to escape...
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon....
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how...
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals. These are...
It can be so frustrating to try to convince people that we “know better” than they do. Especially when it comes to health or safety...
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records. This now...
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in...
Breach Secure Now is thrilled to announce a strategic revolution in our offering for our Managed Service Providers (MSPs) partners to build and expand upon...
At Breach Secure Now, we've been thinking about and working on solutions that address the need for MSPs to lead their clients through the Productivity...
Breach Secure Now's Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie...
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive...
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets....
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer. This is done to exploit...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the...
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’ Short for malicious software, or malware advertising, this is the practice of...
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if...
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is:...
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone. The...
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility...
Sports fans undoubtedly have their favorite teams. Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”....
As an MSP, your clients know you’re there to “take care of the computers”. The scenario is often (but not always) that they have their...
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board:...
In today’s fast-paced business environment, adapting to technology changes and staying ahead of the competition is difficult. As an MSP, you can help your clients...
A hacker claims to have stolen every Social Security number (SSN). This alarming breach has sparked significant concerns, with potential implications for identity theft, financial...
Breach Secure Now is excited to announce its integration with Gradient MSP's newly released Pricing Benchmark Assessment tool. This collaboration underscores BSN's commitment to providing...
Staying ahead of the curve is more than a necessity; it's a survival tactic when it comes to cybersecurity. Recently, Meta took a significant step...
We are excited to announce a new appointment to our leadership team at Breach Secure Now. Please join us in welcoming Dan Dufault as our...
At Breach Secure Now, we are thrilled to announce our exclusive partnership with Lyra Technology Group, a leading provider of advanced technology solutions for Managed...
Cybersecurity is a critical component of business operations and the responsibility of the business and the individual. A recent breach involving TeamViewer's employee credentials underscores...
The consulting firm PwC rolled out ChatGPT to all of their employees. The goal was to use the tools on themselves before helping clients implement...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: