Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

SMB icon

Announcing: The AI Risk to Adoption Program℠ (R2A Program)

Gain visibility and control over AI usage. Adopt AI safely. Avoid disruption. Drive measurable business impact in just 90 days.

Featured

Breach Secure Now’s integration with ScalePad Lifecycle Manager gives MSPs greater visibility into client security training data, phishing performance, and employee risk trends. By connecting...
Generative AI is reshaping the phishing landscape, making attacks more polished, personalized, and difficult to detect. As AI-assisted phishing campaigns achieve dramatically higher click rates,...
Traditional cybersecurity training isn’t changing behavior because it isn’t relevant to how people actually work. This blog explores why role-based training is the future and...
AI is already being used across your organization, often without visibility or control. This blog explores a structured path to adoption and introduces the AI...
Facebook Status: Away on Vacation Social media is great for a lot of things. Sharing photos, reconnecting with old friends, finding like-minded people and groups...
When Global News Hits Home When you hear and watch news headlines, you can often tune out. It’s not happening here; it’s not affecting you...
Sunday funnies Remember the Jetsons? Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks? Flying cars aside, we aren’t too far...
In business, if you can cast a bigger net to reach a larger audience, it’s considered a good idea – a win. Unfortunately, hackers are...
And So, It Grows First, it was a widespread, if not generic, notion – you need to protect your personal information. Then we began to...
Ransomware Is Not Randomware Gone are the days where you “might know” someone who has, or will, come under attack to a ransomware attack. The...
RobbinHood – the Not so Heroic New Outlaw Stealing from the rich to give to the poor – in theory, the original Robin Hood had...
Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of...
Missed Opportunities Missed opportunities. They come in many forms, shapes, and sizes. It might be personal, professional, or just for the fun of a moment....
You Can’t Teach an Old Dog…. or Can You? I remember trying to explain a VCR to older relatives. It wasn’t that they were less...
Business email compromises (BEC) scams made a big statement in 2018, seeing a 133% increase over 2017, according to a recent report by Beazley Breach...
How many times do I have to tell you? Sadly, if you’re reading this, odds are that you are an adult now, but you should...
Tis the season! You’re making mental plans with what is hopefully a generous tax refund and deciding what to do with the surplus of cash...
We are all aware of federal compliance regulations when it comes to the privacy and security of our information. For example, you’d be hard pressed...
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In...
Being scammed can happen so easily today, but when you make it about a topic that many people can let their guard down with, the...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: