Welcome to the BSN Blog

Explore topics in AI awareness, cybersecurity, productivity, and compliance. Stay ahead of the curve with expert insights.

Featured

Explore how AIRIA enhances AI readiness for MSPs. Discover the transformative benefits of integrating generative AI with our webinar. Boost productivity and strategic alignment for...
Learn how MSPs can harness AI Awareness and Security Awareness Training to protect and empower their clients against sophisticated cyber threats. Discover the unique opportunities...
Businesses are rapidly adopting AI, but many lack the training to use it effectively and securely. Learn why MSPs should offer AI Awareness Training to...
On Friday we launched the Breach Secure Now! Breach Prevention Platform (BPP)! The BPP is a security service built for MSPs to help lower the...
In this "always connected" society being without Wi-Fi and Internet access makes a lot of people uncomfortable. Many people have heard about the dangers of...
Ransomware that crippled Hollywood Presbyterian Hospital made national headlines but ransomware continues to be a major menace for small to midsize businesses. A print shop...
Travelers Insurance put together the top 5 cyber risks for businesses. There are no surprises in their list. They not only look at each risk...
The New York Times has a very good article titled: No Business Too Small to Be Hacked. We have been saying for the past few...
According to an article over at The Register, the FCC has fined Cox Communication $595,000 over a 2014 data breach. Hacker disguised as IT support...
The Computer Fraud and Abuse Act CFAA is not a very widely known piece of federal legislation but could help companies that have been victims...
A form of malware called Dridex is targeting finance employees at small to midsize companies. The criminals are sending emails with Microsoft Word and Excel...
Breaches are becoming increasingly common as cybercriminals continue to advance their skills and tactics to trick their victims into falling for their scams. While cybercriminals...
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by...
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack...
Cybercriminals have no boundaries when experimenting with ways to successfully carry out a cyberattack. We have seen these criminals prove time after time just how...
Identified by the U.S. Department of Justice as 2017’s “biggest cyberthreat”, ransomware is making a name for itself across the board. While you may think,...
We all know that ransomware can be detrimental to businesses, but just how much could an attack cost your business? According to a survey released...
You know ransomware is a real threat when it starts showing up on TV shows. Chicago Med is a victim of a ransomware attack on...
As most businesses rely heavily on technology to operate efficiently and serve their customers, we embrace the convenience of digital tools. It is crucial not...
QR Codes. The versatile little black and white squares that we see everywhere. Advertising materials to event tickets, restaurant menus, and even on product packaging....
So far in 2023, we have witnessed a concerning (but not surprising) rise in cyberattacks, particularly in the form of ransomware and phishing. And understanding...
Organizations of any size, and of all industries must adopt a proactive approach to protect their assets through a strong cybersecurity program. And an integral...
The threat of cyber attacks looms large over businesses of various industries. And unfortunately, the legal industry is not immune to risk. Law firms face...
The proliferation of scams and frauds leveraging artificial intelligence (AI) to deceive unsuspecting individuals and organizations is, as expected, on the rise. As an MSP,...
Disinformation refers to intentionally false or misleading information spread through various mediums, including social media, websites, and online forums. Its primary objective is to manipulate...
Recently, the Federal Bureau of Investigation (FBI) issued a crucial Public Service Announcement (PSA) highlighting the growing concern of malicious cyber actors using deepfake technology...
Knowledge is power. And when it comes to fighting hackers, we need all the power we can collectively find. Educating your employees is the key...
Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of...
You Can’t Teach an Old Dog…. or Can You? I remember trying to explain a VCR to older relatives. It wasn’t that they were less...
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations...
Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much...
Known for its anonymity, the Dark Web is a dangerous portion of the internet only accessible by using a special browser. This “secret spot” of...
Human-error; we talk about it all the time, but what exactly do we mean? Human-error occurs when an individual performs a task or does something...
The following blog first appeared on the Secure ERP blog. It is reprinted here with permission. Some small business owners will realize I’m describing them...
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets....
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer. This is done to exploit...
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And...
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the...
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of...
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value...
As the end of the year gets closer, it's not just the holiday season that demands our attention—it's also a crucial time for businesses to...
Cultivating Partnerships: Crites, Spearheads Channel Growth Breach Secure Now (BSN), a pioneering cybersecurity training and productivity company, proudly announces the appointment of Tracie Crites as...
Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: