• Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us

Call us at: 877-275-4545

Partner? Login here
Breach Secure Now!Breach Secure Now!
  • Home
  • Blog
  • Products
    • Partner Subscription
    • Breach Prevention Platform
    • HIPAA Services
    • Dark Web Monitoring
    • In-Email Training & Email Analysis | Catch Phish Outlook Plug-In
  • Request a Demo
  • About Us
  • Contact Us
  • All
  • Community
  • Cyber Insurance
  • Data Breach
  • HIPAA
  • Infographic
  • Integration
  • Marketing
  • Ransomware
  • Reporting
  • Security
  • Training
  • Webinars
targeted phishing attack

Phishing: Targeted Attacks

January 20, 2023

The threat of phishing remains prevalent in all aspects of digital life. Both personal and professional. But a recent deep dive by Mandient into the details of a more specific kind of attack that is on the rise. This shines a light on the threat of industrial-themed email attacks and how they can affect operational […]

Read more
Human Error

Human Error

January 13, 2023

Major Impact Earlier this week the Federal Aviation Administration (FAA) announced a nationwide ground stop of all flights.  Approximately 9,000 flights were delayed, and over 1,000 flights were canceled. The reason why?  The NOTAM system (short for Notice to All Air Missions), which is designed to provide real-time information to pilots and air traffic controllers […]

Read more
New Year's Resolution: Train More

New Year’s Resolution: Train More

January 6, 2023

Which resolutions have you set for yourself in 2023? Let me guess: get fit, eat healthily, and hit the gym on a regular basis. These are good choices, but how about another way to incorporate training into your schedule? And this one may pay off in dollars saved, not pounds lost. Why Train? Cybersecurity training […]

Read more
Social Security Scams

Social Security Scams

December 30, 2022

Social Security Scams While many of us are taking time at the end of the year to enjoy our friends and family’s company and goodwill, cybercriminals are using it as an opportunity to scam people. One such opportunity comes with the end-of-year renewal of programs and policies. And Social Security scams are one of the […]

Read more
Last Minute Scams

Last Minute Scams

December 23, 2022

Quick! Get to the store for that forgotten gift…order online and pay for overnight shipping…whatever it takes to get the gift in hand for the holiday ahead! We know the holidays are coming, but inevitably we are scrambling to get some things done at the last minute. And where there’s an opportunity, there’s a scam. […]

Read more
Artificial Intelligence

AI: Artificial Intelligence

December 16, 2022

Artificial Intelligence (AI) is gaining popularity among everyday consumers like so many technologies, through social media. Just take a quick look in your newsfeed and you’re likely to see your friends in otherworldly scenarios they’ve created with Magic Avatars from Lensa. With over 4 million downloads in the first part of December, it’s clearly a […]

Read more
Holiday Scams

Holiday Scams

December 9, 2022

End of year wrap-up has many of us in a hurry. We rush to get our businesses buttoned up, our shopping done, and our tasks completed so that we can enjoy the time off. Along with our tendency to rush, is the feeling of merriment and goodwill, and we may assume everyone else is operating […]

Read more
Phishing

Phishing

December 2, 2022

You are familiar with phishing. You’ve taught your clients and colleagues to be on alert for fraudulent emails. But are you changing your approach to education and training to match the sophistication of cybercriminals and their tactics? Smart Phishing Teaching effectively doesn’t necessarily mean endless bits of content and methodologies. It means that each lesson […]

Read more
Black Friday Scams

Smart Shopper: Black Friday Scams

November 23, 2022

‘Tis the Season The unofficial official shopping season starts this week, and if there is a sale, there might be a scam close by. As the prices go down, so does our guard. We fear losing out on a deal and can act without thinking. A few quick reminders to stay cyber-safe. Fraudulent Websites Don’t […]

Read more
Healthcare Clients

Healthcare Clients

November 18, 2022

When it comes to needing a strong cybersecurity program, don’t overlook the opportunity that the healthcare industry presents. There is a market here that MSPs should be focused on as a way to grow their business. Why Focus Here? Healthcare continually remains one of the largest targeted industries for cybercriminals. The payoff for a data […]

Read more
Social Media Reminders

Social Media Reminders

November 10, 2022

Sloppy social media habits can lead to a compromise that extends beyond an individual’s personal account. Many people don’t realize that their login credentials tie them together with an invisible thread in the dark web. A hacked social account could lead to access to business credentials or more. Hackers 101 Being in IT, you’re familiar […]

Read more
mobile phone malware

Mobile Phone Spyware

November 3, 2022

Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is […]

Read more
deepfake

What is Deepfake

October 26, 2022

A deepfake is a portmanteau (more on that in a moment) of “deep learning” and “fake”. What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If […]

Read more
BSN and Gradient MSP

Breach Secure Now & Gradient MSP

October 17, 2022

Breach Secure Now is a partner-focused business. We work for the MSP community to provide them with the most comprehensive cybersecurity solutions for their clients. Gradient MSP also works with MSPs to provide the tools that integrate their solutions. The Right Partnership Because BSN was founded by an MSP for MSPs, we know the importance […]

Read more
Cyber Identity

Cybersecurity Awareness Month: See Yourself in Cyber

October 12, 2022

This month we celebrate National Cybersecurity Awareness Month. The year’s campaign theme of “See Yourself in Cyber” focuses on the individual. This collaborative effort is done to raise awareness between government and industry. It is overseen by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) working together. The theme this […]

Read more
Cybersecurity Awareness Month

Cybersecurity Awareness Month

October 5, 2022

October is National Cybersecurity Awareness Month and Breach Secure Now is here to make sure that we get everyone involved in the cybersecurity ‘celebration’! Everyone – and we mean every single person needs to be aware of cybersecurity and the best practices that keep their world secure.  The ripple effect of breached information can travel […]

Read more
MSP Experts

MSP the Expert

September 28, 2022

Small businesses often make the mistake that they have to be cybersecurity experts to have strong security programs in place. Remind them that as their MSP, you can be their expert. The concern is often that learning how to protect their business will be overwhelming. One more thing to do. Or that they need to […]

Read more
social engineering

Social Engineering In Action

September 21, 2022

Is social engineering that effective? Ask an Uber or Rockstar Games employee that question and you’ll likely hear a resounding yes. This effective mode of duping people within a targeted group or business was the method that one hacker used to hit both companies with a breach. Just how effective is it? In 2021, the […]

Read more
botnet

What Is a Botnet?

September 14, 2022

You may hear the word ‘bot’ used in conversations, especially around cybersecurity.  But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network.  It describes a network of computers that are infected by malware.  This malware is controlled by a […]

Read more
School Cyberattack Warning

Cyberattack Increase Warning Issued for Schools

September 7, 2022

Back-to-school time is in full swing and imagine if the only threat that schools faced would be running out of tissues during sniffle season? Unfortunately, that isn’t the case. A cyberattack warning from the FBI, CISA, and MS-ISAC has been issued indicating that cybersecurity “attacks may increase as the 2022/2023 school year begins and criminal […]

Read more
Student Loan Scams

Student Loan Scams

August 31, 2022

Student Loan Scams With the launch of the U.S. Student Loan Forgiveness program, there is an opportunity for students and other borrowers to benefit. Any scenario that puts millions of people in a target pool is ideal for hackers. Add to the scenario the list of questions and uncertainties and you have a recipe for […]

Read more
RaaS

Ransomware as a Service

August 24, 2022

What is ransomware as a service? You’re likely familiar with software as a service (SaaS) but ransomware? What does that mean? First, let’s do a quick recap of what ransomware is. It is a type of malware that holds the victim’s files and folders for ransom. Through human error, the malware is deployed and encrypts […]

Read more
zero trust

What Is Zero Trust?

August 17, 2022

Zero Trust Access Zero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified.  The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term […]

Read more
MSP Lead by Example

MSP: Leading by Example

August 9, 2022

As an MSP, your business is designed to serve your clients.  That means fixing what breaks and preparing them for what might break.  You encourage behaviors that eliminate the breaking altogether.  As a Breach Secure Now partner, you’re likely approaching this from multiple angles.  Ongoing training, social media reminders, and products that integrate with their […]

Read more
student cybersecurity

Back to School: Student Cybersecurity Tips

August 2, 2022

It’s back-to-school time, and no matter the age of the student, or the location of the school, there’s one class that everyone needs to pass. Smart cybersecurity habits need to be on all of our minds, and we can’t afford to fail. We’ve put together some reminders about staying safe online and with your technology. […]

Read more
Human Element of Cybersecurity

The Human Element

July 26, 2022

With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will stand in line for hours to be the first to have a new phone when it is released.  Camp out on Black Friday to get a good deal on electronics […]

Read more
Cyber Insurance Liabillity

Cyber Insurance Liability

July 19, 2022

Misrepresenting yourself is easy to do in a world where many of our interactions exist online.  Why not put that profile photo of yourself up at the gym from a few years ago when you actually went there regularly?  You’ll eventually get back to working out.  There’s no harm in it. Deceptive? Sort of.  But […]

Read more
summer phishing

Summer Phishing

July 14, 2022

Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far gone to recapture. Additionally, as an MSP, there are so many clients relying on you, that it can be difficult to take time for yourself.  Enter Breach Secure Now We are […]

Read more
Strong Password Behavior

Strong Password Behavior

July 5, 2022

Strong password behavior is the foundation of many aspects of a cybersecurity program. There are still people that have the same password for all their accounts. As an MSP, you can’t be there when they create passwords to oversee the process. But you can enable measures that will force them to engage with good habits. […]

Read more
Dashboard Tag Filtering

Dashboard Tag Filtering

June 27, 2022

Dashboard Tag Filtering Grouping items together with tags is an effective way to put order to the items that you write, collect, and store electronically.  Tagging records allows you to label and group data in the same way.  Breach Secure Now has built upon that approach with a new update for our partners! Our latest […]

Read more
training available on mobile devices

Annual Training Now on Mobile Devices

June 20, 2022

We are excited to announce that our annual training is now mobile device ready!  Your clients can now complete their full training courses just as they did on their desktop, but in a mobile format as well.  What Does This Mean? You will now be able to offer your client’s users access to watch the […]

Read more
CloudRadial

Breach Secure Now Integrates With CloudRadial

June 12, 2022

Since Breach Secure Now was founded by an MSP. We have strong roots in understanding our partners’ unique opportunities and challenges. We are proud to be a company that focuses our platform and solutions on the needs of the MSP community and its clients. How do we accomplish that? By continuously seeking partner feedback to […]

Read more
PECA Pre Employment Cybersecurity Assessment

Pre-Employment Cybersecurity Assessment

June 7, 2022

Last year our team developed an innovative and one-of-a-kind security risk assessment, with a one-of-a-kind name. The Baseline Employee Cybersecurity Assessment, or BECA, was released in December and has been successfully used by our MSP partners as both a prospecting tool for prospective clients and a relationship-building tool for their existing clients! Since then, our […]

Read more
Malvertising

What Is Malvertising?

May 31, 2022

Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’  Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem […]

Read more
What is Vishing

What Is Vishing?

May 23, 2022

Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if they don’t know how to recognize a fraudulent email.   In fact, Google recently warned nearly 5 million people in a recent week about potentially harmful sites that they are about […]

Read more
scam alert

Scam Alert: Interview & Job Scams

May 16, 2022

Scam Alert: Interview & Job Scams There are some topics that might seem irrelevant or not important when it comes to alerting your clients with regard to their online safety and cybersecurity.  One of those might be about the process of looking at other jobs for a career change or simply to supplement their current […]

Read more
client newsfeed

Increase Engagement & Awareness In Your Ongoing Training Program

May 12, 2022

Staying engaged and interacting with your clients just got easier.  And in the cybersecurity realm, no one can afford to stay complacent and ‘forget’ just how integral smart and secure habits are when it comes to lowering your risk of a breach.  You can’t be there onsite for your clients and calling them daily to […]

Read more
Initial Access Brokers

Initial Access Brokers: Who Are They?

May 2, 2022

Imagine if a locksmith created a key for your home or business, then sold a copy of that key to a burglar.  They didn’t steal your belongings, but they provided access, making them integral to the process for it to occur.  Initial Access Brokers (IABs) work in a similar fashion.  The name says it all, […]

Read more
removable media

Removable Media & Cybersecurity

April 25, 2022

According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image […]

Read more
sharkbot disguised

Dangerous Malware Disguised as Antivirus Software

April 18, 2022

It is so easy to become complacent in our cybersecurity behaviors.  But Android users should be given a shake this week and alerted to malware that is being deployed unknowingly by users who think that they are downloading anti-virus apps via the Google Play store.  There were six different cases found to contain the Sharkbot […]

Read more
compromised data

Compromised Data Comes in Many Forms 

April 11, 2022

No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone.  The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic.    The notification […]

Read more
Tax Scams: What to Look Out for This Season

Tax Scams: What to Look Out for This Season

April 5, 2022

Many of us dread this time of year for the obvious reason …tax time can be well, very taxing.  Add to the challenge of it all, that many of us are working from home, and find ourselves in a whole new and unfamiliar scenario of what we can claim as a tax write-off.  We’re all […]

Read more
MVP

MVP: Most Valuable Player

March 28, 2022

Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning […]

Read more
Game Plan: Building a Strong Security Posture Within a Team

Game Plan: Building a Strong Security Posture Within a Team

March 21, 2022

Sports fans undoubtedly have their favorite teams.  Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations.  These are the teams that are often “drama-free”.  They […]

Read more
understanding the dark web

Nothing But InterNET – How to Explain the Dark Web

March 14, 2022

As an MSP, your clients know you’re there to “take care of the computers”.  The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.  Regardless of their level of insight or knowledge of technology, they likely know […]

Read more
It’s Game Time – Shoot, Score, Win!

It’s Game Time – Shoot, Score, Win!

March 7, 2022

Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect.  If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner.  But, when discussing a strategy […]

Read more
BSN Wrapping Up a Month of Love!

BSN Wrapping Up a Month of Love!

February 28, 2022

Well, today wraps up the month of February and the celebration of our love about being a part of an incredible community of MSPs and channel vendors dedicated to cybersecurity.  During the month of February, we shared some serious love for our partners, and really enjoyed seeing all of you that shared your #BSNLove on […]

Read more
Inskyber

Partnerships We Love: Breach Secure Now and Inskyber

February 24, 2022

We take thee for better or for worse, in good times and in bad, in sickness and in health…we will be there for you in your time of need…. ah, the familiar words we hear as two parties engage at the beginning of their road together.  You’re in it together and promise to stand by […]

Read more
What We Love at BSN

What We Love to Do at Breach Secure Now

February 14, 2022

Find something you love to do, and you’ll never have to work a day in your life.  Whether or not you have heard that exact quote before, it likely will resonate with all of us.  Loving what you do means that you have fervor for finding answers, are delighted at discovering different ways to approach […]

Read more
BSN Seeking MSP

BSN Seeking MSP

February 7, 2022

Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between.  And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there!  Tell Me a Little Bit About […]

Read more
BECA remote worker

Breaking Down the Baseline Employee Cybersecurity Assessment – Working Remotely

January 31, 2022

Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]

Read more
Breaking Down the Baseline Employee Cybersecurity Assessment – Social Media

Breaking Down the Baseline Employee Cybersecurity Assessment – Social Media

January 26, 2022

Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]

Read more
BECA Password Hygiene

Breaking Down the Baseline Employee Cybersecurity Assessment – Password Hygiene

January 17, 2022

Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]

Read more
Breaking Down the Baseline Employee Cybersecurity Assessment – Handling PII

Breaking Down the Baseline Employee Cybersecurity Assessment – Handling PII

January 10, 2022

Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]

Read more
Baseline Employee Cybersecurity Assessment: Phishing

Breaking Down the Baseline Employee Cybersecurity Assessment – Phishing

January 4, 2022

Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]

Read more
Breaking Down the Baseline Employee Cybersecurity Assessment – General Cybersecurity Knowledge

Breaking Down the Baseline Employee Cybersecurity Assessment – General Cybersecurity Knowledge

December 29, 2021

Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts.  As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper […]

Read more
Introducing the Baseline Employee Cybersecurity Assessment

Introducing the Baseline Employee Cybersecurity Assessment

December 21, 2021

Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people?   Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it […]

Read more
2022 Cybersecurity Budgets

2022 Cybersecurity Budgets

December 14, 2021

Let’s talk end of year! Cybersecurity budgets vary across businesses, with some spending millions of dollars each year and others only a small fraction of that. But no matter the size of your client’s cybersecurity budget, there are a few key steps you can take to make sure it’s effective. Help Your Clients Identify Their […]

Read more
Cybersecurity Agents Unite!

Cybersecurity Agents Unite!

December 6, 2021

It’s holiday blockbuster season!  The time of year when the big screens are full of movie releases that are expected to pull in the crowds that want to watch Marvel and DC Comic heroes unite to save the world. They come from all realms to fight the dark forces that threaten humanity.  Together they will […]

Read more
Incident Response Plan

How to Create an Incident Response Plan

November 29, 2021

We often discuss the proactive approach that you should take when it comes to cybersecurity.  Security risk assessments will identify the gaps, ongoing training will help to strengthen the human risk factor, and tools like Catch Phish will keep the team engaged and learning along with those training programs.  But the fact is, you can’t […]

Read more
Black Friday Scams

Black Friday Scams

November 22, 2021

Don’t Be Scammed By a Turkey It’s Thanksgiving week and that also means that the holiday season has officially started for most of us.  And just the holiday season of our youth, as in summer vacation from school, this is the time of year when we as adults tend to put our feet up and […]

Read more
Do Your Healthcare Clients Need an Annual Checkup?

Do Your Healthcare Clients Need an Annual Checkup?

November 16, 2021

Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running.  Which vertical they are in, or what products and services they provide may not be the most pressing detail.  Unless you’re talking about healthcare.  There are two common views when it comes to […]

Read more
IT Nation Week

IT Nation Week

November 8, 2021

‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year.  Or is it years now? It feels like years.   While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in […]

Read more
Reasons to Perform a Security Risk Assessment

Reasons to Perform a Security Risk Assessment

November 2, 2021

Performing a Security Risk Assessment (SRA) is one of the things that Managed Service Providers can utilize as a way to solidify their client relationships and grow their business.  Offering it to existing clients is a way of showing your value as well as helping them to strengthen their security posture.  You can engage with […]

Read more
Five Takeaways from Cybersecurity Awareness Month

Five Takeaways from Cybersecurity Awareness Month

October 25, 2021

Who’s Ready to Go? As Cyber Security Awareness Month comes to an end this week, don’t let the momentum you’ve created dwindle or diminish.  Take the foundation of awareness that you’ve been establishing with your existing and new clients and keep on building!  Are you feeling unsure about how to keep it going, or uncertain […]

Read more
Keep the Awareness & Momentum Going Year-Round!

Keep the Awareness & Momentum Going Year-Round!

October 18, 2021

When the national campaign for cybersecurity awareness ends on October 31st, the need for diligence doesn’t go away with it.  Since a critical aspect of your job as an MSP is to keep your clients safe and secure, you’ll inevitably benefit from keeping the momentum going!  Keep your clients aware of the risks and threats […]

Read more
MSPs Should Make Everyday Cybersecurity Awareness Day!

MSPs Should Make Everyday Cybersecurity Awareness Day!

October 12, 2021

It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses.  Everyone from our banks to our credit cards to the grocery store is promoting it on their […]

Read more
Cybersecurity Awareness Month Resources for MSPs

Cybersecurity Awareness Month Resources for MSPs

October 4, 2021

Cybersecurity Awareness Month is the perfect time to “shine a light” on the ways that your clients can be aware of the threats that they face when it comes to cybersecurity, as well as provide ways to mitigate the risk factors that can allow cybercriminals easier access.  In addition to our very own marketing toolkit […]

Read more
Texas Cybersecurity Update

Texas Cybersecurity Update

September 27, 2021

If you’re in Texas, you’ll want to take note of a recent law that took effect on September 1, 2021.  Governor Greg Abbott signed House Bill 3746 that has amended the state’s data breach notification law.  The original law, Business and Commerce Code  521.053 established requirements for businesses around “any breach of system security” that […]

Read more
Cybersecurity Awareness Month Toolkit

Cybersecurity Awareness Month Toolkit

September 23, 2021

The work of an MSP is often taken for granted – until something goes wrong.  And then you are the first phone call that a client makes and it’s a hurry up and rush scenario.  At Breach Secure Now, our partner-focused mission is the foundation for all that we do.  Our founder Art Gross was […]

Read more
Class is Canceled

Class is Canceled

September 13, 2021

This past week Howard University had to cancel classes due to “unusual activity on the University’s network”. As a result, their Enterprise Technology Services (ETS) team shut down the school’s classes for the day to investigate the situation which they identified as a ransomware attack.  This incident brought to light the consideration of how deep […]

Read more
Inside Threat

Inside Threat

September 7, 2021

The threat to a business from outside perpetrators is very real when it comes to cybercrime.  But sometimes the threat comes from within, and it is even harder to detect or prevent in the first place.  Why would someone try to intentionally hurt the very company that provides them with a paycheck?  The reasons vary, […]

Read more
Collective Action Against Cybercrime

Collective Action Against Cybercrime

August 29, 2021

Last week the President met with leaders in the private sector as well as those in education to discuss the need to address cybersecurity threats to the nation and efforts needed across the board.  The increase in incidents and the ongoing threat of attack is something that transcends all the invisible borders that we put […]

Read more
Cellular Breach

Cellular Breach

August 22, 2021

Last week we saw the mobile phone carrier T-Mobile fall victim to cybercriminal activity when a hacker accessed the personal data of their users.  They learned of the breach via claims that were made on an online forum.  This led to an investigation and hiring of cybersecurity experts to help with the situation. They have […]

Read more
Why You Should Do a Security Risk Assessment

Why You Should Do a Security Risk Assessment

August 18, 2021

You can’t fix what you don’t know is broken.  And that in a nutshell sums up why you need to do a security risk assessment (SRA) when it comes to a business and addressing their cybersecurity needs.  But of course, there is more to the story, that’s simply the headline.  As an MSP, you want […]

Read more
Trends in Cybercrime

Trends in Cybercrime

August 12, 2021

Trends come and go and keeping up with them when it comes to pop culture or fashion might be challenging, but when it comes to cybercrime, you’ll likely never be ahead of the hackers. Their ability to adapt their tactics and tailor them to be more effective is constantly changing – and nearly impossible to […]

Read more
Vacation Cyber Safely

Vacation Cyber Safely

August 2, 2021

With summertime in full swing, many of us are heading out on vacations that are long overdue.  Whether you’re visiting family, friends, the mountains, or the beach, be “shore” to travel with smart cyber habits that will keep you and your loved ones protected in ways that can’t be fixed with that first aid kit […]

Read more
Why Is Healthcare Such a Target?

Why Is Healthcare Such a Target?

July 26, 2021

Last week, we discussed the opportunity that is present to best support your healthcare clients, the importance of those organizations being HIPAA compliant, and how cybersecurity comes into play in healthcare. This week, we’re taking an even deeper dive into healthcare cybersecurity to answer the question, Why Is Healthcare Such a Target for Cybercrime? We […]

Read more
Healthcare and Cybersecurity

Healthcare and Cybersecurity

July 19, 2021

As Managed Service Providers, you likely look at the world through ‘tech-colored glasses’.  While your business may focus on one vertical, in general, you’re able to support a business regardless of what they do or where their focus is, because you see them as a client with a technical infrastructure that you support.  What they […]

Read more
Two Questions About Ransomware That Every MSP Should Ask Clients

Two Questions About Ransomware That Every MSP Should Ask Clients

July 12, 2021

1. What would you do if a ransomware attack impacted your business for more than 2 weeks? Most MSPs are really good at backing up and restoring data. That is a core service that MSPs provide to their clients. It would be natural for a client to minimize the impact of downtime of a ransomware […]

Read more
The Ransomware Gamble

The Ransomware Gamble

July 6, 2021

Being on guard can be exhausting in any situation.  Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution.  Such is the case with ransomware.  You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like […]

Read more
Evolution Is a Process

Evolution Is a Process

June 29, 2021

In the past year, we’ve all seen how changes can be thrown at us unexpectedly.  We are presented with the need to evolve and grow in ways that can sometimes feel uncomfortable, or even rushed when the landscape that we work within changes.  Despite how it may feel at the time, this is usually a […]

Read more
Bringing More Than Your Laptop Back to the Office

Bringing More Than Your Laptop Back to the Office

June 21, 2021

Working from home.  It was fun while it lasted for many of us.  Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide.  You might be in a combination […]

Read more
Getting the Message Out There

Getting the Message Out There

June 14, 2021

The three largest network morning news shows are often what Americans have on in the background as we get ready for work or school. You’ll find the headlines, pop culture, and maybe some shopping bargains from time to time. They generally cover the top stories of the day but are not known for their likelihood […]

Read more
Cyber Insurance

Cyber Insurance

June 7, 2021

As an adult, it is likely that you’re at least carrying one insurance policy.  Life, renters, auto, home…. In fact, it is very likely that you have multiple policies that provide coverage for each and every aspect of your life.  This coverage continues beyond your “stuff” and into your well-being with health insurance.  While needed […]

Read more
Build  A Human Firewall In Minutes!

Build A Human Firewall In Minutes!

June 1, 2021

All of the minutes add up! There’s a lot to do when it comes to keeping up with multiple clients who are often in “crisis mode” or reacting to things that they might not understand, which can lead to panic.  You need to have solutions that deploy quickly and do the job right the first […]

Read more
Down the Pipeline

Down the Pipeline

May 24, 2021

Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon.  The Colonial Pipeline breach hit the news and many people began to panic.  We were all too familiar with uncertainty of the future and last year’s toilet paper rush was […]

Read more
Guest Blog: Network Design Consultants

Guest Blog: Network Design Consultants

May 17, 2021

This week we welcome Scott McClain, owner of Network Design Consultants as he discusses his experience as an MSP with healthcare clients and how his partnership with Breach Secure Now has contributed to that. After speaking with dozens of medical professionals, we realized the lack of understanding and confusion surrounding HIPAA Compliance. We also have […]

Read more
Not Much to Smile About

Not Much to Smile About

May 10, 2021

SmileDirectClub (SDC) is a business that offers teledentistry services throughout the world.  They produce and sell transparent retainers that fix crooked teeth in the way that traditional braces work.  With 60-75% of people in need of their services, they are poised for long term success, with a large audience of potential patients.  Sure, there is […]

Read more
Updating Software

Updating Software

May 2, 2021

It’s that little alert on your desktop.  The “upgrades available” indicator when you check your computer.  Or when your smartphone tells you that it’s going to update later while you’re sleeping, and you defer it to another time.  What if you miss an email or a text?  Nah, you don’t need to do that update, […]

Read more
Normalizing Breaches

Normalizing Breaches

April 26, 2021

In August of 2019, Facebook was the victim of a data breach that compromised information from 533 million people from 106 different countries.  Why is this in the news now?  Because the breach was addressed in a recent email from Facebook management, and that email was accidentally sent to a Belgium-based news outlet and, in […]

Read more
Cryptocurrency 101

Cryptocurrency 101

April 19, 2021

Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works.  We’ll take a look at it from a high level to provide some understanding.  Why? Well, it isn’t going away, and it only seems to be gaining popularity.  […]

Read more
Mobile Threat

Mobile Threat

April 11, 2021

Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals.  These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies. In a year of firsts and unexpected experiences, what did they find? […]

Read more
Check Yourself

Check Yourself

April 4, 2021

At this time of year, we all risk resembling Charlie Brown waiting on his Valentine in the mailbox.  Has my check arrived?  Is it in the mailbox?  Perhaps you’re waiting on stimulus checks or tax refunds.  But along with the hint of spring flowers, there is mailbox optimism in the air for many of us. […]

Read more
Human Aspect of Security

Human Aspect of Security

March 29, 2021

It can be so frustrating to try to convince people that we “know better” than they do.  Especially when it comes to health or safety right?  You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic.  Cybersecurity is not too […]

Read more
The Hacker Got Hacked

The Hacker Got Hacked

March 21, 2021

WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records.  This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means.  This included names, phone numbers, addresses, passwords, and email addresses.  Cybercriminals used this site as […]

Read more
A Sigh of Cyber Relief

A Sigh of Cyber Relief

March 15, 2021

The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic.  As we often say when the topic can become divisive or political, regardless of which side you stand on, […]

Read more
Hoop Hack Attack

Hoop Hack Attack

March 8, 2021

There’s a March Madness of a different kind that happens each year during this time of tournaments: the onslaught of phishing emails that users fall for over and over again. With pools that take place in our offices, among friends, or to the individual who wants to join a group online, hackers are handed a […]

Read more
Ring a Ding Ding

Ring a Ding Ding

March 1, 2021

Your phone rings once.  The number looks familiar, same area code, same exchange as your local area, so you pick it up.  Hello? No one responds on the other end of the line.  You repeat “hello?” and it feels like a bad connection or that they can’t hear you on the other end, so you […]

Read more
To the Moon!

To the Moon!

February 22, 2021

Are you familiar with the United States Space Force (USSF)?  This branch of the US Air Force military was established in recent years to protect and secure space, just as it does for air, land, and sea with other branches.  This past week in the news, it was announced that Space Force was hiring or […]

Read more
Unemployment Scams

Unemployment Scams

February 15, 2021

We tend to not ask too many questions and let things slide when we aren’t certain about the situation.  Is that normal?  Should that happen like that?  I guess so.  I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left […]

Read more
Heartbreak of a Different Kind

Heartbreak of a Different Kind

February 8, 2021

Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic.  You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen.  Don’t get us wrong, online dating is the way that many […]

Read more
Degree of Awareness

Degree of Awareness

February 1, 2021

This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job.  She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue.  She sent them her […]

Read more
A Quick Refresher

A Quick Refresher

January 25, 2021

As we move ahead, taking advantage of the energy of the new year and work to get our annual plans moving, sometimes rushing to get a lot more done than usual since we now know the unexpected is all that can be expected, let’s have a quick refresher.  On what, you ask?  Smart, safe, and […]

Read more
Cy-BURN-out

Cy-BURN-out

January 18, 2021

New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the […]

Read more
Cybersecurity Trends for 2021

Cybersecurity Trends for 2021

January 11, 2021

Bell bottoms, neon colors…kale…trends come, and trends go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends?  That’s one we can get behind and think that there can never be enough of! So, what can you expect to see as both a consumer, employee, employer, business owner or just […]

Read more
You Know Better

You Know Better

January 6, 2021

The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look back on. This year was one of extraordinary circumstances, and while the situation was unprecedented, the summary of what transpired lends itself to the age’s old advice: Preparation is key. […]

Read more
Home Security

Home Security

December 7, 2020

When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your […]

Read more
Incoming Cybersecurity Leadership

Incoming Cybersecurity Leadership

November 30, 2020

Regardless of whichever way you lean politically, the recent announcement of a few incoming Presidential government staff appointments is hopefully good news to those who know the importance of strong cybersecurity. Why? Because these individuals come with a collective history of working in the industry. This means that there won’t be any lag time in […]

Read more
Lemons to Lemonade

Lemons to Lemonade

November 23, 2020

Let’s try to make lemonade out of these lemons we keep getting with COVID-19.  Yes, there is an uptick in the number of cases and yes, it appears we are heading towards additional restrictions and lockdowns in various ways.  One of two things has likely happened, you started working from home and are still there; […]

Read more
Stimulus Scam

Stimulus Scam

November 17, 2020

With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty of our times.  (When does the list of uncertainties stop growing, I wonder?) And again, we find hackers and cybercriminals in a power position to take advantage of our uncertainty […]

Read more
Security Skill Shortage

Security Skill Shortage

November 9, 2020

As the need for cybersecurity awareness increases across the entire business landscape, so does the need for strong programs and a trained and competent workforce. This affects everyone in at least two ways. First, you need to have a designated leader in place who facilitates the program, and second, you need to ensure that the […]

Read more
Safe Voting

Safe Voting

November 3, 2020

There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and the opinions are strong. We aren’t here to discuss that side of politics; we’re here to look at how cybersecurity factors into this election process and how it affects all […]

Read more
Vote for Cybersecurity

Vote for Cybersecurity

October 26, 2020

No, this is not a political post.  In fact, we know that there are some topics that don’t even merit an effort to try to discuss.  They’re important, but differing opinions each hold their own value.  But when it comes to cybercrime, we should all be a united front.  There is one choice, and that […]

Read more
Smart Appliances & Cybersecurity

Smart Appliances & Cybersecurity

October 19, 2020

And so, the season starts.  Which one is it that we’re referring to?  Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we […]

Read more
We Don't Negotiate

We Don’t Negotiate

October 12, 2020

The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here. What we do know for certain is that this week, the government […]

Read more
Cybersecurity Awareness Month

Cybersecurity Awareness Month

October 5, 2020

October kicks off 2020’s cybersecurity awareness month, and if this year has given us any type of certainty, it’s that smart cyber practices are a necessity. The uncertain, the unexpected, and the unknown all allow for hackers to gain our trust, and eventually access, into our personal and professional records without knowledge or permission. Phishing […]

Read more
Home Office Security – Never Too Late to Evaluate

Home Office Security – Never Too Late to Evaluate

September 28, 2020

We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in […]

Read more
It Was to Be Expected

It Was to Be Expected

September 21, 2020

We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity – and COVID-19 gave them so much bang for the buck.  Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break.  They were going to take […]

Read more
Tell Me About Yourself

Tell Me About Yourself

September 14, 2020

You can’t help someone effectively if you don’t know the details of their situation.  So how can you determine what your clients need if you are not aware of what they are looking to achieve, the problems that they are trying to solve, or their behavioral tendencies when it comes to decision making? Does this […]

Read more
Community Effort

Community Effort

September 7, 2020

The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) division announced a final directive this week that requires all individual federal civilian executive branch (FCEB) agencies to “develop and publish a vulnerability disclosure policy (VDP) for their internet-accessible systems and services and maintain processes to support their VDP.” Identified as the Binding […]

Read more
End User End Game

End User End Game

September 2, 2020

The conversation around selling your services can get uncomfortable for a variety of reasons.  We all have our own beliefs as to how we should be doing it, and few people want to acknowledge that they might be doing it wrong. Start with marketing.  Get your name out there, have a call to action, and […]

Read more
Impersonation Nation

Impersonation Nation

August 24, 2020

Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’re not familiar with BEC, it’s when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person, often varying from the […]

Read more
Dark Economy

Dark Economy

August 17, 2020

“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations […]

Read more
Is Punishment Proper?

Is Punishment Proper?

August 10, 2020

The emphasis on smart cybersecurity practices is vital. As professionals in the IT industry, we know this, we work to ensure policies and procedures are in place that keep the topic at the forefront of every business we support and work within. But while training employees to learn these behaviors is important, there is one […]

Read more
Don't Forget Me

Don’t Forget Me

August 3, 2020

It is easy to get left behind if you become less interesting. No, we aren’t talking about your friends or your childhood toys, although that does happen. We’re talking about YOU. Yes, don’t leave yourself behind. What? How? Explain! Remember your MySpace account? Or when your significant other wanted you to create a TikTok account […]

Read more
Scare Tactics

Scare Tactics

July 27, 2020

It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the number of reported attacks had already come close to the total for 2019 according to the federal government. With the onset of COVID-19, there were a plethora of new opportunities for cybercriminals to […]

Read more
Before & After

Before & After

July 20, 2020

Imagine if you had two emails that were worth a million dollars each. You would do everything that you can to protect those emails and ensure that no one deleted them. You would back them up, have multiple copies in place so that if you lost those emails, you would have a quick way to […]

Read more
Marketing Magic

Marketing Magic

July 13, 2020

Marketing Magic Having an in-house marketing team is not always possible for small businesses.  Also, it can be difficult to maintain an ever-growing and ever-changing list of vendors and products to market. As a Managed Service Provider you face the struggle of not only supporting your clients full time but also carrying the full-time weight […]

Read more
Changing Landscape

Changing Landscape

July 6, 2020

We all knew that the world was going to be forever changed when the  World Health Organization declared a global pandemic earlier in 2020. Just how much it was going to change was unseen – and remains unclear as each day brings new challenges for each city, state, and household in our country. As a […]

Read more
Small Business, Big Risk

Small Business, Big Risk

June 29, 2020

There is no way to emphasize enough, just how important it is for small businesses to be prepared for a cyberattack. But according to a recent survey by the Wall Street Journal Pro Research of 400 companies and their security officers, many companies are not taking it seriously enough to improve their readiness and risk […]

Read more
Cybersecurity for Lawyers

Cybersecurity for Lawyers

June 22, 2020

Legal Cybersecurity In the world of law, continuing legal education (CLE) credits, or minimum continuing legal education (MCLE) credits, are ongoing professional education credits for attorneys that take place after their initial admission to the bar. These are available to American Bar Association (ABA) members in a continually growing library that can be accessed online […]

Read more
Focus On the Flaws

Focus On the Flaws

June 15, 2020

There are gaps in cybersecurity and the level of risk awareness as most of us work from home right now.  And if heading back to an office environment happens for some, it isn’t going to be the majority of workers, at least anytime soon. With reports of productivity being higher from the work-from-home structure, many […]

Read more
Adjusting Your Business Model

Adjusting Your Business Model

June 8, 2020

New Frontier The recent conversation with Chris Wiser and Art Gross covered several issues that will continue to be “hot topics” regardless of where we stand regarding COVID-19. Procedure & Policy Whether you are going to continue to work remotely or have your team return to an office, the first thing that you’ll want to […]

Read more
Government Funds for Cybersecurity

Government Funds for Cybersecurity

June 3, 2020

State and local governments need funding and resources.  For which thing are we talking about here?  Respirators? Masks?  No, but we are talking about another type of protection, for another unseen threat – cybercrime.  With malicious activity already on a steady rise, the current crisis has brought some government offices to an even more heightened […]

Read more
Consumer Awareness

Consumer Awareness

May 26, 2020

The numbers are on the rise – and in this case, we aren’t talking about COVID test results.  In just a few months, the number of consumers that suspect they are at risk of identity theft has increased.  In February of 2020, we saw numbers from CyberScout that out of 1050 employed adults in the […]

Read more
First Aid Kit

First Aid Kit

May 19, 2020

When this pandemic hit the world, the realization that most countries were not prepared for this also hit hard at the same time.  Here in the United States, and all political opinions aside, we realized that despite our confidence in our economy, in our intelligence, in our standing as a “world leader” we were not […]

Read more
Microsoft Teams & GIFs

Microsoft Teams & GIFs

May 11, 2020

“Why do I always have to update my software?” “What is a patch update and why is it so important?” As an MSP, you know that it is hard enough to emphasize to every one of your clients and their employees the importance of strong security.  You also know that keeping track of what they […]

Read more
Navigating Uncertain Times - Tips from Experienced CEOs

Navigating Uncertain Times – Tips from Experienced CEOs

May 8, 2020

Small Business, Big Problems There is a multitude of problems that small businesses are facing today. Clients are working from home.  This is happening as a matter of force, but also will likely evolve into a matter of choice.  And all of this is happening by them essentially picking up their desks and going home […]

Read more
MSP Guide to Remote Security

MSP Guide to Remote Security

May 4, 2020

A New Normal Working from home has become a new normal for you, your customers, and communities across the country, with dining room tables and shared spaces becoming the offices where we conduct business of all kinds.  While this structure has many benefits to productivity and employee satisfaction when done correctly, the fact that most […]

Read more
Small Business Exposure

Small Business Exposure

April 29, 2020

When you’re a small business, you hope for exposure.  But recently, we learned that the Small Business Association (SBA) was the victim of an incident that exposed user data in a less than positive way.  This occurred at the end of March, about two weeks into the official COVID-19 crisis for the United States, and […]

Read more
It’s All Too Much

It’s All Too Much

April 28, 2020

Maintaining your sanity as a business owner during this time of global crisis is enough to make you want to crawl into bed and come out when it is over. But you know you have to push through and be the rock for your business, for your family, and for your clients.  They are turning […]

Read more
Security Training and a Remote Workforce

Security Training and a Remote Workforce

April 23, 2020

Technology at the Forefront Many companies are finding that the technology projects that were put on hold, or on the back burner, have moved up to the top of the list of priorities.  This is happening for a variety of reasons. Working from home is now a necessity, and so are the technical features and […]

Read more
Maintenance Mode

Maintenance Mode

April 8, 2020

As an MSP, you are on call 24/7, even if your hours are not technically ‘round the clock’. As a business owner, this is amplified.  You not only have a team to take care of and maintain, but you also have clients that need looking after as well.  Ideally, all of these individuals are tethered […]

Read more
Securing Your Workforce

Securing Your Workforce

April 2, 2020

The arrival of COVID-19 restructured the world in countless ways.  We have had to rethink how we socialize, live day-to-day, and in order to keep a lot of other parts of our lives running, we are having to rethink the way in which we run businesses. When we start to address how a business will […]

Read more
Safely Working Remotely

Safely Working Remotely

March 26, 2020

Effective Immediately As the Novel Coronavirus pandemic continues to greatly impact our nation, working from home is no longer an occasional benefit for many Americans, but is now a requirement for many businesses to continue operating safely and effectively. While working from home does come with its perks, there are many new cybersecurity risks created […]

Read more
Staying Calm in Times of Crisis

Staying Calm in Times of Crisis

March 18, 2020

We’ve all been through challenging times personally and professionally, and in our heads and hearts, we know that “this too shall pass”. But with the COVID-19 virus being declared a pandemic by the World Health Organization, the time in which things pass may be longer than we’d like. As a business owner and MSP, your […]

Read more
The Untapped Vertical

The Untapped Vertical

March 11, 2020

The Untapped Vertical With the cannabis industry growing rapidly in the United States, and more states legalizing marijuana, this sector of business is one that can be explored as a vertical by MSPs to uncover the cybersecurity needs within. The profitable nature of this business means that they are growing exponentially not only as single […]

Read more
Children’s Social Security Numbers – An Easy Target

Children’s Social Security Numbers – An Easy Target

March 3, 2020

An Easy Target The value of stolen data increases when it is more easily manipulated and used.  With a social security number, you can apply for identification, loans, and a range of other things that are valuable.  If your credit score is high, the possibilities of what can be done are higher too, so who […]

Read more
Malvertising – What Is It?

Malvertising – What Is It?

February 25, 2020

Malvertising We are in a time when “fake news” has become a term thrown around so frequently it is now part of our vernacular.  In fact, there are quite a few new terms and words borne from the rise of technology in our lives.  One of those words is malvertising. What is malvertising?  It’s when […]

Read more
When the Threat Is Inside the Building

When the Threat Is Inside the Building

February 19, 2020

Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees.    Starting in 2018, personal information that included Social Security numbers, addresses, and account numbers were provided by a small […]

Read more
Equifax Breach Update

Equifax Breach Update

February 14, 2020

Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees.  And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach. The Equifax breach compromised the personal information of nearly 150 million Americans, which […]

Read more
Learn to Audit Your Website - On-Demand

Learn to Audit Your Website – On-Demand

February 10, 2020

How to Get Found  We know that running a business is more than ensuring that you have the right products to resell.  It’s more than having the right people in place to sell, deploy and support those products.  It is about having all of those pieces in place and then having the right people and clients […]

Read more
Double Rewards - The Rise in Ransom Payments

Double Rewards – The Rise in Ransom Payments

February 7, 2020

The rate at which data breaches are occurring is on the rise, this we know.  But another corresponding rate on the rise is the dollar amounts that are being paid out in a ransomware attack.  That number has risen by 104% for the fourth quarter of 2019.  With an average of $84,000 being paid by […]

Read more
Windows 7 End of Life - the Beginning for New Scams

Windows 7 End of Life – the Beginning for New Scams

January 29, 2020

End of Windows 7 They say when one door closes another one opens, but in this case, it’s a window.  On January 14th, 2020, Microsoft ended its support for Windows 7.  Since Microsoft is no longer offering patches or security updates for vulnerabilities identified in Windows 7, hackers have a new way of gaining access […]

Read more
I Fell for a Phishing Scam

I Fell for a Phishing Scam

January 23, 2020

I just fell for a phishing email. Yep, the guy who builds services to protect clients from phishing emails was tricked by a phishing email! Now, I didn’t click on anything or give up confidential information but I did think a phishing email was a real email and forwarded it over to my staff to […]

Read more
2019 Breach Secure Now Blogs You May Have Missed

2019 Breach Secure Now Blogs You May Have Missed

January 20, 2020

The team here at Breach Secure Now curated a lot of content in 2019 that we hope you found informative and thought-provoking when it came to your cybersecurity, both personally and professionally. We’ve put together a list of some of our favorite blogs that generated some tremendously positive feedback, addressing both you as a Managed […]

Read more
Evil Twin Wi-Fi

Evil Twin Wi-Fi

January 16, 2020

Evil Twin You’re out and about for any number of reasons.  Traveling for work.  Killing time while waiting for co-workers or family members.  But you have some time and you have work that needs to get done. You pull out your phone or laptop, and all of the available wi-fi connections come up.  Perhaps you’re […]

Read more
Overnight Experts Wanted

Overnight Experts Wanted

January 10, 2020

It isn’t breaking news that there is a steady – and alarming – rise in cybersecurity breaches and overall compromises in data and hardware.  What is news is the lack of field experts that are available to deal with such a rise in demand. The field of ‘cybersecurity expert’ wasn’t even on the radar until […]

Read more
A Quick Glance Back - the Year in Cybersecurity

A Quick Glance Back – the Year in Cybersecurity

December 31, 2019

Nothing Random in this Ransom The end of the year always gives one reason to reflect back and review the past 12 months in a variety of ways. When we take a look at the year in cybersecurity, we can say with certainty, that there was nothing random about the pattern of attacks on businesses.  […]

Read more
Smart Speakers, Are You Listening?

Smart Speakers, Are You Listening?

December 27, 2019

Alexa, What Are You Collecting? At the top of many holiday gift lists was a smart speaker device.  They can make our life easier and more convenient with integration across all of our devices, taking efficiency to the next level.  And it is likely we’ve all made a new friend in Alexa, Siri or their […]

Read more
The Rise in Cryptojacking

The Rise in Cryptojacking

December 19, 2019

You can teach your clients how to spot a phishing email and hope that they take heed. You can warn them about the dangers of reusing passwords and basic cyber safety. But how do you educate and create awareness about something that is so slow-moving and “creepy” that most people don’t even realize it’s there […]

Read more
Getting Ahead of the Curve

Getting Ahead of the Curve

December 11, 2019

Plan, people, policies Under the guidance of Maria Vullo, the New York Department of Financial Services (NYDFS) created and finalized cybersecurity regulations for the banks, insurance companies, money transmitters, credit unions, brokers, and mortgage bankers that they oversee.  These companies and institutions run the gamut in size and sophistication of their systems. So, they looked […]

Read more
All Jolly, No Folly

All Jolly, No Folly

December 5, 2019

Some of us attack and engage in our holiday shopping with a plan that rivals the most well thought out strategies.  We scour weekly fliers, online ads, and research who will have the best price and coupon code for us to use.  In order to shop smart, yes, keeping track of prices is important, but […]

Read more
No Personal Callers

No Personal Callers

November 26, 2019

If your phone rings and the caller id is UNKNOWN, you likely won’t answer.  And scammers know that, so they’ve been cleverly hiding behind fake caller id numbers that are just a digit off from numbers that are familiar.  So, you pause, and figure you better pick up “just in case”.  The voice on the […]

Read more
Don't Let Your Holiday Get Hacked

Don’t Let Your Holiday Get Hacked

November 22, 2019

Prices may go down over the holidays but hacking incidents go up.  Way up.  While online shopping is something we all need to be diligent about when it comes to our personal cybersecurity, we need to be mindful of our working environment as well. Many employees take this time of year as an opportunity to […]

Read more
Cybersecurity in the Legal Industry

Cybersecurity in the Legal Industry

November 14, 2019

Modern Law Cybersecurity is something you have to think about at the individual level. At the healthcare level. And at your place of business. But what about when it comes to the businesses that support you?  We make assumptions that there are policies and procedures in place, but never really verify them, we just trust […]

Read more
Election Season: Another Favorite for Scammers

Election Season: Another Favorite for Scammers

November 6, 2019

Election season scams  Political candidates will target voters to get their message across, and hackers will take advantage of the timing.  With petitions, polls, and surveys being posted to get a sense of the political climate online or by telephone, citizens let their guard down and assume that the information being collected is for candidates […]

Read more
FBI Issues E-Skimming Warning

FBI Issues E-Skimming Warning

October 30, 2019

Skim This Over Recently the FBI issued a warning against e-skimming threats in response to the increase of attacks on small and medium-sized businesses, as well as against government agencies.  This relatively new form of attack occurs when malicious code is placed within a site that accepts payments.  The payments are rendered via credit or […]

Read more
Stripe Customers Targeted by Phishing Email

Stripe Customers Targeted by Phishing Email

October 24, 2019

New Lures for Phishing A recent security alert from the online payment processing company Stripe has informed users of a phishing scam that shows just how fast hackers adapt to the efforts used to counter their tactics. Stripe is successfully used by small business owners, charities, and individual consumers for payment & donation processing.  Recently, […]

Read more
Twitter Unintentionally Used 2FA Info for Targeted Ads

Twitter Unintentionally Used 2FA Info for Targeted Ads

October 15, 2019

There’s a tweet that has Twitter aflutter. It includes the news that Twitter inadvertently sent users’ email addresses and phone numbers that were provided for security purposes, including two-factor authentication (2FA) phone numbers, to advertisers for targeted marketing. Their Tailored Audiences and Partner Audiences advertising systems were the lucky recipients of the lead information.  These […]

Read more
2019 Cybersecurity Checklist

2019 Cybersecurity Checklist

October 10, 2019

Read more
The Little Things That Go a Long Way

The Little Things That Go a Long Way

October 8, 2019

It’s the Little Things When we think about cybersecurity, we might first imagine big data centers being guarded.  Hackers working diligently in the shadows to compromise a large network or company and “maybe” get to our information at some point.  But like all things in life, the little things add up. When it comes to […]

Read more
Words With Friends Hack Could Affect 218 Million Users

Words With Friends Hack Could Affect 218 Million Users

October 2, 2019

I’d Like a Word with You In fact, I’d like a word with all 218 million of you.  Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year.  This […]

Read more
Breach Secure Now Joins Far-Reaching Initiative to Promote the Awareness of Online Safety and Privacy for National Cybersecurity Awareness Month

Breach Secure Now Joins Far-Reaching Initiative to Promote the Awareness of Online Safety and Privacy for National Cybersecurity Awareness Month

October 1, 2019

October 1, 2019 — Breach Secure Now! today announced its commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit […]

Read more
Know Better – Do Better

Know Better – Do Better

September 27, 2019

Knowledge is power.  And when it comes to fighting hackers, we need all the power we can collectively find.  Educating your employees is the key to preventing cyberattacks, and Chubb’s Third Annual Cyber Report confirms this. With small businesses having a tendency to have limited funds and resources when it comes to “extras”, cybersecurity training […]

Read more
Payment Share App Safety

Payment Share App Safety

September 19, 2019

Instant Money…Maybe? The popular commercial asks, “What’s in your wallet?” and if you ask most anyone, it probably isn’t cash.  The slow death of bill carrying was first hit by the credit and debit card.  Then we were able to pay via our watches and smartphones.  Now, you can just click an app and send […]

Read more
Hacker Helper

Hacker Helper

September 11, 2019

Are You a Hacker Helper? Here you go, let me get the door for you.  Are you looking for access to my company’s network?  One moment, let me get those login credentials for you. Of course, this sounds ridiculous.  But in reality, it is exactly what is happening.  Cybercriminals use advanced social engineering to get […]

Read more
Security Risk Rate vs. Spend Rate

Security Risk Rate vs. Spend Rate

September 5, 2019

Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority.  Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern.  With an annual spend […]

Read more
A New Approach to Healthcare Cybersecurity

A New Approach to Healthcare Cybersecurity

September 3, 2019

A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one. Gone are the days of using Meaningful […]

Read more
Why We Need to Go Beyond HIPAA

Why We Need to Go Beyond HIPAA

August 29, 2019

HIPAA – Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around since 1996, with the intent to protect patients by properly handling their protected health information (PHI). With good intentions, HIPAA set forth to provide both security provisions and data privacy. The legislation was passed in the […]

Read more
Changing our Attitudes About Password Security

Changing our Attitudes About Password Security

August 29, 2019

Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it’s off before doing it again.  If you run out of gas on a highway, on future drives, you’ll be on the lookout for a […]

Read more
A New Kind of Cyber Threat to MSPs

A New Kind of Cyber Threat to MSPs

August 28, 2019

There is a rise in awareness with small to medium-sized businesses (SMBs) of the threat to their cybersecurity.  The problem is, it causes a subsequent rise in a risk factor to Managed Service Providers (MSPs).  That risk is of them losing their business. According to a recent report conducted by Continuum and Vanson Bourne, “Underserved […]

Read more
Passwords: Why You Shouldn't Reduce, Reuse & Recycle

Passwords: Why You Shouldn’t Reduce, Reuse & Recycle

August 21, 2019

The Excuses  It’s not easy! It’s a lot to keep track of. I have no idea where I’ve used that before. There’s nothing in there that anyone would want. You want me to go back and change ALL of my accounts? These are all responses when a user is told that their passwords need changed […]

Read more
Why Cyber Insurance?

Why Cyber Insurance?

August 21, 2019

Filing and Smiling  When is the last time that you filed a piece of paper?    It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file cabinet had everything necessary to keep things humming […]

Read more
Private Sector Security

Private Sector Security

August 14, 2019

Can I Get Some Privacy in Here? If you’re talking about your online data, probably not.  While businesses can create policies and procedures that limit the exposure of your private data, those lines are often blurred between professional and personal information. As a result of this, at least 25 states have laws that address the […]

Read more
The Real Cost of Cybercrime

The Real Cost of Cybercrime

August 12, 2019

What happens if your computer systems are hacked with ransomware?  I think I’m covered by my insurance policy for that…(pause)…you scramble and try to find your policy documentation.    It’s here somewhere. I’m sure I’m covered…I mean, I think we’re covered.  I better make sure.   You email your insurance agent…wait for the declaration page.  Try to sort it […]

Read more
Ethical Hacking

Ethical Hacking

August 7, 2019

The Ethics of Hacking In 2013 the then National Security Agency chief Keith Alexander spoke at the Black Hat cybersecurity conference about acknowledging, and protecting, ethical hackers.  He discussed how through surveillance, these individuals would be uncovered, but also shielded, from legal jeopardy. Black Hat is a computer conference that focuses on security consulting, training, and […]

Read more
Breach Accountability

Breach Accountability

July 31, 2019

This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach.  You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you […]

Read more
These Numbers Don’t Add Up

These Numbers Don’t Add Up

July 26, 2019

If you are management, and your employee came to you with a proposal, you’d likely (hopefully) listen. What if that employee proposed to you that by keeping business as is, you’d likely lose millions of dollars – and possibly go under?  But if you made one small change, you’d increase your odds of staying in […]

Read more
Make Time for Cybersecurity

Make Time for Cybersecurity

July 17, 2019

This isn’t something you can pencil in and get to when you have time, cyber maintenance has to be something you commit to. We all have those moments when we realize that we had the best intentions to stick with something, but its priority fell by the wayside. We start off strong, then taper off […]

Read more
Here's a Tip: Get a Head Start Before the Competition

Here’s a Tip: Get a Head Start Before the Competition

July 12, 2019

Tip-Off You know how certain people seemed to have a way of predicting the future?  They were ahead of the curve if you want to call it that… those who “got in on a good thing” before anyone else seemed to be aware? Consider this your lucky day, because we’re going to let you in […]

Read more
Hackers Using Social Profiles

Hackers Using Social Profiles

July 3, 2019

Facebook Status: Away on Vacation Social media is great for a lot of things.  Sharing photos, reconnecting with old friends, finding like-minded people and groups to share ideas and hobbies.  But when does sharing become oversharing? Hackers gain access to your personal data via your profile and the information you share there – and you […]

Read more
Think Global, Act Local

Think Global, Act Local

June 25, 2019

When Global News Hits Home When you hear and watch news headlines, you can often tune out.  It’s not happening here; it’s not affecting you directly.  It’s a global issue right now.  You’ll worry about it when things are closer to home. The problem is, by the time it hits home, we may have forgotten […]

Read more
The Future Is Here

The Future Is Here

June 21, 2019

Sunday funnies Remember the Jetsons?  Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks?  Flying cars aside, we aren’t too far off from the technology that seemed so unlikely and impossible.  The future – it’s here. We live in a day and age where these advancements bring forth so many wonderful […]

Read more
Casting a Wide Net

Casting a Wide Net

June 11, 2019

In business, if you can cast a bigger net to reach a larger audience, it’s considered a good idea – a win.  Unfortunately, hackers are now taking the same approach. With c-level executives offering a higher payoff when compromised, sending out phishing emails to the general population at a company will likely increase your odds […]

Read more
Addressing the Vertical - Cybersecurity in All Directions

Addressing the Vertical – Cybersecurity in All Directions

June 5, 2019

And So, It Grows First, it was a widespread, if not generic, notion – you need to protect your personal information.  Then we began to call it cybersecurity, and it was applicable to your business as well.  It was still a concept that blanketed data generically – the overall message was that you need to […]

Read more
Ransomware Attacks up 105% in Q1 of 2019

Ransomware Attacks up 105% in Q1 of 2019

May 29, 2019

Ransomware Is Not Randomware Gone are the days where you “might know” someone who has, or will, come under attack to a ransomware attack.  The skyrocket in cases has come in at a 105% increase according to Beazley Breach Response (BBR) Services team which compared numbers against their 2018 data. Adding insult to injury, the […]

Read more
City Takeovers with RobbinHood Ransomware

City Takeovers with RobbinHood Ransomware

May 21, 2019

RobbinHood – the Not so Heroic New Outlaw Stealing from the rich to give to the poor – in theory, the original Robin Hood had good intentions.  There’s a new generation of him and his not so merry men and in this adaption, the takeovers are far less charitable.  Using malware instead of arrows, this […]

Read more
Employee Buy-In for Security Awareness

Employee Buy-In for Security Awareness

May 14, 2019

Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of the business is in your hands.  In that role, you know that each department feeds into the overall health of the business, and you need to ensure everyone, and everything […]

Read more
New York to California

New York to California

May 9, 2019

Hot Spots New York and California.  The mention of these two locations may have you conjuring up images of entertainment, celebrities, and people living the fancy life. Unfortunately, when we mention New York and California here, we’re not referring to anything glamorous. In fact, these two states are famous for something that they don’t want […]

Read more
The Blame Game

The Blame Game

April 30, 2019

When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts.  Generally, clients assume that since the anti-virus icon in the corner was there, they were protected.  Firewall?  Not sure what it is, but I get an alert every now and then about it, so it must […]

Read more
Cybersecurity: An Opportunity to Be the Hero

Cybersecurity: An Opportunity to Be the Hero

April 24, 2019

Missed Opportunities Missed opportunities.  They come in many forms, shapes, and sizes.  It might be personal, professional, or just for the fun of a moment. We all have them, and it likely still pains us to think about being wrong on any opportunity in life, especially those that would provide you with a way to […]

Read more
Senior Executives Pose a Danger to Cyber Security

Senior Executives Pose a Danger to Cyber Security

April 19, 2019

You Can’t Teach an Old Dog…. or Can You? I remember trying to explain a VCR to older relatives.  It wasn’t that they were less intelligent or unable to grasp the overall concept, it was that it wasn’t a necessary thing to learn in their opinion.  They weren’t interested in the technology; they had fared […]

Read more
Business Email Compromise Incidents up 133%

Business Email Compromise Incidents up 133%

April 16, 2019

Business email compromises (BEC) scams made a big statement in 2018, seeing a 133% increase over 2017, according to a recent report by Beazley Breach Response Services. The Beazley Breach Briefing looked at information gathered from investigations into more than 3,300 data incidents that were reported to Beazley in 2018. The investigations revealed that nearly […]

Read more
Cybersecurity Common Sense

Cybersecurity Common Sense

April 10, 2019

How many times do I have to tell you? Sadly, if you’re reading this, odds are that you are an adult now, but you should know that I’m saying this with the same frustration that your parents had. We teach kids when they are younger by repetition.  Lessons become so ingrained in our head that […]

Read more
Tax Refund Scams - Know What to Look For

Tax Refund Scams – Know What to Look For

April 5, 2019

Tis the season!  You’re making mental plans with what is hopefully a generous tax refund and deciding what to do with the surplus of cash you’ll soon have on hand. Along the way from starting to submitting the paperwork, there are quite a few roadblocks to be aware of.  Even if you aren’t getting a […]

Read more
The State of Compliance

The State of Compliance

March 27, 2019

We are all aware of federal compliance regulations when it comes to the privacy and security of our information.  For example, you’d be hard pressed to find someone who hasn’t heard of HIPAA.  Yet are you aware that regulations have been put in place at the state level that have the same goal – to […]

Read more
How to Create an Incident Response Plan

How to Create an Incident Response Plan

March 20, 2019

Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a […]

Read more
Fake Check Scam

Fake Check Scam

March 13, 2019

Being scammed can happen so easily today, but when you make it about a topic that many people can let their guard down with, the scam can happen much easier.  What topic is that? We’re talking about money. Fake check scams have been around for quite some time, however, with the increase in online sales […]

Read more
Social Media Security Tips

Social Media Security Tips

March 3, 2019

Social media allows you to stay connected to people that you don’t get to see all of the time, and for that, it is a great thing.  Family photos are easily shared, groups of like-minded people are able to gather together and share thoughts and ideas, and events are marketed to the masses for better […]

Read more
But You Changed Your Password – So How Did This Happen?

But You Changed Your Password – So How Did This Happen?

March 1, 2019

Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996.  It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch.  Over the years there’s been a lot of private information exchanged between her and these […]

Read more
Sextortion Scam

Sextortion Scam

February 22, 2019

You get an email or text from what seems to be a legitimate email or phone number.  Then you read the message: “Send bitcoin right away or else I am sending compromising photos or information to your friends and family.” If you’ve received this type of email, you’ve likely been a victim to a new […]

Read more
You Can Have My Heart – Not My Wallet

You Can Have My Heart – Not My Wallet

February 14, 2019

Love is in the air, and many people are turning to the internet to find it.  We all know someone who has met their significant other online or at least is having a good time while trying to find them by dating a few people they’ve met through dating apps or services.  But are they […]

Read more
The Great Pyramids You Don’t Want to Visit

The Great Pyramids You Don’t Want to Visit

February 12, 2019

“You need to check out this company I’m investing in… it’s a no-brainer.” “My friends are in this club, and it’s crazy, they basically paid a membership fee to join, and they are getting checks every month for doing nothing!” Have you ever been on the other end of one of these conversations?  Congratulations, you’re […]

Read more
Mystery Shopper Scams

Mystery Shopper Scams

February 6, 2019

Today, many people are working more than one job, and with the flexible options of contractor work, or work as needed opportunities, you can likely find something that fits your schedule and financial needs.  Maybe you are looking for a little bit of extra work to make ends meet, or a way to save up […]

Read more
Shining Light on the Dark Web

Shining Light on the Dark Web

February 1, 2019

  We’ve all heard of the Dark Web. The infamous private corners of the internet that are only accessible through special software that mask your IP address. You know, where you can do just about anything, from joining a book club to hiring an assassin. Maybe you want to play a chess match? The Dark Web […]

Read more
Ransomware is Alive and Well - Here Are 10 Tips to Help Protect Your Organization

Ransomware is Alive and Well – Here Are 10 Tips to Help Protect Your Organization

January 24, 2019

Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months. Could the decline in publications citing ransomware as the cause of a data breach or loss of data indicate that cybercriminals […]

Read more
Build a Relationship, Not Just Your Quota

Build a Relationship, Not Just Your Quota

January 17, 2019

Too often, we look at our business relationship with clients as a linear connection.  Every business or organization is a potential client, and you want to make that connection, that line, a direct link between you and them.  Yet we often make the endpoint a purchase of our products or offerings. Do they need anti-virus?  […]

Read more
Business Identity Theft Is on the Rise

Business Identity Theft Is on the Rise

December 28, 2018

Identity theft is not a new crime, in fact, criminals have been altering and improving their techniques to capture and use stolen information for years. While identity theft historically targets an individual consumer, an increasing number of criminals are now targeting businesses instead. What is identity theft? Identity theft occurs when someone pretends to be […]

Read more
Phishing Scams: A Growing Threat for Small Businesses

Phishing Scams: A Growing Threat for Small Businesses

December 10, 2018

In a recent warning, the Federal Trade Commission (FTC) has cautioned consumers and small businesses about the continuing and growing threat of phishing scams. In the statement, the FTC has expressed that while cybercriminals continue to send out mass emails asking bluntly for personal information, they have become more sophisticated in their attempts. Small businesses […]

Read more
Azure Active Directory Synchronization Is Here!

Azure Active Directory Synchronization Is Here!

November 16, 2018

Azure Active Directory Synchronization Is Here! The long-awaited enhancement is finally here! At Breach Secure Now!, we value partner feedback and use it to fuel the development and enhancement of our platform. We’ve made it our ongoing mission to implement new features to help our partners free up time, and grow their businesses. One of […]

Read more
Stumbling Across the Ultimate Security Prospecting Toolkit

Stumbling Across the Ultimate Security Prospecting Toolkit

October 30, 2018

I have run an MSP for 18 years and counting. I have learned a lot over the past 18 years, and I continue to learn new things every day. When I first started out I was good at technology but crappy at sales and marketing. Back in 2000, there were no organizations like Robin Robins […]

Read more
Employees: The #1 Cause of Data Breaches

Employees: The #1 Cause of Data Breaches

October 11, 2018

As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for. A 2017 study from Keeper Security and the Ponemon Institute revealed that […]

Read more
Use Security to Grow Your MSP Business

Use Security to Grow Your MSP Business

October 3, 2018

In an age where businesses are moving their data from in-house servers to the cloud, the complexity of how to appropriately care for that data is beginning to disappear. Although that may not sound like a bad problem to have for those organizations making the move, MSPs who were once extremely sought after to protect […]

Read more
Business Email Compromise Scams - Here to Stay

Business Email Compromise Scams – Here to Stay

October 2, 2018

Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing. What is a BE