Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

SMB icon

Announcing: The AI Risk to Adoption Programâ„  (R2A Program)

Gain visibility and control over AI usage. Adopt AI safely. Avoid disruption. Drive measurable business impact in just 90 days.

Featured

Breach Secure Now’s integration with ScalePad Lifecycle Manager gives MSPs greater visibility into client security training data, phishing performance, and employee risk trends. By connecting...
Generative AI is reshaping the phishing landscape, making attacks more polished, personalized, and difficult to detect. As AI-assisted phishing campaigns achieve dramatically higher click rates,...
Traditional cybersecurity training isn’t changing behavior because it isn’t relevant to how people actually work. This blog explores why role-based training is the future and...
AI is already being used across your organization, often without visibility or control. This blog explores a structured path to adoption and introduces the AI...
On Friday we launched the Breach Secure Now! Breach Prevention Platform (BPP)! The BPP is a security service built for MSPs to help lower the...
In the mistaken belief that their companies are not big enough to attract data thieves, small and midsize businesses notoriously resist tightening their IT security,...
We are excited to announce a webinar with our technology partner Trusted Metrics. The webinar is geared towards MSPs and will provide insight into monitoring...
Ransomware that crippled Hollywood Presbyterian Hospital made national headlines but ransomware continues to be a major menace for small to midsize businesses. A print shop...
The following article appeared in ChannelPro Network Want to increase the number of security solutions your clients purchase? Give them something of value up front...
Travelers Insurance put together the top 5 cyber risks for businesses. There are no surprises in their list. They not only look at each risk...
The New York Times has a very good article titled: No Business Too Small to Be Hacked. We have been saying for the past few...
According to an article over at The Register, the FCC has fined Cox Communication $595,000 over a 2014 data breach. Hacker disguised as IT support...
As we talk to potential MSP partners and give presentations at ASCII and MAXfocus events, we are starting to hear a common message: I worried...
An article in Forbes discusses the risk of cyberattacks on businesses. Many companies are unprepared to prevent a cyberattack. Yet many are still ill-prepared for...
The US Securities and Exchange Commission (SEC) Division of Investment Management has issued cybersecurity guidance (PDF) to registered investment companies ("Funds") and registered investment advisers...
Spear phishing emails are highly effective and have been the cause of many successful hacking attempts. Unlike a regular phishing email that could be sent...
A survey by Mayer Brown shows companies consider the disclosure of PII the biggest cyber related threat. Survey respondents overwhelmingly considered the disclosure of personally,...
Market intelligence from ABI Research estimates the current global market for managed security services will be around $15.4 billion by the 2015. They state that...
An article over at medium gives excellent insight into the real dangers of open public WiFi. After reading this article you will never use a...
Research by security company FireEye reveals that hackers are becoming much smarter in their methods to gain access to networks that they are trying to...
Plan, people, policies Under the guidance of Maria Vullo, the New York Department of Financial Services (NYDFS) created and finalized cybersecurity regulations for the banks,...
Some of us attack and engage in our holiday shopping with a plan that rivals the most well thought out strategies. We scour weekly fliers,...
If your phone rings and the caller id is UNKNOWN, you likely won’t answer. And scammers know that, so they’ve been cleverly hiding behind fake...
Prices may go down over the holidays but hacking incidents go up. Way up. While online shopping is something we all need to be diligent...
Modern Law Cybersecurity is something you have to think about at the individual level. At the healthcare level. And at your place of business. But...
Election season scams Political candidates will target voters to get their message across, and hackers will take advantage of the timing. With petitions, polls, and...
Skim This Over Recently the FBI issued a warning against e-skimming threats in response to the increase of attacks on small and medium-sized businesses, as...
New Lures for Phishing A recent security alert from the online payment processing company Stripe has informed users of a phishing scam that shows just...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: