- All
- Artificial Intelligence
- Community
- Cyber Insurance
- Data Breach
- HIPAA
- Infographic
- Integration
- Marketing
- Ransomware
- Reporting
- Security
- Training
- Webinars
BSN Introduces AIRIA: Revolutionizing AI Readiness for MSPs and SMBs
Breach Secure Now (BSN), a leader in cybersecurity and productivity training for Managed Service Providers (MSPs), is stepping up to meet the need for AI integration with the launch of its latest innovation: AIRIA – Artificial Intelligence (AI) Readiness Innovation Assessment. What is AIRIA? AIRIA empowers MSPs by enabling them to have strategic AI discussions […]
Team Empowerment Through AI
The potential of Artificial Intelligence (AI) to revolutionize the way we work is undeniable. However, AI is not here to replace us; instead, it offers a powerful tool that augments human abilities, enabling us to make more informed decisions and solve complex problems more efficiently. This synergy between humans and AI is transforming industries, and […]
Cybersecurity Awareness Month: An Opportunity for MSPs to Promote Cyber Resilience
October is National Cybersecurity Awareness Month, a month-long initiative designed to raise awareness about the importance of cybersecurity nationwide. Launched by the U.S. Department of Homeland Security (DHS) and the National Cybersecurity Alliance (NCA), this campaign aims to proactively protect businesses and individuals. As cyber threats evolve and become more sophisticated, this annual event has […]
Transformative AI Solutions: Enhancing Decision-Making and Streamlining Operations with Generative AI
Artificial intelligence is a transformative force that is revolutionizing businesses across all industries. Generative AI has emerged as a game-changer, enhancing decision-making and streamlining operations in every business function, from marketing to finance to customer service. At Breach Secure Now, we’re harnessing the power of AI to deliver cutting-edge solutions for our partners, and we’re […]
Why Leadership Engagement is Key to Successful AI Adoption
If your business isn’t experimenting with AI today, you’re already falling behind. The most successful AI adoptions start with leadership actively engaging in the technologies reshaping industries. Leadership sets the tone for how innovation is embraced across the entire organization, and nowhere is this more true than with AI. One of the most important factors […]
Maximize Client Security with Our Enhanced Security Risk Assessment (SRA)
Managing and mitigating security risks is crucial for every business. As a Managed Service Provider (MSP), your ability to offer comprehensive security solutions can significantly impact your clients’ trust and your revenue. That’s why Breach Secure Now (BSN) is excited to announce our Enhanced Security Risk Assessment (SRA)—a powerful tool that helps you assess and […]
AI Skills: An Essential Edge for Employment
Artificial Intelligence (AI) has moved from a futuristic concept to an essential skill set in the professional world. Companies like HubSpot are increasingly seeking individuals who not only understand AI but can also integrate tools like ChatGPT and Claude into their everyday workflows. The ability to harness the power of AI is becoming a key […]
Opportunities for MSPs in Healthcare
Managed Service Providers (MSPs) are uniquely positioned to become invaluable partners to healthcare organizations by offering comprehensive cybersecurity and compliance solutions. The healthcare industry, being the #1 target for cyberattacks, presents a significant opportunity for MSPs to expand their services and create new revenue streams. Understanding HIPAA and Security Risk Assessments The Health Insurance Portability […]
The Benefits of Continuous Employee Learning
In today’s fast-paced business environment, adapting to technology changes and staying ahead of the competition is difficult. As an MSP, you can help your clients grow their businesses by building a culture of continuous learning. By integrating ongoing training in cybersecurity, M365, and AI productivity, you can help your clients remain flexible and competitive in […]
Social Security Breach: What You Need to Know and How to Protect Yourself
A hacker claims to have stolen every Social Security number (SSN). This alarming breach has sparked significant concerns, with potential implications for identity theft, financial fraud, and other malicious activities. Here’s what happened, what it means, and how to protect yourself. What Happened? According to recent news reports, a hacker on an underground forum has […]
BSN Announces Integration with Gradient MSP Pricing Benchmark Assessment
Breach Secure Now is excited to announce its integration with Gradient MSP’s newly released Pricing Benchmark Assessment tool. This collaboration underscores BSN’s commitment to providing Managed Service Providers (MSPs) with the tools they need to enhance their profitability, streamline their operations, and deliver exceptional value to their clients. As Tracie Crites, BSN’s Chief Channel Officer […]
Open-Source AI in Cybersecurity
Staying ahead of the curve is more than a necessity; it’s a survival tactic when it comes to cybersecurity. Recently, Meta took a significant step in this direction by releasing new and updated open-source artificial intelligence (AI) models. This move, highlighted in Meta’s recent announcement, is a testament to the growing importance of open-source AI […]
BSN Appoints Dan Dufault as Vice President of Marketing
We are excited to announce a new appointment to our leadership team at Breach Secure Now. Please join us in welcoming Dan Dufault as our new Vice President of Marketing! Dan brings over 20 years of experience in strategic marketing and product management, making him a valuable asset to our team. His recent role at […]
Elevate Your Offering: Leveraging AI Training for Enhanced MSP Services
In our latest webinar, “Elevate Your Offering,” we delved into the transformative potential of artificial intelligence (AI) and how it can be strategically integrated into Managed Service Provider (MSP) offerings. Hosted by our team at Breach Secure Now (BSN), this session highlighted the significance of AI training in boosting productivity, enhancing cybersecurity, and driving business […]
Breach Secure Now Partners with LYRA Technology Group
At Breach Secure Now, we are thrilled to announce our exclusive partnership with Lyra Technology Group, a leading provider of advanced technology solutions for Managed Service Providers (MSPs). This collaboration will introduce our automated breach prevention and productivity training platform to all MSPs within the Lyra Technology Group family, enhancing their cybersecurity and productivity offerings. […]
Strengthening Cybersecurity: A Collective Responsibility
Cybersecurity is a critical component of business operations and the responsibility of the business and the individual. A recent breach involving TeamViewer’s employee credentials underscores this. This incident serves as a reminder that it’s not solely the domain of the IT department; rather, it requires a concerted effort from every individual within the organization. Each […]
The Impressive Impact of AI in Action
The consulting firm PwC rolled out ChatGPT to all of their employees. The goal was to use the tools on themselves before helping clients implement Generative AI tools. The results are impressive. The results can be transformative when you provide people with the latest technology tools, the skills and guardrails to use them responsibly, and […]
Unveiling AI Training: A New Era for MSPs
BSN is excited to introduce a groundbreaking suite of AI training courses designed specifically for MSPs to offer to their SMB clients. This initiative promises to revolutionize how MSPs and their clients approach cybersecurity and productivity, leveraging the transformative power of Artificial Intelligence (AI). Why AI? Why Now? The advent of AI technology is not […]
Security Awareness & AI Training Reduces Breach Risk
Small and medium-sized businesses (SMBs) face unique challenges and opportunities today with the threat of cybercrime and the rise of artificial intelligence. Training employees in these domains is not just a matter of keeping up with trends; it’s a strategic move that can significantly impact your business’s success. The Importance of Cybersecurity Training Cybersecurity threats […]
Breach Secure Now Unveils Revolutionary AI Training for Managed Service Providers
In an exciting development for the cybersecurity and productivity training industry, Breach Secure Now (BSN) has announced the launch of its new Artificial Intelligence (AI) Training platform. As a leader in innovative training solutions, BSN is poised to revolutionize how Managed Service Providers (MSPs) enhance their service offerings through the power of AI. Art Gross, […]
AI & MSPs: Defining Your Role in the AI Revolution
Artificial Intelligence (AI) is no longer a futuristic concept; it’s a present-day reality transforming industries worldwide. Managed Service Providers (MSPs) are uniquely positioned to lead this AI revolution, guiding small and medium-sized businesses (SMBs) towards enhanced productivity, innovation, and competitive advantage. In our recent webinar, hosted by Art Gross, CEO, and Nicole Kurtz, Director of […]
Artificial Intelligence: Leadership Messaging
We continue the conversation regarding Artificial Intelligence and how important it is for executive leadership to embrace AI and convey that value to their team in their messaging. BSN is a passionate advocate for leveraging technology to improve workplace efficiency and employee well-being and we believe that AI will be integral to this. The integration […]
AI In Workplace Challenges
Microsoft and LinkedIn released their joint Work Trend Index “AI at Work Is Here. Now Comes the Hard Part” which explores the significant impact of AI on the workplace, emphasizing its potential and also addressing the challenges it brings. Key Findings Adoption and Optimism: 70% of workers are eager to delegate as much work as […]
Leading the Future: Why Embracing AI is Essential for Modern Leadership
More than just traditional leadership skills are necessary for businesses to stay ahead of the curve. With the exponential growth of artificial intelligence (AI) technologies, businesses are finding themselves at a crossroads: adapt and thrive or risk falling behind. At the heart of this transformation lies the importance of hiring leadership that not only understands […]
Harnessing AI to Empower Businesses: A Human-Centric Approach
Most of us know how Artificial Intelligence (AI) stands out as an innovative and promising transformative solution across industries. Yet, amidst the hype and excitement surrounding AI’s potential, its true power lies not in its autonomous capabilities but in its ability to augment human potential. This is where the concept of AI assisting businesses in […]
Breach Secure Now Names Dan Cucchi as Vice President of Sales
Breach Secure Now, the channel leader in providing cybersecurity and productivity training and solutions, is pleased to announce the appointment of Dan Cucchi as its new Vice President of Sales. In this role, Cucchi will oversee the company’s sales strategy, drive revenue growth, and lead the sales team to further strengthen Breach Secure Now’s position […]
MSPs Encouraged to Embrace AI
This comes from a recent post “Why I Strongly Believe MSPs Need to Embrace AI — From the Guy Who Has Literally Seen It All” The other day, I posted on LinkedIn and in MSP Facebook groups about why I think MSPs should be building an AI practice. I compared this to how MSPs have […]
Breach Secure Now Integration with ControlMap
Breach Secure Now is excited to unveil the latest venture with ScalePad…ControlMap integration! Why Integrate with ControlMap? With Breach Secure Now, MSPs can monitor security training within the ControlMap platform and map employee training data directly to compliance controls. This helps MSPs (and their clients) streamline the collection of evidence for audit prep, saving hours […]
Breach Secure Now Recognized as Training Leader
Breach Secure Now, a leading cybersecurity training provider, has recently earned recognition as a training leader in the industry. This acknowledgment comes with high praise from Kevin Lancaster, CEO of Navistack, who highlighted Breach Secure Now’s exceptional contributions to cybersecurity education in a recent LinkedIn post. Lancaster emphasized the outstanding training capabilities of Breach Secure […]
Streamlining Work Efficiency to Combat Information Overload and Burnout
At Breach Secure Now, ongoing training is critical to strengthening a business’s cybersecurity posture. Informed employees make better decisions, including being aware of, and keeping up with, how to respond to cybercriminals’ ever-evolving tactics. We’ve recently launched our Productivity Suite which will help create a more informed workforce that can be more efficient with their […]
Cybersecurity Training in Microsoft 365 & Google
Increase in Impersonation Scams According to recent findings by cybersecurity experts, in 2023 there has been a 53% surge in daily cyber threats that target Microsoft Office. And within that statistic, an average of 411,000 malicious files were detected each day. These findings underscore a growing trend of cybercriminals targeting document formats, particularly Microsoft Office and […]
Microsoft 365: The Importance of Using the Tools Effectively
Having the right tools at your disposal can make all the difference between being busy and being productive. Many businesses, if not most, use Microsoft 365, a cloud-based comprehensive suite of productivity tools that offers many features designed to streamline tasks and enhance efficiency. From email management to document collaboration and everything in between, it […]
Breach Secure Now’s Microsoft Teams Integration App
Working remotely, hybrid options, and busier lifestyles… Each of these is now the norm and sets the landscape for how we maintain our work and life balance. This means that collaboration platforms like Microsoft Teams are indispensable when it comes to maintaining that balance. As data breaches increase, organizations face a significant challenge in maintaining […]
Breach Secure Now Unveils Enhanced Product Lineup for Cybersecurity and Productivity
Breach Secure Now is thrilled to announce a strategic revolution in our offering for our Managed Service Providers (MSPs) partners to build and expand upon their offering. BSN CEO Art Gross stated, “We are thrilled to evolve the BSN platform for our partners and their clients.” At the heart of this evolution is the groundbreaking […]
Productivity Revolution: The Synergy of Cybersecurity and Efficiency
At Breach Secure Now, we’ve been thinking about and working on solutions that address the need for MSPs to lead their clients through the Productivity Revolution. With that in mind, we’re excited to share about the expansion of our cybersecurity training to include Microsoft 365 productivity training. One of the advantages of merging cybersecurity and […]
Tracie Crites Named to 2024 Channel Chiefs List
Breach Secure Now’s Chief Channel Officer Tracie Crites has been named to CRN’s Channel Chiefs List for 2024! BSN is thrilled to announce that Tracie has been recognized and named to CRN’s prestigious Channel Chiefs list for 2024. This acknowledgment underscores Tracie Crites’ outstanding leadership, influence, innovation, and growth within the IT channel. Additionally, it […]
Breach Secure Now Partners with ScalePad Lifecycle Manager
Breach Secure Now is thrilled to announce our partnership with ScalePad Lifecycle Manager! We have long been dedicated to empowering the MSP community with comprehensive cybersecurity solutions. ScalePad Lifecycle Manager offers a cutting-edge platform designed to streamline IT asset management and enhance overall security posture. ScalePad Lifecycle Manager’s unique features, such as automated asset discovery, […]
Understanding Attack Surfaces
A fundamental concept in cybercrime is the understanding of attack surfaces. Attack surfaces encompass the potential avenues that cybercriminals can exploit to compromise digital assets. What Are Attack Surfaces? Digital Attack Surfaces:Digital attack surfaces refer to the various points through which cybercriminals can infiltrate a computer system, network, or application. These may include software vulnerabilities, […]
Understanding Active and Passive Attack Vectors
An attack vector refers to a route or technique employed by a hacker to unlawfully infiltrate a network or computer. This is done to exploit vulnerabilities in the system. The two common types of attack vectors are active and passive attacks. Active Attack Vectors Active attack vectors involve direct and intentional efforts by cybercriminals to […]
QR Code Scams: Identification and Prevention
QR codes, short for Quick Response Code, have become an integral part of our lives, a simple way of connecting physical and online experiences. And with that convenience comes an opportunity for cybercriminals. These deceptive practices exploit the unsuspecting user, leading to potential security breaches and financial losses. Are you familiar with what QR code […]
Anticipating the Consumer Cost of Cybercrime in 2024
One of the significant challenges that consumers face today is the ever-growing threat of cybercrime. According to Cybersecurity Ventures, cybercrime is projected to cost the world $9 trillion annually in 2024. How will this expected cost impact Managed Service Providers (MSPs) and their clients? And how critical is the role of training to reinforce strong […]
MSPs Must Lead SMB Clients Through the Productivity Revolution
Age of Productivity We are entering an age of human productivity that has never been seen before. Artificial Intelligence (AI) will bring unimaginable leaps of productivity but before we get there, the table is already set for a productivity revolution. The past 25 years have seen the internet being built, services and tools have been […]
The Importance of Cybersecurity Training
Individuals have diverse learning styles. Some grasp instructions effortlessly with a single reading, while others thrive on visual or hands-on learning experiences. There is value in the repetition of training. However, this doesn’t imply repeatedly taking the same course or revisiting a manual annually. And given that human error remains the leading cause of security […]
End of Year Preparation
As the end of the year gets closer, it’s not just the holiday season that demands our attention—it’s also a crucial time for businesses to reflect, analyze, and prepare for the upcoming year. Wrapping up the current year smoothly can set the stage for a successful start to the new one. Let’s review the importance […]
Breach Secure Now Appoints Tracie Crites as Chief Channel Officer
Cultivating Partnerships: Crites, Spearheads Channel Growth Breach Secure Now (BSN), a pioneering cybersecurity training and productivity company, proudly announces the appointment of Tracie Crites as the company’s new Channel Chief. This strategic move reiterates BSN’s commitment to elevating its channel strategy and advancing its mission to provide exceptional value to partners and clients. CEO Art […]
The Growing Influence of AI on Phishing Emails
A recent report has unveiled a significant and concerning trend in cybersecurity. The report, compiled by SlashNext Threat Labs, reveals a staggering 1265% surge in malicious phishing emails since Q4 2022. This annual report spans a 12-month analysis of threats across various channels, including email, mobile, and browsers, from Q4 2022 to Q3 2023. It […]
Recognizing and Defending Against Deepfake Scams
Small businesses, just like large corporations, can fall victim to deceptive tactics. If you haven’t yet heard about deepfake, read on and explore what these scams are and learn practical tips on how to recognize and defend against them. It is important to know in order to protect yourself and safeguard your business’s reputation and […]
20 Years of National Cybersecurity Awareness Month
National Cybersecurity Awareness Month (NCSAM) has come a long way since its inception in 2004. Over the past two decades, it has evolved into a vital campaign with a crucial role in educating and empowering individuals and organizations. This is especially true for small businesses. Let’s take a closer look at the 20 years of […]
Recognizing and Avoiding Text Phishing Scams
Phishing scams have become increasingly sophisticated and prevalent. One form that has gained traction is text phishing, or “smishing” (SMS phishing). This involves sending fraudulent text messages with the intent to deceive individuals into revealing sensitive personal information, such as passwords, credit card numbers, or social security numbers. These messages often appear legitimate, urging recipients […]
MGM Data Breach: A Reminder for Personal Cybersecurity
Technology permeates almost every aspect of our lives, and the security of our personal information is more crucial than ever. Recently the MGM data breach that was reported reminds us that we must proactively safeguard our sensitive data, for no entity can guarantee foolproof protection. According to the Reuters article, MGM, a renowned hospitality and […]
Establishing a Baseline for Cybersecurity Knowledge
The weakest link in any organization’s cybersecurity infrastructure is often its employees. To address this vulnerability, it is crucial to have a baseline understanding of where employees stand in terms of cybersecurity knowledge. This knowledge forms the foundation upon which effective training and comprehensive protection for the business can be built. Understanding the Baseline A […]
Cybersecurity in 2023: Weathering the Storm
This year so far in cybersecurity has seen a significant surge in cyber threats and breaches, underscoring the need for robust defenses and preparedness. The shifting landscape of cyber threats in recent years can be likened to a storm, gaining intensity and unpredictability. Understanding these shifts and the importance of adequately training the human workforce […]
Credential Stuffing
Credential stuffing is one of the latest tactics that cybercriminals are employing to exploit vulnerabilities and gain unauthorized access to your personal information. Let’s take a look at what it is, and how you can fight back. What is Credential Stuffing? Credential stuffing is a type of cyberattack in which cybercriminals use stolen or leaked […]
Healthcare Clients and Cybersecurity
Data breaches have become an all-too-common concern for businesses across every industry, and your healthcare clients are no exception. However, for these businesses that oversee patient data, the stakes are even higher. Healthcare organizations are entrusted with sensitive information, making them prime targets for cybercriminals. They must not only understand the magnitude of the threat […]
State of Data Breaches
Regular reports of data breaches and cyberattacks reinforce the urgency for organizations and individuals to be proactive against evolving threats. The latest report from IBM sheds light on the current landscape of data breaches, highlighting trends, causes, and potential safeguards. Let’s take a look at the key findings, and explore the implications for businesses and […]
Cybersecurity: Monitoring Your Credit
Your credit plays a pivotal role in your financial and cyber well-being. A strong credit history can unlock opportunities for better interest rates, favorable loan terms, and greater financial security. But it can also alert you to fraudulent activity against your identity. If a breach goes on unnoticed for some time, as it often can, […]
Safeguarding Your Business: The Proactive Path to Strong Cybersecurity
Being proactive when it comes to your cybersecurity program is far better than being reactive if and when a breach occurs. Doing it the wrong way is like locking the barn door after the horse has bolted. And taking a proactive cybersecurity program can save you time, money, and reputation in the long run. The […]
Back-to-School Cybersecurity Tips
As summer draws to a close and the back-to-school season ramps up, it’s a perfect time to review the importance of safeguarding children’s online presence. In an era dominated by social media and digital sharing, it’s crucial to be mindful of the risks associated with posting and sharing identifying information about your kids on these […]
NIST Password Standards
As most businesses rely heavily on technology to operate efficiently and serve their customers, we embrace the convenience of digital tools. It is crucial not to overlook one of the cornerstones of strong cybersecurity, password standards. Using strong passwords to safeguard sensitive information and prevent unauthorized access to your business accounts and data is critical. […]
QR Codes: A New Tool for Cybercrime
QR Codes. The versatile little black and white squares that we see everywhere. Advertising materials to event tickets, restaurant menus, and even on product packaging. While they undoubtedly offer convenience and efficiency, cybercriminals have also recognized the potential of QR codes as a tool for information theft and hacking. Let’s look at the methods used […]
A Rise in Ransomware & Phishing
So far in 2023, we have witnessed a concerning (but not surprising) rise in cyberattacks, particularly in the form of ransomware and phishing. And understanding the evolving tactics of cybercriminals is crucial for everyone. Ransomware These attacks are one of the most prevalent and damaging threats in the cyber landscape. Unlike other types of malware, […]
The Importance of Ongoing Training
Organizations of any size, and of all industries must adopt a proactive approach to protect their assets through a strong cybersecurity program. And an integral part of that is the significance of ongoing training for humans within this program. Let’s take a look at how this plays into the different facets of your defense. The […]
The Rising Threat of Cyber Attacks on the Legal Industry
The threat of cyber attacks looms large over businesses of various industries. And unfortunately, the legal industry is not immune to risk. Law firms face an increased risk of cyber attacks, and the consequences can be devastating. Here are some of the measures they can take to safeguard their sensitive client data and trust, and […]
AI-Powered Scams
The proliferation of scams and frauds leveraging artificial intelligence (AI) to deceive unsuspecting individuals and organizations is, as expected, on the rise. As an MSP, it is crucial to continually remind your clients about the importance of staying aware and diligent, even when encountering seemingly legitimate information or requests. Understanding AI-Powered Scams It is important […]
The Danger of Disinformation
Disinformation refers to intentionally false or misleading information spread through various mediums, including social media, websites, and online forums. Its primary objective is to manipulate public opinion, exploit vulnerabilities, and create confusion among individuals. Disinformation can take many forms, such as fake news, rumors, fabricated images or videos, and conspiracy theories. And it plays a […]
FBI Cyber Division Issues PSA
Recently, the Federal Bureau of Investigation (FBI) issued a crucial Public Service Announcement (PSA) highlighting the growing concern of malicious cyber actors using deepfake technology to manipulate photos and videos for explicit content and sextortion schemes. It is essential to be aware of these threats and take proactive measures to safeguard yourself, your employees, and […]
Industry Events and Building Relationships
The success of any organization can heavily on the strategic relationships it forms. Within managed IT services, the partnership between a vendor and the Managed Service Provider (MSP) is crucial. Attending industry events provides an excellent opportunity to connect and foster collaborations that can drive growth, innovation, and overall business success. Staying Informed and Gaining […]
Reinforcing Cybersecurity Habits & the Dark Web
As an MSP it is crucial to continually emphasize to your clients the importance of understanding the dark web. It is important to educate what it is and how it plays a role in their business’s security. By taking proactive steps to protect them from data breaches with a comprehensive approach that addresses all of […]
Voice AI: A New Frontier for Cybercrime & Security
The rise of voice artificial intelligence (AI) has captured our attention and transformed the way we interact with devices. Voice assistants like Siri, Alexa, and Google Assistant have become ubiquitous, seamlessly integrating into our daily lives. However, as this technology advances, a new concerns arise for the potential of voice AI to become a gateway […]
Risk Factor Reminders
Small and medium-sized businesses (SMBs) are always at risk to be a target for cybercriminals. And many still believe that their business is “too small” to be targeted by cybercriminals. Or that their employees are not a risk factor to their cybersecurity. However, the truth is that cybercriminals target SMBs because they are often easier […]
Healthcare Cybersecurity
As a Managed Service Provider (MSP), your healthcare clients rely on you to ensure their IT systems are secure and compliant with regulations. With the increasing threat of cyber-attacks, it is crucial to emphasize cybersecurity alongside HIPAA regulations to your healthcare clients. What is HIPAA? HIPAA compliance is a critical aspect of healthcare IT, and […]
The Different Types of Hackers
Understanding the many facets of cybersecurity includes an understanding of hacking. We hear the word hacker, and we immediately think of a character in a dark room, surrounded by monitors as code flashes on the screen where he or she is attempting to compromise a website or business. But that’s not always the case. What […]
The Importance of Cyber Liability Insurance
As a Managed Service Provider (MSP) or Small and Medium-sized Business (SMB) owner, you hopefully recognize the importance of cybersecurity. You have invested in security measures to prevent cyberattacks. However, even with the best defenses in place, a breach can still occur. In such a scenario, having a cyber liability insurance plan can be the […]
National Cybersecurity Strategy Released
The Biden administration recently announced the new National Cybersecurity Strategy for 2023. This strategy is aimed at safeguarding American infrastructure, businesses, and government agencies against the increasing threat of cyberattacks. The National Cybersecurity Strategy 2023 recognizes the need to address cybersecurity risks in a rapidly changing technological landscape. The strategy outlines four pillars that will […]
Cyberattack Fears Increase Among Americans
In what is perhaps a surprising bit of news, our fears have flipped. In fact, recent studies have shown that Americans are now more fearful of cyberattacks than they are of nuclear war. This shift in perception has significant implications for small and medium-sized businesses (SMBs), as they are particularly vulnerable to cybercrime. According to […]
Don’t Be Fooled by Scammers
Scammers don’t need a reason to take advantage of your trust. And they certainly don’t mind if you look or feel foolish. This April Fools, don’t be fooled by any of their attempts. Here are some tips to help you avoid falling victim to online impersonators: When entering personal information online, make sure you’re on […]
Cybersecurity Maturity Report 2023: An Overview
Cybersecurity is a critical concern for all organizations, regardless of their size or industry. Cyber threats continue to evolve, and the stakes for security breaches are higher than ever before. The Cybersecurity Maturity Report 2023, published by CyEsec, is a comprehensive analysis of cybersecurity maturity across various industries. The report analyzed data from over 500 […]
The Importance of Ongoing Cybersecurity Training
As most of us are aware, and especially in the tech industry, cybersecurity is a critical concern for businesses of all sizes. With the increasing number of cyber-attacks and data breaches, it’s more important than ever for businesses to prioritize ongoing cybersecurity training for their employees. Not only can a lack of training lead to […]
Chatbots and Human Error
Businesses face a range of challenges related to data security. The threats are ever-changing and evolving to offset our ability to recognize them easily. With human error at the top of the list of risk factors, employees giving away sensitive information is a challenge. The advent of large language models (LLM), chatbots, and other digital […]
What is CIRCA?
The Cyber Incident Reporting for Critical Infrastructure Act (CIRCA) is a mandate that requires companies to report any significant cyber incidents to the Department of Homeland Security (DHS). This aims to enhance the security of the nation’s critical infrastructure. This includes everything from power plants to financial institutions. While the mandate is primarily aimed at […]
The Importance of Ongoing Engagement & Marketing
As a managed service provider (MSP), your clients rely on you to keep their systems secure and running smoothly. However, it’s not enough to just provide your clients with a set-it-and-forget-it security solution. You need to create ongoing engagement and marketing to educate them on the importance of cybersecurity. And you need to maintain their […]
Mental Health Data for Sale
Mental health is for many reasons, a deeply personal and sensitive topic. It is something that many people are not comfortable discussing with even their closest confidants. Finding a trusted professional to help navigate these waters is invaluable. Online resources that include on-demand options continue to expand. This provides individuals with new ways to access […]
Beware of Romance Scams
‘Tis the season for love. And with it comes the opportunity for cybercriminals to pitch their romance scams. Millions of people fall victim to these fraudulent schemes every year. In a romance scam, a person posing as a potential romantic partner uses online dating websites, social media platforms, or other online channels to build a […]
Data Privacy Week
This week marked the annual Data Privacy Week. And we know that cybersecurity is critical when it comes to protecting data privacy and the integrity of information systems. Personal and corporate data are constantly at risk from malicious actors. A strong cybersecurity program is essential for safeguarding this data and maintaining the trust of customers, […]
The Responsibility of Cybersecurity
In the healthcare industry, HIPAA sets rules and regulations around the requirements of protecting patient data. But in the “rest of the world”, professionally speaking there are unspoken rules, but not the same type of enforcement program in place. A lawsuit might be considered the equivalent of a HIPAA fine – both damaging but perhaps […]
Phishing: Targeted Attacks
The threat of phishing remains prevalent in all aspects of digital life. Both personal and professional. But a recent deep dive by Mandient into the details of a more specific kind of attack that is on the rise. This shines a light on the threat of industrial-themed email attacks and how they can affect operational […]
Human Error
Major Impact Earlier this week the Federal Aviation Administration (FAA) announced a nationwide ground stop of all flights. Approximately 9,000 flights were delayed, and over 1,000 flights were canceled. The reason why? The NOTAM system (short for Notice to All Air Missions), which is designed to provide real-time information to pilots and air traffic controllers […]
New Year’s Resolution: Train More
Which resolutions have you set for yourself in 2023? Let me guess: get fit, eat healthily, and hit the gym on a regular basis. These are good choices, but how about another way to incorporate training into your schedule? And this one may pay off in dollars saved, not pounds lost. Why Train? Cybersecurity training […]
Social Security Scams
Social Security Scams While many of us are taking time at the end of the year to enjoy our friends and family’s company and goodwill, cybercriminals are using it as an opportunity to scam people. One such opportunity comes with the end-of-year renewal of programs and policies. And Social Security scams are one of the […]
Last Minute Scams
Quick! Get to the store for that forgotten gift…order online and pay for overnight shipping…whatever it takes to get the gift in hand for the holiday ahead! We know the holidays are coming, but inevitably we are scrambling to get some things done at the last minute. And where there’s an opportunity, there’s a scam. […]
AI: Artificial Intelligence
Artificial Intelligence (AI) is gaining popularity among everyday consumers like so many technologies, through social media. Just take a quick look in your newsfeed and you’re likely to see your friends in otherworldly scenarios they’ve created with Magic Avatars from Lensa. With over 4 million downloads in the first part of December, it’s clearly a […]
Holiday Scams
End of year wrap-up has many of us in a hurry. We rush to get our businesses buttoned up, our shopping done, and our tasks completed so that we can enjoy the time off. Along with our tendency to rush, is the feeling of merriment and goodwill, and we may assume everyone else is operating […]
Phishing
You are familiar with phishing. You’ve taught your clients and colleagues to be on alert for fraudulent emails. But are you changing your approach to education and training to match the sophistication of cybercriminals and their tactics? Smart Phishing Teaching effectively doesn’t necessarily mean endless bits of content and methodologies. It means that each lesson […]
Smart Shopper: Black Friday Scams
‘Tis the Season The unofficial official shopping season starts this week, and if there is a sale, there might be a scam close by. As the prices go down, so does our guard. We fear losing out on a deal and can act without thinking. A few quick reminders to stay cyber-safe. Fraudulent Websites Don’t […]
Healthcare Clients
When it comes to needing a strong cybersecurity program, don’t overlook the opportunity that the healthcare industry presents. There is a market here that MSPs should be focused on as a way to grow their business. Why Focus Here? Healthcare continually remains one of the largest targeted industries for cybercriminals. The payoff for a data […]
Social Media Reminders
Sloppy social media habits can lead to a compromise that extends beyond an individual’s personal account. Many people don’t realize that their login credentials tie them together with an invisible thread in the dark web. A hacked social account could lead to access to business credentials or more. Hackers 101 Being in IT, you’re familiar […]
Mobile Phone Spyware
Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is […]
What is Deepfake
A deepfake is a portmanteau (more on that in a moment) of “deep learning” and “fake”. What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If […]
Breach Secure Now & Gradient MSP
Breach Secure Now is a partner-focused business. We work for the MSP community to provide them with the most comprehensive cybersecurity solutions for their clients. Gradient MSP also works with MSPs to provide the tools that integrate their solutions. The Right Partnership Because BSN was founded by an MSP for MSPs, we know the importance […]
Cybersecurity Awareness Month: See Yourself in Cyber
This month we celebrate National Cybersecurity Awareness Month. The year’s campaign theme of “See Yourself in Cyber” focuses on the individual. This collaborative effort is done to raise awareness between government and industry. It is overseen by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) working together. The theme this […]
Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month and Breach Secure Now is here to make sure that we get everyone involved in the cybersecurity ‘celebration’! Everyone – and we mean every single person needs to be aware of cybersecurity and the best practices that keep their world secure. The ripple effect of breached information can travel […]
MSP the Expert
Small businesses often make the mistake that they have to be cybersecurity experts to have strong security programs in place. Remind them that as their MSP, you can be their expert. The concern is often that learning how to protect their business will be overwhelming. One more thing to do. Or that they need to […]
Social Engineering In Action
Is social engineering that effective? Ask an Uber or Rockstar Games employee that question and you’ll likely hear a resounding yes. This effective mode of duping people within a targeted group or business was the method that one hacker used to hit both companies with a breach. Just how effective is it? In 2021, the […]
What Is a Botnet?
You may hear the word ‘bot’ used in conversations, especially around cybersecurity. But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network. It describes a network of computers that are infected by malware. This malware is controlled by a […]
Cyberattack Increase Warning Issued for Schools
Back-to-school time is in full swing and imagine if the only threat that schools faced would be running out of tissues during sniffle season? Unfortunately, that isn’t the case. A cyberattack warning from the FBI, CISA, and MS-ISAC has been issued indicating that cybersecurity “attacks may increase as the 2022/2023 school year begins and criminal […]
Student Loan Scams
Student Loan Scams With the launch of the U.S. Student Loan Forgiveness program, there is an opportunity for students and other borrowers to benefit. Any scenario that puts millions of people in a target pool is ideal for hackers. Add to the scenario the list of questions and uncertainties and you have a recipe for […]
Ransomware as a Service
What is ransomware as a service? You’re likely familiar with software as a service (SaaS) but ransomware? What does that mean? First, let’s do a quick recap of what ransomware is. It is a type of malware that holds the victim’s files and folders for ransom. Through human error, the malware is deployed and encrypts […]
What Is Zero Trust?
Zero Trust Access Zero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified. The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term […]
MSP: Leading by Example
As an MSP, your business is designed to serve your clients. That means fixing what breaks and preparing them for what might break. You encourage behaviors that eliminate the breaking altogether. As a Breach Secure Now partner, you’re likely approaching this from multiple angles. Ongoing training, social media reminders, and products that integrate with their […]
Back to School: Student Cybersecurity Tips
It’s back-to-school time, and no matter the age of the student, or the location of the school, there’s one class that everyone needs to pass. Smart cybersecurity habits need to be on all of our minds, and we can’t afford to fail. We’ve put together some reminders about staying safe online and with your technology. […]
The Human Element
With regard to technology, the Human Race is in an actual race to have the latest products and solutions integrated into our lives. We will stand in line for hours to be the first to have a new phone when it is released. Camp out on Black Friday to get a good deal on electronics […]
Cyber Insurance Liability
Misrepresenting yourself is easy to do in a world where many of our interactions exist online. Why not put that profile photo of yourself up at the gym from a few years ago when you actually went there regularly? You’ll eventually get back to working out. There’s no harm in it. Deceptive? Sort of. But […]
Summer Phishing
Remember when summertime meant easy days and more time to relax? In the hurriedness of today, those moments can feel like they are too far gone to recapture. Additionally, as an MSP, there are so many clients relying on you, that it can be difficult to take time for yourself. Enter Breach Secure Now We are […]
Strong Password Behavior
Strong password behavior is the foundation of many aspects of a cybersecurity program. There are still people that have the same password for all their accounts. As an MSP, you can’t be there when they create passwords to oversee the process. But you can enable measures that will force them to engage with good habits. […]
Dashboard Tag Filtering
Dashboard Tag Filtering Grouping items together with tags is an effective way to put order to the items that you write, collect, and store electronically. Tagging records allows you to label and group data in the same way. Breach Secure Now has built upon that approach with a new update for our partners! Our latest […]
Annual Training Now on Mobile Devices
We are excited to announce that our annual training is now mobile device ready! Your clients can now complete their full training courses just as they did on their desktop, but in a mobile format as well. What Does This Mean? You will now be able to offer your client’s users access to watch the […]
Breach Secure Now Integrates With CloudRadial
Since Breach Secure Now was founded by an MSP. We have strong roots in understanding our partners’ unique opportunities and challenges. We are proud to be a company that focuses our platform and solutions on the needs of the MSP community and its clients. How do we accomplish that? By continuously seeking partner feedback to […]
Pre-Employment Cybersecurity Assessment
Last year our team developed an innovative and one-of-a-kind security risk assessment, with a one-of-a-kind name. The Baseline Employee Cybersecurity Assessment, or BECA, was released in December and has been successfully used by our MSP partners as both a prospecting tool for prospective clients and a relationship-building tool for their existing clients! Since then, our […]
What Is Malvertising?
Oxford Dictionary defines malvertising as ‘the practice of incorporating malware in online advertisements.’ Short for malicious software, or malware advertising, this is the practice of attacking viewers or consumers with fraudulent information that is inserted into sometimes (but not always) legitimate advertisements. How Does It Work Malvertising works in conjunction with the online advertising ecosystem […]
What Is Vishing?
Cybercriminal activity has many terms that are part of the mainstream vernacular. The dark web, breaches, and most people have heard of phishing, even if they don’t know how to recognize a fraudulent email. In fact, Google recently warned nearly 5 million people in a recent week about potentially harmful sites that they are about […]
Scam Alert: Interview & Job Scams
Scam Alert: Interview & Job Scams There are some topics that might seem irrelevant or not important when it comes to alerting your clients with regard to their online safety and cybersecurity. One of those might be about the process of looking at other jobs for a career change or simply to supplement their current […]
Increase Engagement & Awareness In Your Ongoing Training Program
Staying engaged and interacting with your clients just got easier. And in the cybersecurity realm, no one can afford to stay complacent and ‘forget’ just how integral smart and secure habits are when it comes to lowering your risk of a breach. You can’t be there onsite for your clients and calling them daily to […]
Initial Access Brokers: Who Are They?
Imagine if a locksmith created a key for your home or business, then sold a copy of that key to a burglar. They didn’t steal your belongings, but they provided access, making them integral to the process for it to occur. Initial Access Brokers (IABs) work in a similar fashion. The name says it all, […]
Removable Media & Cybersecurity
According to the United States Government Depart of Commerce National Institute of Standards and Technology (NIST), a removable media device or portable storage device is: “A system component that can communicate with and be added to or removed from a system or network and that is limited to data storage—including text, video, audio or image […]
Dangerous Malware Disguised as Antivirus Software
It is so easy to become complacent in our cybersecurity behaviors. But Android users should be given a shake this week and alerted to malware that is being deployed unknowingly by users who think that they are downloading anti-virus apps via the Google Play store. There were six different cases found to contain the Sharkbot […]
Compromised Data Comes in Many Forms 
No Big Deal Right? A friend recently mentioned an email that she received regarding an investment app that she had downloaded on her phone. The app was a way for her to play around and learn a little bit about investing, something that it seems many people leaned into during the pandemic. The notification […]
Tax Scams: What to Look Out for This Season
Many of us dread this time of year for the obvious reason …tax time can be well, very taxing. Add to the challenge of it all, that many of us are working from home, and find ourselves in a whole new and unfamiliar scenario of what we can claim as a tax write-off. We’re all […]
MVP: Most Valuable Player
Look Beyond Technology and Put People First If you think of business as if it were a sports team, you can have a top-notch facility (or fancy office space), stylish uniforms, and the best fan base (or clientele list) around, but if your players don’t show up for each game, you’ll never have a winning […]
Game Plan: Building a Strong Security Posture Within a Team
Sports fans undoubtedly have their favorite teams. Sometimes we pick them based on the mascot, hometown, or because they were “my dad’s favorite growing up”. But just because you have a favorite team, it doesn’t mean that you don’t have respect for other franchises or organizations. These are the teams that are often “drama-free”. They […]
Nothing But InterNET – How to Explain the Dark Web
As an MSP, your clients know you’re there to “take care of the computers”. The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening. Regardless of their level of insight or knowledge of technology, they likely know […]
It’s Game Time – Shoot, Score, Win!
Participation in just about any group activity, from sports to dancing, to delivering presentations, is usually accompanied by one phrase that’s applicable across the board: practice makes perfect. If you prepare for what may or may not happen, the likelihood increases that you will respond in a more successful manner. But, when discussing a strategy […]
BSN Wrapping Up a Month of Love!
Well, today wraps up the month of February and the celebration of our love about being a part of an incredible community of MSPs and channel vendors dedicated to cybersecurity. During the month of February, we shared some serious love for our partners, and really enjoyed seeing all of you that shared your #BSNLove on […]
Partnerships We Love: Breach Secure Now and Inskyber
We take thee for better or for worse, in good times and in bad, in sickness and in health…we will be there for you in your time of need…. ah, the familiar words we hear as two parties engage at the beginning of their road together. You’re in it together and promise to stand by […]
What We Love to Do at Breach Secure Now
Find something you love to do, and you’ll never have to work a day in your life. Whether or not you have heard that exact quote before, it likely will resonate with all of us. Loving what you do means that you have fervor for finding answers, are delighted at discovering different ways to approach […]
BSN Seeking MSP
Everyone is doing it, right? It seems every day we see one successful match-up after the other on our newsfeed from Instagram to Facebook, and everywhere in between. And since it is now February, the month known for celebrating perfect partnerships, we thought, hey, let’s put ourselves out there! Tell Me a Little Bit About […]
Breaking Down the Baseline Employee Cybersecurity Assessment – Working Remotely
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]
Breaking Down the Baseline Employee Cybersecurity Assessment – Social Media
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]
Breaking Down the Baseline Employee Cybersecurity Assessment – Password Hygiene
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]
Breaking Down the Baseline Employee Cybersecurity Assessment – Handling PII
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]
Breaking Down the Baseline Employee Cybersecurity Assessment – Phishing
Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP, it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper ongoing training, […]
Breaking Down the Baseline Employee Cybersecurity Assessment – General Cybersecurity Knowledge
Assessment Overview Our recent launch of the Baseline Employee Cybersecurity Assessment provides MSPs with a new tool to add to their prospecting and baseline risk detection efforts. As an MSP it gives you the opportunity to show prospects and clients that human security plays a key role in protecting their organization and that without proper […]
Introducing the Baseline Employee Cybersecurity Assessment
Is it good or bad news to know that ransomware and phishing are no longer terms that need further explaining to most people? Yes, it is favorable when you’re trying to explain how important a cybersecurity plan is for your clients to have – you don’t necessarily need to start at the beginning when it […]
2022 Cybersecurity Budgets
Let’s talk end of year! Cybersecurity budgets vary across businesses, with some spending millions of dollars each year and others only a small fraction of that. But no matter the size of your client’s cybersecurity budget, there are a few key steps you can take to make sure it’s effective. Help Your Clients Identify Their […]
Cybersecurity Agents Unite!
It’s holiday blockbuster season! The time of year when the big screens are full of movie releases that are expected to pull in the crowds that want to watch Marvel and DC Comic heroes unite to save the world. They come from all realms to fight the dark forces that threaten humanity. Together they will […]
How to Create an Incident Response Plan
We often discuss the proactive approach that you should take when it comes to cybersecurity. Security risk assessments will identify the gaps, ongoing training will help to strengthen the human risk factor, and tools like Catch Phish will keep the team engaged and learning along with those training programs. But the fact is, you can’t […]
Black Friday Scams
Don’t Be Scammed By a Turkey It’s Thanksgiving week and that also means that the holiday season has officially started for most of us. And just the holiday season of our youth, as in summer vacation from school, this is the time of year when we as adults tend to put our feet up and […]
Do Your Healthcare Clients Need an Annual Checkup?
Do Your Healthcare Clients Need an Annual Check-Up? As a Managed Service Provider, you’re in the business of keeping other businesses running. Which vertical they are in, or what products and services they provide may not be the most pressing detail. Unless you’re talking about healthcare. There are two common views when it comes to […]
IT Nation Week
‘Tis the season for gathering with friends and family and this year feels especially special because of the limited human interaction we’ve had over the past year. Or is it years now? It feels like years. While Thanksgiving is just around the corner, the type of gathering we are referring to is IT Nation in […]
Reasons to Perform a Security Risk Assessment
Performing a Security Risk Assessment (SRA) is one of the things that Managed Service Providers can utilize as a way to solidify their client relationships and grow their business. Offering it to existing clients is a way of showing your value as well as helping them to strengthen their security posture. You can engage with […]
Five Takeaways from Cybersecurity Awareness Month
Who’s Ready to Go? As Cyber Security Awareness Month comes to an end this week, don’t let the momentum you’ve created dwindle or diminish. Take the foundation of awareness that you’ve been establishing with your existing and new clients and keep on building! Are you feeling unsure about how to keep it going, or uncertain […]
Keep the Awareness & Momentum Going Year-Round!
When the national campaign for cybersecurity awareness ends on October 31st, the need for diligence doesn’t go away with it. Since a critical aspect of your job as an MSP is to keep your clients safe and secure, you’ll inevitably benefit from keeping the momentum going! Keep your clients aware of the risks and threats […]
MSPs Should Make Everyday Cybersecurity Awareness Day!
It Starts at Home With October being designated National Cybersecurity Awareness Month (CSAM) by the National Cyber Security Alliance and the United States Department of Homeland Security, we are seeing promotional material from a variety of public-facing businesses. Everyone from our banks to our credit cards to the grocery store is promoting it on their […]
Cybersecurity Awareness Month Resources for MSPs
Cybersecurity Awareness Month is the perfect time to “shine a light” on the ways that your clients can be aware of the threats that they face when it comes to cybersecurity, as well as provide ways to mitigate the risk factors that can allow cybercriminals easier access. In addition to our very own marketing toolkit […]
Texas Cybersecurity Update
If you’re in Texas, you’ll want to take note of a recent law that took effect on September 1, 2021. Governor Greg Abbott signed House Bill 3746 that has amended the state’s data breach notification law. The original law, Business and Commerce Code 521.053 established requirements for businesses around “any breach of system security” that […]
Cybersecurity Awareness Month Toolkit
The work of an MSP is often taken for granted – until something goes wrong. And then you are the first phone call that a client makes and it’s a hurry up and rush scenario. At Breach Secure Now, our partner-focused mission is the foundation for all that we do. Our founder Art Gross was […]
Class is Canceled
This past week Howard University had to cancel classes due to “unusual activity on the University’s network”. As a result, their Enterprise Technology Services (ETS) team shut down the school’s classes for the day to investigate the situation which they identified as a ransomware attack. This incident brought to light the consideration of how deep […]
Inside Threat
The threat to a business from outside perpetrators is very real when it comes to cybercrime. But sometimes the threat comes from within, and it is even harder to detect or prevent in the first place. Why would someone try to intentionally hurt the very company that provides them with a paycheck? The reasons vary, […]
Collective Action Against Cybercrime
Last week the President met with leaders in the private sector as well as those in education to discuss the need to address cybersecurity threats to the nation and efforts needed across the board. The increase in incidents and the ongoing threat of attack is something that transcends all the invisible borders that we put […]
Cellular Breach
Last week we saw the mobile phone carrier T-Mobile fall victim to cybercriminal activity when a hacker accessed the personal data of their users. They learned of the breach via claims that were made on an online forum. This led to an investigation and hiring of cybersecurity experts to help with the situation. They have […]
Why You Should Do a Security Risk Assessment
You can’t fix what you don’t know is broken. And that in a nutshell sums up why you need to do a security risk assessment (SRA) when it comes to a business and addressing their cybersecurity needs. But of course, there is more to the story, that’s simply the headline. As an MSP, you want […]
Trends in Cybercrime
Trends come and go and keeping up with them when it comes to pop culture or fashion might be challenging, but when it comes to cybercrime, you’ll likely never be ahead of the hackers. Their ability to adapt their tactics and tailor them to be more effective is constantly changing – and nearly impossible to […]
Vacation Cyber Safely
With summertime in full swing, many of us are heading out on vacations that are long overdue. Whether you’re visiting family, friends, the mountains, or the beach, be “shore” to travel with smart cyber habits that will keep you and your loved ones protected in ways that can’t be fixed with that first aid kit […]
Why Is Healthcare Such a Target?
Last week, we discussed the opportunity that is present to best support your healthcare clients, the importance of those organizations being HIPAA compliant, and how cybersecurity comes into play in healthcare. This week, we’re taking an even deeper dive into healthcare cybersecurity to answer the question, Why Is Healthcare Such a Target for Cybercrime? We […]
Healthcare and Cybersecurity
As Managed Service Providers, you likely look at the world through ‘tech-colored glasses’. While your business may focus on one vertical, in general, you’re able to support a business regardless of what they do or where their focus is, because you see them as a client with a technical infrastructure that you support. What they […]
Two Questions About Ransomware That Every MSP Should Ask Clients
1. What would you do if a ransomware attack impacted your business for more than 2 weeks? Most MSPs are really good at backing up and restoring data. That is a core service that MSPs provide to their clients. It would be natural for a client to minimize the impact of downtime of a ransomware […]
The Ransomware Gamble
Being on guard can be exhausting in any situation. Learning behaviors that can offset the risk of danger can help, but it isn’t always a failsafe solution. Such is the case with ransomware. You need to know the signs to look for when it comes to dangerous links in phishing emails, attachments that seem like […]
Evolution Is a Process
In the past year, we’ve all seen how changes can be thrown at us unexpectedly. We are presented with the need to evolve and grow in ways that can sometimes feel uncomfortable, or even rushed when the landscape that we work within changes. Despite how it may feel at the time, this is usually a […]
Bringing More Than Your Laptop Back to the Office
Working from home. It was fun while it lasted for many of us. Some people are scrambling to get back to the office to escape makeshift dining room desks that compete with family life and chaos, or just crave the social interaction and other structure that office environments provide. You might be in a combination […]
Getting the Message Out There
The three largest network morning news shows are often what Americans have on in the background as we get ready for work or school. You’ll find the headlines, pop culture, and maybe some shopping bargains from time to time. They generally cover the top stories of the day but are not known for their likelihood […]
Cyber Insurance
As an adult, it is likely that you’re at least carrying one insurance policy. Life, renters, auto, home…. In fact, it is very likely that you have multiple policies that provide coverage for each and every aspect of your life. This coverage continues beyond your “stuff” and into your well-being with health insurance. While needed […]
Build A Human Firewall In Minutes!
All of the minutes add up! There’s a lot to do when it comes to keeping up with multiple clients who are often in “crisis mode” or reacting to things that they might not understand, which can lead to panic. You need to have solutions that deploy quickly and do the job right the first […]
Down the Pipeline
Just as it seemed we might be seeing clear skies ahead in terms of the pandemic, another dark cloud began to rise on the horizon. The Colonial Pipeline breach hit the news and many people began to panic. We were all too familiar with uncertainty of the future and last year’s toilet paper rush was […]
Guest Blog: Network Design Consultants
This week we welcome Scott McClain, owner of Network Design Consultants as he discusses his experience as an MSP with healthcare clients and how his partnership with Breach Secure Now has contributed to that. After speaking with dozens of medical professionals, we realized the lack of understanding and confusion surrounding HIPAA Compliance. We also have […]
Not Much to Smile About
SmileDirectClub (SDC) is a business that offers teledentistry services throughout the world. They produce and sell transparent retainers that fix crooked teeth in the way that traditional braces work. With 60-75% of people in need of their services, they are poised for long term success, with a large audience of potential patients. Sure, there is […]
Updating Software
It’s that little alert on your desktop. The “upgrades available” indicator when you check your computer. Or when your smartphone tells you that it’s going to update later while you’re sleeping, and you defer it to another time. What if you miss an email or a text? Nah, you don’t need to do that update, […]
Normalizing Breaches
In August of 2019, Facebook was the victim of a data breach that compromised information from 533 million people from 106 different countries. Why is this in the news now? Because the breach was addressed in a recent email from Facebook management, and that email was accidentally sent to a Belgium-based news outlet and, in […]
Cryptocurrency 101
Cryptocurrency is a term that we hear all of the time, but many of us don’t seem to fully grasp what it is, and how it works. We’ll take a look at it from a high level to provide some understanding. Why? Well, it isn’t going away, and it only seems to be gaining popularity. […]
Mobile Threat
Verizon recently released their 2021 Mobile Security Index report, and in it they summarize their research findings by looking at 856 IT professionals. These are the people that buy, secure, and manage the mobile and internet of things (IOT) devices for their companies. In a year of firsts and unexpected experiences, what did they find? […]
Check Yourself
At this time of year, we all risk resembling Charlie Brown waiting on his Valentine in the mailbox. Has my check arrived? Is it in the mailbox? Perhaps you’re waiting on stimulus checks or tax refunds. But along with the hint of spring flowers, there is mailbox optimism in the air for many of us. […]
Human Aspect of Security
It can be so frustrating to try to convince people that we “know better” than they do. Especially when it comes to health or safety right? You want them to know so that you can protect them! It’s like parenting, they need to make mistakes to learn, but nothing too catastrophic. Cybersecurity is not too […]
The Hacker Got Hacked
WeLeakInfo was a data breach site that offered paid subscriptions to users who could then access their searchable database which contained stolen records. This now defunct site contained 12.5 BILLION records of data that was illegally obtained through various means. This included names, phone numbers, addresses, passwords, and email addresses. Cybercriminals used this site as […]
A Sigh of Cyber Relief
The passing of the recent COVID-19 relief Bill last week includes funding that will be set aside to address cybersecurity concerns and a rise in the issues that have increased as a result of the pandemic. As we often say when the topic can become divisive or political, regardless of which side you stand on, […]
Hoop Hack Attack
There’s a March Madness of a different kind that happens each year during this time of tournaments: the onslaught of phishing emails that users fall for over and over again. With pools that take place in our offices, among friends, or to the individual who wants to join a group online, hackers are handed a […]
Ring a Ding Ding
Your phone rings once. The number looks familiar, same area code, same exchange as your local area, so you pick it up. Hello? No one responds on the other end of the line. You repeat “hello?” and it feels like a bad connection or that they can’t hear you on the other end, so you […]
To the Moon!
Are you familiar with the United States Space Force (USSF)? This branch of the US Air Force military was established in recent years to protect and secure space, just as it does for air, land, and sea with other branches. This past week in the news, it was announced that Space Force was hiring or […]
Unemployment Scams
We tend to not ask too many questions and let things slide when we aren’t certain about the situation. Is that normal? Should that happen like that? I guess so. I don’t really know. I mean, it seems ok?? And as with all things related to COVID-19, there’s an air of uncertainty that hasn’t left […]
Heartbreak of a Different Kind
Dating or cultivating relationships is hard enough, let alone trying to do it successfully during a pandemic. You’re putting your heart in the hands of the internet gods and trusting that they will guide you safely along the corridors of the unknown and unseen. Don’t get us wrong, online dating is the way that many […]
Degree of Awareness
This week a friend shared a story about her college-aged daughter Jane and her recent experience in finding a job. She is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue. She sent them her […]
A Quick Refresher
As we move ahead, taking advantage of the energy of the new year and work to get our annual plans moving, sometimes rushing to get a lot more done than usual since we now know the unexpected is all that can be expected, let’s have a quick refresher. On what, you ask? Smart, safe, and […]
Cy-BURN-out
New normal. Our new reality. The various ways that we describe everyday life in the time of a global pandemic. It means a lot of change, in a lot of ways, for a lot of people. While parenting is definitely more challenging when it comes to managing to homeschool and work from home at the […]
Cybersecurity Trends for 2021
Bell bottoms, neon colors…kale…trends come, and trends go, and generally, we’re not one to care much about what’s in style, but cybersecurity trends? That’s one we can get behind and think that there can never be enough of! So, what can you expect to see as both a consumer, employee, employer, business owner or just […]
You Know Better
The end of the year in the usual circumstances brings about reflection even if it hasn’t given us challenges to face or decisions to look back on. This year was one of extraordinary circumstances, and while the situation was unprecedented, the summary of what transpired lends itself to the age’s old advice: Preparation is key. […]
Home Security
When establishing a safe environment at home, we put locks on the doors, latches on the gate, and home security systems that keep uninvited visitors out, and alert us to any intruders otherwise. What we see is what we address – as is the case with most things and situations. But hidden somewhere in your […]
Incoming Cybersecurity Leadership
Regardless of whichever way you lean politically, the recent announcement of a few incoming Presidential government staff appointments is hopefully good news to those who know the importance of strong cybersecurity. Why? Because these individuals come with a collective history of working in the industry. This means that there won’t be any lag time in […]
Lemons to Lemonade
Let’s try to make lemonade out of these lemons we keep getting with COVID-19. Yes, there is an uptick in the number of cases and yes, it appears we are heading towards additional restrictions and lockdowns in various ways. One of two things has likely happened, you started working from home and are still there; […]
Stimulus Scam
With the election season winding down, and a new administration announcing plans for the future, there will be another factor that contributes to the uncertainty of our times. (When does the list of uncertainties stop growing, I wonder?) And again, we find hackers and cybercriminals in a power position to take advantage of our uncertainty […]
Security Skill Shortage
As the need for cybersecurity awareness increases across the entire business landscape, so does the need for strong programs and a trained and competent workforce. This affects everyone in at least two ways. First, you need to have a designated leader in place who facilitates the program, and second, you need to ensure that the […]
Safe Voting
There’s a lot to talk about in the political world right now. In the United States, we’re on the cusp of a huge election and the opinions are strong. We aren’t here to discuss that side of politics; we’re here to look at how cybersecurity factors into this election process and how it affects all […]
Vote for Cybersecurity
No, this is not a political post. In fact, we know that there are some topics that don’t even merit an effort to try to discuss. They’re important, but differing opinions each hold their own value. But when it comes to cybercrime, we should all be a united front. There is one choice, and that […]
Smart Appliances & Cybersecurity
And so, the season starts. Which one is it that we’re referring to? Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the “smartest” of appliances are being purchased and set up in our homes. By getting the latest and greatest, are we […]
We Don’t Negotiate
The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than we care to discuss here. What we do know for certain is that this week, the government […]
Cybersecurity Awareness Month
October kicks off 2020’s cybersecurity awareness month, and if this year has given us any type of certainty, it’s that smart cyber practices are a necessity. The uncertain, the unexpected, and the unknown all allow for hackers to gain our trust, and eventually access, into our personal and professional records without knowledge or permission. Phishing […]
Home Office Security – Never Too Late to Evaluate
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence. These recommendations should be for readers who find themselves in […]
It Was to Be Expected
We knew that any type of newsworthy topic was going to give cybercriminals so much opportunity – and COVID-19 gave them so much bang for the buck. Just because this was something affecting the world in a detrimental way would never be reason enough for hackers to take a break. They were going to take […]
Tell Me About Yourself
You can’t help someone effectively if you don’t know the details of their situation. So how can you determine what your clients need if you are not aware of what they are looking to achieve, the problems that they are trying to solve, or their behavioral tendencies when it comes to decision making? Does this […]
Community Effort
The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) division announced a final directive this week that requires all individual federal civilian executive branch (FCEB) agencies to “develop and publish a vulnerability disclosure policy (VDP) for their internet-accessible systems and services and maintain processes to support their VDP.” Identified as the Binding […]
End User End Game
The conversation around selling your services can get uncomfortable for a variety of reasons. We all have our own beliefs as to how we should be doing it, and few people want to acknowledge that they might be doing it wrong. Start with marketing. Get your name out there, have a call to action, and […]
Impersonation Nation
Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’re not familiar with BEC, it’s when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person, often varying from the […]
Dark Economy
“This pandemic is great for my business!” said very few people. Unless you’re a hacker. And then it’s likely that business is booming. We don’t think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations […]
Is Punishment Proper?
The emphasis on smart cybersecurity practices is vital. As professionals in the IT industry, we know this, we work to ensure policies and procedures are in place that keep the topic at the forefront of every business we support and work within. But while training employees to learn these behaviors is important, there is one […]
Don’t Forget Me
It is easy to get left behind if you become less interesting. No, we aren’t talking about your friends or your childhood toys, although that does happen. We’re talking about YOU. Yes, don’t leave yourself behind. What? How? Explain! Remember your MySpace account? Or when your significant other wanted you to create a TikTok account […]
Scare Tactics
It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the number of reported attacks had already come close to the total for 2019 according to the federal government. With the onset of COVID-19, there were a plethora of new opportunities for cybercriminals to […]
Before & After
Imagine if you had two emails that were worth a million dollars each. You would do everything that you can to protect those emails and ensure that no one deleted them. You would back them up, have multiple copies in place so that if you lost those emails, you would have a quick way to […]
Marketing Magic
Marketing Magic Having an in-house marketing team is not always possible for small businesses. Also, it can be difficult to maintain an ever-growing and ever-changing list of vendors and products to market. As a Managed Service Provider you face the struggle of not only supporting your clients full time but also carrying the full-time weight […]
Changing Landscape
We all knew that the world was going to be forever changed when the World Health Organization declared a global pandemic earlier in 2020. Just how much it was going to change was unseen – and remains unclear as each day brings new challenges for each city, state, and household in our country. As a […]
Small Business, Big Risk
There is no way to emphasize enough, just how important it is for small businesses to be prepared for a cyberattack. But according to a recent survey by the Wall Street Journal Pro Research of 400 companies and their security officers, many companies are not taking it seriously enough to improve their readiness and risk […]
Cybersecurity for Lawyers
Legal Cybersecurity In the world of law, continuing legal education (CLE) credits, or minimum continuing legal education (MCLE) credits, are ongoing professional education credits for attorneys that take place after their initial admission to the bar. These are available to American Bar Association (ABA) members in a continually growing library that can be accessed online […]
Focus On the Flaws
There are gaps in cybersecurity and the level of risk awareness as most of us work from home right now. And if heading back to an office environment happens for some, it isn’t going to be the majority of workers, at least anytime soon. With reports of productivity being higher from the work-from-home structure, many […]
Adjusting Your Business Model
New Frontier The recent conversation with Chris Wiser and Art Gross covered several issues that will continue to be “hot topics” regardless of where we stand regarding COVID-19. Procedure & Policy Whether you are going to continue to work remotely or have your team return to an office, the first thing that you’ll want to […]
Government Funds for Cybersecurity
State and local governments need funding and resources. For which thing are we talking about here? Respirators? Masks? No, but we are talking about another type of protection, for another unseen threat – cybercrime. With malicious activity already on a steady rise, the current crisis has brought some government offices to an even more heightened […]
Consumer Awareness
The numbers are on the rise – and in this case, we aren’t talking about COVID test results. In just a few months, the number of consumers that suspect they are at risk of identity theft has increased. In February of 2020, we saw numbers from CyberScout that out of 1050 employed adults in the […]
First Aid Kit
When this pandemic hit the world, the realization that most countries were not prepared for this also hit hard at the same time. Here in the United States, and all political opinions aside, we realized that despite our confidence in our economy, in our intelligence, in our standing as a “world leader” we were not […]
Microsoft Teams & GIFs
“Why do I always have to update my software?” “What is a patch update and why is it so important?” As an MSP, you know that it is hard enough to emphasize to every one of your clients and their employees the importance of strong security. You also know that keeping track of what they […]
Navigating Uncertain Times – Tips from Experienced CEOs
Small Business, Big Problems There is a multitude of problems that small businesses are facing today. Clients are working from home. This is happening as a matter of force, but also will likely evolve into a matter of choice. And all of this is happening by them essentially picking up their desks and going home […]
MSP Guide to Remote Security
A New Normal Working from home has become a new normal for you, your customers, and communities across the country, with dining room tables and shared spaces becoming the offices where we conduct business of all kinds. While this structure has many benefits to productivity and employee satisfaction when done correctly, the fact that most […]
Small Business Exposure
When you’re a small business, you hope for exposure. But recently, we learned that the Small Business Association (SBA) was the victim of an incident that exposed user data in a less than positive way. This occurred at the end of March, about two weeks into the official COVID-19 crisis for the United States, and […]
It’s All Too Much
Maintaining your sanity as a business owner during this time of global crisis is enough to make you want to crawl into bed and come out when it is over. But you know you have to push through and be the rock for your business, for your family, and for your clients. They are turning […]
Security Training and a Remote Workforce
Technology at the Forefront Many companies are finding that the technology projects that were put on hold, or on the back burner, have moved up to the top of the list of priorities. This is happening for a variety of reasons. Working from home is now a necessity, and so are the technical features and […]
Maintenance Mode
As an MSP, you are on call 24/7, even if your hours are not technically ‘round the clock’. As a business owner, this is amplified. You not only have a team to take care of and maintain, but you also have clients that need looking after as well. Ideally, all of these individuals are tethered […]
Securing Your Workforce
The arrival of COVID-19 restructured the world in countless ways. We have had to rethink how we socialize, live day-to-day, and in order to keep a lot of other parts of our lives running, we are having to rethink the way in which we run businesses. When we start to address how a business will […]
Safely Working Remotely
Effective Immediately As the Novel Coronavirus pandemic continues to greatly impact our nation, working from home is no longer an occasional benefit for many Americans, but is now a requirement for many businesses to continue operating safely and effectively. While working from home does come with its perks, there are many new cybersecurity risks created […]
Staying Calm in Times of Crisis
We’ve all been through challenging times personally and professionally, and in our heads and hearts, we know that “this too shall pass”. But with the COVID-19 virus being declared a pandemic by the World Health Organization, the time in which things pass may be longer than we’d like. As a business owner and MSP, your […]
The Untapped Vertical
The Untapped Vertical With the cannabis industry growing rapidly in the United States, and more states legalizing marijuana, this sector of business is one that can be explored as a vertical by MSPs to uncover the cybersecurity needs within. The profitable nature of this business means that they are growing exponentially not only as single […]
Children’s Social Security Numbers – An Easy Target
An Easy Target The value of stolen data increases when it is more easily manipulated and used. With a social security number, you can apply for identification, loans, and a range of other things that are valuable. If your credit score is high, the possibilities of what can be done are higher too, so who […]
Malvertising – What Is It?
Malvertising We are in a time when “fake news” has become a term thrown around so frequently it is now part of our vernacular. In fact, there are quite a few new terms and words borne from the rise of technology in our lives. One of those words is malvertising. What is malvertising? It’s when […]
When the Threat Is Inside the Building
Insider Threat A recent discovery of a breach of customer data at Fifth Third Bank uncovered a troubling truth. It wasn’t hackers outside the United States that had accessed the information, it was intentionally handed over by employees. Starting in 2018, personal information that included Social Security numbers, addresses, and account numbers were provided by a small […]
Equifax Breach Update
Made in China The 2017 Equifax breach brought individuals and one of the largest credit agencies to their knees. And now, over 2 years later, the United States Justice Department has charged four Chinese military officials as responsible parties in the breach. The Equifax breach compromised the personal information of nearly 150 million Americans, which […]
Learn to Audit Your Website – On-Demand
How to Get Found We know that running a business is more than ensuring that you have the right products to resell. It’s more than having the right people in place to sell, deploy and support those products. It is about having all of those pieces in place and then having the right people and clients […]
Double Rewards – The Rise in Ransom Payments
The rate at which data breaches are occurring is on the rise, this we know. But another corresponding rate on the rise is the dollar amounts that are being paid out in a ransomware attack. That number has risen by 104% for the fourth quarter of 2019. With an average of $84,000 being paid by […]
Windows 7 End of Life – the Beginning for New Scams
End of Windows 7 They say when one door closes another one opens, but in this case, it’s a window. On January 14th, 2020, Microsoft ended its support for Windows 7. Since Microsoft is no longer offering patches or security updates for vulnerabilities identified in Windows 7, hackers have a new way of gaining access […]
I Fell for a Phishing Scam
I just fell for a phishing email. Yep, the guy who builds services to protect clients from phishing emails was tricked by a phishing email! Now, I didn’t click on anything or give up confidential information but I did think a phishing email was a real email and forwarded it over to my staff to […]
2019 Breach Secure Now Blogs You May Have Missed
The team here at Breach Secure Now curated a lot of content in 2019 that we hope you found informative and thought-provoking when it came to your cybersecurity, both personally and professionally. We’ve put together a list of some of our favorite blogs that generated some tremendously positive feedback, addressing both you as a Managed […]
Evil Twin Wi-Fi
Evil Twin You’re out and about for any number of reasons. Traveling for work. Killing time while waiting for co-workers or family members. But you have some time and you have work that needs to get done. You pull out your phone or laptop, and all of the available wi-fi connections come up. Perhaps you’re […]
Overnight Experts Wanted
It isn’t breaking news that there is a steady – and alarming – rise in cybersecurity breaches and overall compromises in data and hardware. What is news is the lack of field experts that are available to deal with such a rise in demand. The field of ‘cybersecurity expert’ wasn’t even on the radar until […]
A Quick Glance Back – the Year in Cybersecurity
Nothing Random in this Ransom The end of the year always gives one reason to reflect back and review the past 12 months in a variety of ways. When we take a look at the year in cybersecurity, we can say with certainty, that there was nothing random about the pattern of attacks on businesses. […]
Smart Speakers, Are You Listening?
Alexa, What Are You Collecting? At the top of many holiday gift lists was a smart speaker device. They can make our life easier and more convenient with integration across all of our devices, taking efficiency to the next level. And it is likely we’ve all made a new friend in Alexa, Siri or their […]
The Rise in Cryptojacking
You can teach your clients how to spot a phishing email and hope that they take heed. You can warn them about the dangers of reusing passwords and basic cyber safety. But how do you educate and create awareness about something that is so slow-moving and “creepy” that most people don’t even realize it’s there […]
Getting Ahead of the Curve
Plan, people, policies Under the guidance of Maria Vullo, the New York Department of Financial Services (NYDFS) created and finalized cybersecurity regulations for the banks, insurance companies, money transmitters, credit unions, brokers, and mortgage bankers that they oversee. These companies and institutions run the gamut in size and sophistication of their systems. So, they looked […]
All Jolly, No Folly
Some of us attack and engage in our holiday shopping with a plan that rivals the most well thought out strategies. We scour weekly fliers, online ads, and research who will have the best price and coupon code for us to use. In order to shop smart, yes, keeping track of prices is important, but […]
No Personal Callers
If your phone rings and the caller id is UNKNOWN, you likely won’t answer. And scammers know that, so they’ve been cleverly hiding behind fake caller id numbers that are just a digit off from numbers that are familiar. So, you pause, and figure you better pick up “just in case”. The voice on the […]
Don’t Let Your Holiday Get Hacked
Prices may go down over the holidays but hacking incidents go up. Way up. While online shopping is something we all need to be diligent about when it comes to our personal cybersecurity, we need to be mindful of our working environment as well. Many employees take this time of year as an opportunity to […]
Cybersecurity in the Legal Industry
Modern Law Cybersecurity is something you have to think about at the individual level. At the healthcare level. And at your place of business. But what about when it comes to the businesses that support you? We make assumptions that there are policies and procedures in place, but never really verify them, we just trust […]
Election Season: Another Favorite for Scammers
Election season scams Political candidates will target voters to get their message across, and hackers will take advantage of the timing. With petitions, polls, and surveys being posted to get a sense of the political climate online or by telephone, citizens let their guard down and assume that the information being collected is for candidates […]
FBI Issues E-Skimming Warning
Skim This Over Recently the FBI issued a warning against e-skimming threats in response to the increase of attacks on small and medium-sized businesses, as well as against government agencies. This relatively new form of attack occurs when malicious code is placed within a site that accepts payments. The payments are rendered via credit or […]
Stripe Customers Targeted by Phishing Email
New Lures for Phishing A recent security alert from the online payment processing company Stripe has informed users of a phishing scam that shows just how fast hackers adapt to the efforts used to counter their tactics. Stripe is successfully used by small business owners, charities, and individual consumers for payment & donation processing. Recently, […]
Twitter Unintentionally Used 2FA Info for Targeted Ads
There’s a tweet that has Twitter aflutter. It includes the news that Twitter inadvertently sent users’ email addresses and phone numbers that were provided for security purposes, including two-factor authentication (2FA) phone numbers, to advertisers for targeted marketing. Their Tailored Audiences and Partner Audiences advertising systems were the lucky recipients of the lead information. These […]
The Little Things That Go a Long Way
It’s the Little Things When we think about cybersecurity, we might first imagine big data centers being guarded. Hackers working diligently in the shadows to compromise a large network or company and “maybe” get to our information at some point. But like all things in life, the little things add up. When it comes to […]
Words With Friends Hack Could Affect 218 Million Users
I’d Like a Word with You In fact, I’d like a word with all 218 million of you. Yes, that is the number of users in the popular game Words With Friends, the very one that was allegedly hacked by the Pakistani hacker, who uses the alias Gnosticplayers, on September 2nd of this year. This […]
Breach Secure Now Joins Far-Reaching Initiative to Promote the Awareness of Online Safety and Privacy for National Cybersecurity Awareness Month
October 1, 2019 — Breach Secure Now! today announced its commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit […]
Know Better – Do Better
Knowledge is power. And when it comes to fighting hackers, we need all the power we can collectively find. Educating your employees is the key to preventing cyberattacks, and Chubb’s Third Annual Cyber Report confirms this. With small businesses having a tendency to have limited funds and resources when it comes to “extras”, cybersecurity training […]
Payment Share App Safety
Instant Money…Maybe? The popular commercial asks, “What’s in your wallet?” and if you ask most anyone, it probably isn’t cash. The slow death of bill carrying was first hit by the credit and debit card. Then we were able to pay via our watches and smartphones. Now, you can just click an app and send […]
Hacker Helper
Are You a Hacker Helper? Here you go, let me get the door for you. Are you looking for access to my company’s network? One moment, let me get those login credentials for you. Of course, this sounds ridiculous. But in reality, it is exactly what is happening. Cybercriminals use advanced social engineering to get […]
Security Risk Rate vs. Spend Rate
Security Risk Rate vs. Spend Rate According to the 2019 SMB IT Security Report from Untangle, 80% of the small to medium-sized surveyed businesses identify IT security as a top priority. Of the 300 worldwide businesses in the study, 29% are spending less than $100 a month to address that concern. With an annual spend […]
A New Approach to Healthcare Cybersecurity
A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can make the sale of HIPAA compliance a tough one. Gone are the days of using Meaningful […]
Why We Need to Go Beyond HIPAA
HIPAA – Then & Now The Health Insurance Portability and Accountability Act, better known as HIPAA, has been around since 1996, with the intent to protect patients by properly handling their protected health information (PHI). With good intentions, HIPAA set forth to provide both security provisions and data privacy. The legislation was passed in the […]
Changing our Attitudes About Password Security
Live and Learn Most situations teach us lessons so that we don’t repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it’s off before doing it again. If you run out of gas on a highway, on future drives, you’ll be on the lookout for a […]
A New Kind of Cyber Threat to MSPs
There is a rise in awareness with small to medium-sized businesses (SMBs) of the threat to their cybersecurity. The problem is, it causes a subsequent rise in a risk factor to Managed Service Providers (MSPs). That risk is of them losing their business. According to a recent report conducted by Continuum and Vanson Bourne, “Underserved […]
Passwords: Why You Shouldn’t Reduce, Reuse & Recycle
The Excuses It’s not easy! It’s a lot to keep track of. I have no idea where I’ve used that before. There’s nothing in there that anyone would want. You want me to go back and change ALL of my accounts? These are all responses when a user is told that their passwords need changed […]
Why Cyber Insurance?
Filing and Smiling When is the last time that you filed a piece of paper? It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file cabinet had everything necessary to keep things humming […]
Private Sector Security
Can I Get Some Privacy in Here? If you’re talking about your online data, probably not. While businesses can create policies and procedures that limit the exposure of your private data, those lines are often blurred between professional and personal information. As a result of this, at least 25 states have laws that address the […]
The Real Cost of Cybercrime
What happens if your computer systems are hacked with ransomware? I think I’m covered by my insurance policy for that…(pause)…you scramble and try to find your policy documentation. It’s here somewhere. I’m sure I’m covered…I mean, I think we’re covered. I better make sure. You email your insurance agent…wait for the declaration page. Try to sort it […]
Ethical Hacking
The Ethics of Hacking In 2013 the then National Security Agency chief Keith Alexander spoke at the Black Hat cybersecurity conference about acknowledging, and protecting, ethical hackers. He discussed how through surveillance, these individuals would be uncovered, but also shielded, from legal jeopardy. Black Hat is a computer conference that focuses on security consulting, training, and […]
Breach Accountability
This week I saw a story link come across my newsfeed to “make sure you get your money from Experian” – it was referring to the compensation being offered as a result of their breach. You could either opt-in for credit monitoring or take the $125 payout. Regardless of what choice you made if you […]
These Numbers Don’t Add Up
If you are management, and your employee came to you with a proposal, you’d likely (hopefully) listen. What if that employee proposed to you that by keeping business as is, you’d likely lose millions of dollars – and possibly go under? But if you made one small change, you’d increase your odds of staying in […]
Make Time for Cybersecurity
This isn’t something you can pencil in and get to when you have time, cyber maintenance has to be something you commit to. We all have those moments when we realize that we had the best intentions to stick with something, but its priority fell by the wayside. We start off strong, then taper off […]
Here’s a Tip: Get a Head Start Before the Competition
Tip-Off You know how certain people seemed to have a way of predicting the future? They were ahead of the curve if you want to call it that… those who “got in on a good thing” before anyone else seemed to be aware? Consider this your lucky day, because we’re going to let you in […]
Hackers Using Social Profiles
Facebook Status: Away on Vacation Social media is great for a lot of things. Sharing photos, reconnecting with old friends, finding like-minded people and groups to share ideas and hobbies. But when does sharing become oversharing? Hackers gain access to your personal data via your profile and the information you share there – and you […]
Think Global, Act Local
When Global News Hits Home When you hear and watch news headlines, you can often tune out. It’s not happening here; it’s not affecting you directly. It’s a global issue right now. You’ll worry about it when things are closer to home. The problem is, by the time it hits home, we may have forgotten […]
The Future Is Here
Sunday funnies Remember the Jetsons? Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks? Flying cars aside, we aren’t too far off from the technology that seemed so unlikely and impossible. The future – it’s here. We live in a day and age where these advancements bring forth so many wonderful […]
Casting a Wide Net
In business, if you can cast a bigger net to reach a larger audience, it’s considered a good idea – a win. Unfortunately, hackers are now taking the same approach. With c-level executives offering a higher payoff when compromised, sending out phishing emails to the general population at a company will likely increase your odds […]
Addressing the Vertical – Cybersecurity in All Directions
And So, It Grows First, it was a widespread, if not generic, notion – you need to protect your personal information. Then we began to call it cybersecurity, and it was applicable to your business as well. It was still a concept that blanketed data generically – the overall message was that you need to […]
Ransomware Attacks up 105% in Q1 of 2019
Ransomware Is Not Randomware Gone are the days where you “might know” someone who has, or will, come under attack to a ransomware attack. The skyrocket in cases has come in at a 105% increase according to Beazley Breach Response (BBR) Services team which compared numbers against their 2018 data. Adding insult to injury, the […]
City Takeovers with RobbinHood Ransomware
RobbinHood – the Not so Heroic New Outlaw Stealing from the rich to give to the poor – in theory, the original Robin Hood had good intentions. There’s a new generation of him and his not so merry men and in this adaption, the takeovers are far less charitable. Using malware instead of arrows, this […]
Employee Buy-In for Security Awareness
Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of the business is in your hands. In that role, you know that each department feeds into the overall health of the business, and you need to ensure everyone, and everything […]
New York to California
Hot Spots New York and California. The mention of these two locations may have you conjuring up images of entertainment, celebrities, and people living the fancy life. Unfortunately, when we mention New York and California here, we’re not referring to anything glamorous. In fact, these two states are famous for something that they don’t want […]
The Blame Game
When a breach occurs, after the confusion and panic have passed (or merely settled in), the finger pointing starts. Generally, clients assume that since the anti-virus icon in the corner was there, they were protected. Firewall? Not sure what it is, but I get an alert every now and then about it, so it must […]
Cybersecurity: An Opportunity to Be the Hero
Missed Opportunities Missed opportunities. They come in many forms, shapes, and sizes. It might be personal, professional, or just for the fun of a moment. We all have them, and it likely still pains us to think about being wrong on any opportunity in life, especially those that would provide you with a way to […]
Senior Executives Pose a Danger to Cyber Security
You Can’t Teach an Old Dog…. or Can You? I remember trying to explain a VCR to older relatives. It wasn’t that they were less intelligent or unable to grasp the overall concept, it was that it wasn’t a necessary thing to learn in their opinion. They weren’t interested in the technology; they had fared […]
Business Email Compromise Incidents up 133%
Business email compromises (BEC) scams made a big statement in 2018, seeing a 133% increase over 2017, according to a recent report by Beazley Breach Response Services. The Beazley Breach Briefing looked at information gathered from investigations into more than 3,300 data incidents that were reported to Beazley in 2018. The investigations revealed that nearly […]
Cybersecurity Common Sense
How many times do I have to tell you? Sadly, if you’re reading this, odds are that you are an adult now, but you should know that I’m saying this with the same frustration that your parents had. We teach kids when they are younger by repetition. Lessons become so ingrained in our head that […]
Tax Refund Scams – Know What to Look For
Tis the season! You’re making mental plans with what is hopefully a generous tax refund and deciding what to do with the surplus of cash you’ll soon have on hand. Along the way from starting to submitting the paperwork, there are quite a few roadblocks to be aware of. Even if you aren’t getting a […]
The State of Compliance
We are all aware of federal compliance regulations when it comes to the privacy and security of our information. For example, you’d be hard pressed to find someone who hasn’t heard of HIPAA. Yet are you aware that regulations have been put in place at the state level that have the same goal – to […]
How to Create an Incident Response Plan
Data breaches are extremely common as technology continues to advance. Of those breaches, small and medium-sized businesses (SMBs) are a favored target for cybercriminals. In fact, more than 70% of attacks target small businesses, according to the National Cyber Security Alliance, and as many as 60% of hacked SMBs go out of business following a […]
Fake Check Scam
Being scammed can happen so easily today, but when you make it about a topic that many people can let their guard down with, the scam can happen much easier. What topic is that? We’re talking about money. Fake check scams have been around for quite some time, however, with the increase in online sales […]
Social Media Security Tips
Social media allows you to stay connected to people that you don’t get to see all of the time, and for that, it is a great thing. Family photos are easily shared, groups of like-minded people are able to gather together and share thoughts and ideas, and events are marketed to the masses for better […]
But You Changed Your Password – So How Did This Happen?
Anna Jones is an employee of Your Financial Services, Inc. and has used LinkedIn since 1996. It’s been a great tool for listing her employment history as well as communicating with former colleagues and potential employers to keep in touch. Over the years there’s been a lot of private information exchanged between her and these […]
Sextortion Scam
You get an email or text from what seems to be a legitimate email or phone number. Then you read the message: “Send bitcoin right away or else I am sending compromising photos or information to your friends and family.” If you’ve received this type of email, you’ve likely been a victim to a new […]
You Can Have My Heart – Not My Wallet
Love is in the air, and many people are turning to the internet to find it. We all know someone who has met their significant other online or at least is having a good time while trying to find them by dating a few people they’ve met through dating apps or services. But are they […]
The Great Pyramids You Don’t Want to Visit
“You need to check out this company I’m investing in… it’s a no-brainer.” “My friends are in this club, and it’s crazy, they basically paid a membership fee to join, and they are getting checks every month for doing nothing!” Have you ever been on the other end of one of these conversations? Congratulations, you’re […]
Mystery Shopper Scams
Today, many people are working more than one job, and with the flexible options of contractor work, or work as needed opportunities, you can likely find something that fits your schedule and financial needs. Maybe you are looking for a little bit of extra work to make ends meet, or a way to save up […]
Shining Light on the Dark Web
We’ve all heard of the Dark Web. The infamous private corners of the internet that are only accessible through special software that mask your IP address. You know, where you can do just about anything, from joining a book club to hiring an assassin. Maybe you want to play a chess match? The Dark Web […]
Ransomware is Alive and Well – Here Are 10 Tips to Help Protect Your Organization
Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months. Could the decline in publications citing ransomware as the cause of a data breach or loss of data indicate that cybercriminals […]
Build a Relationship, Not Just Your Quota
Too often, we look at our business relationship with clients as a linear connection. Every business or organization is a potential client, and you want to make that connection, that line, a direct link between you and them. Yet we often make the endpoint a purchase of our products or offerings. Do they need anti-virus? […]
Business Identity Theft Is on the Rise
Identity theft is not a new crime, in fact, criminals have been altering and improving their techniques to capture and use stolen information for years. While identity theft historically targets an individual consumer, an increasing number of criminals are now targeting businesses instead. What is identity theft? Identity theft occurs when someone pretends to be […]
Phishing Scams: A Growing Threat for Small Businesses
In a recent warning, the Federal Trade Commission (FTC) has cautioned consumers and small businesses about the continuing and growing threat of phishing scams. In the statement, the FTC has expressed that while cybercriminals continue to send out mass emails asking bluntly for personal information, they have become more sophisticated in their attempts. Small businesses […]
Azure Active Directory Synchronization Is Here!
Azure Active Directory Synchronization Is Here! The long-awaited enhancement is finally here! At Breach Secure Now!, we value partner feedback and use it to fuel the development and enhancement of our platform. We’ve made it our ongoing mission to implement new features to help our partners free up time, and grow their businesses. One of […]
Stumbling Across the Ultimate Security Prospecting Toolkit
I have run an MSP for 18 years and counting. I have learned a lot over the past 18 years, and I continue to learn new things every day. When I first started out I was good at technology but crappy at sales and marketing. Back in 2000, there were no organizations like Robin Robins […]
Employees: The #1 Cause of Data Breaches
As the multi-billion-dollar industry of cybercrime continues to thrive, employees remain the number one cause of cyber attacks. Despite cybercriminals relentlessly targeting and attacking organizations of all sizes, employees remain untrained on security awareness, leaving them to fight a battle they’re unprepared for. A 2017 study from Keeper Security and the Ponemon Institute revealed that […]
Use Security to Grow Your MSP Business
In an age where businesses are moving their data from in-house servers to the cloud, the complexity of how to appropriately care for that data is beginning to disappear. Although that may not sound like a bad problem to have for those organizations making the move, MSPs who were once extremely sought after to protect […]
Business Email Compromise Scams – Here to Stay
Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing. What is a BEC scam? In a BEC scam, the attacker gains access to an […]
Breached Records to Skyrocket with SMBs as the Biggest Targets
A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years. For cybercriminals to successfully compromise such an extreme number of records, significant […]
51% of SMB Leaders Think Their Business Isn’t a Target for Cybercriminals
Small businesses are often thought to be a forgotten entity when it comes to cybercrime. On the surface, it seems like a fair assumption that hackers wouldn’t target small businesses when there are large enterprises with much greater assets. Unfortunately, many small business leaders fall for this “I’m not a target” mentality, when in fact, […]
Dark Web Breach Assessment 2.0 – It’s Here!!!
Known for its anonymity, the Dark Web is a dangerous portion of the internet only accessible by using a special browser. This “secret spot” of the internet is intentionally hidden from search engines and uses masked IP addresses, creating a home for many websites dealing in illegal activities. The Dangers of the Dark Web The […]
The Psychology of Falling for a Phishing Email
Phishing is a cybercrime that has been around for many years, where targets are sent malicious emails claiming to be from a legitimate individual or organization to trick them into disclosing their sensitive information. Phishing emails remain a major threat today, however despite increased awareness of the cybercrime, cybercriminals continue to fool their targets into […]
Phone-Based 2FA: Not so Secure After All
In a time where data breaches have become the norm, there is no such thing as exercising too much caution when it comes to protecting your online assets, including your login credentials and access to accounts. Two-factor authentication (2FA), a method of confirming a user’s identity via combining two factors is widely accepted and recommended […]
Exactis Database Leaks 340 Million Records of Personal Data
There is a good chance you’ve never heard of the major marketing and data aggregation company Exactis, but that doesn’t mean they don’t know you. In fact, Exactis may know a great deal of your personal information, including your email address, your home address, your habits and hobbies, your children’s ages and genders if […]
Ransomware wreaks havoc on towns across the U.S.
Ransomware should be a concern for everyone, from small businesses to large corporations, although the likelihood of suffering from an attack may be dependent on various factors. Cybercriminals often select targets they believe to have the most attractive data and will likely respond quickly to their ransom demands, as well as targets who may have […]
Security Awareness Training – Time to Jump on the Bandwagon
Human-error; we talk about it all the time, but what exactly do we mean? Human-error occurs when an individual performs a task or does something with an unintended outcome. It’s easy to point the finger at employee’s as being an organization’s weakest link, but without appropriate security awareness training provided by the employer, how […]
Infographic: 10 Cyber Security Predictions for 2018 – Is your IT/OT Network Ready?
Click to enlarge Source: http://www.lanner-america.com
NY DFS Enforcing Cybersecurity Requirements
If you are a New York Financial Services organization and have not complied with the New York Department of Financial Services (DFS) Cybersecurity Regulations (23 NYCRR 500) you probably received a notice over the weekend. The notices were sent from Maria Vullo from the DFS with the subject: Failure to File Certification of Compliance. The […]
Small Business Cyber Security: The Ostrich Effect
The following blog first appeared on the Secure ERP blog. It is reprinted here with permission. Some small business owners will realize I’m describing them after they read this blog, but then those same c-level guys won’t see it and even if they do, they won’t read it, because they don’t want to know. […]
How Does the Dark Web Impact Small Businesses?
Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data is purchased and sold by cybercriminals; a place known as the “Dark Web”. An article […]
Good News: Ransomware declines Bad News: Coinminers increase
An article over at Bleeping Computer gives very good insight into the use of exploit kits. It seems that cybercriminals have started to move away from exploit kits that spread ransomware in favor of spreading cryptocurrency miners and information-stealing trojans. The exploit kit landscape has continued its downfall started in the summer of 2016 and […]
The Human Factor – The Weakest Link In Data Protection
Click for full image
Infographic: Cybersecurity: Fighting a Threat That Causes $450B of Damage Each Year
Click to Enlarge Courtesy of: Visual Capitalist
How Will Your Employees Get You Hacked?
Breaches are becoming increasingly common as cybercriminals continue to advance their skills and tactics to trick their victims into falling for their scams. While cybercriminals are remaining diligent in their efforts to carry out their attacks, small business owners continue to underspend on cybersecurity. An article on Entrepreneur looks at 5 things your employees are […]
What is Your Personal Information Worth on the Dark Web?
The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, it’s most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought and sold following a data breach or hacking incident. An article […]
Uncovering Password Habits: Are Users’ Password Security Habits Improving? (Infographic)
Infographic by Digital Guardian
New Dark Web Security Vulnerability Tool from Breach Secure Now! Lets MSPs Arm Clients in Fight Against Cyberattacks Caused by Employee Error
MORRISTOWN, N.J. (PRWEB) JANUARY 22, 2018 Dark Web Breach Assessment shows businesses which employees could cause a data breach With today’s release of its Dark Web Breach Assessment (DWBA) service, Breach Secure Now! (BSN) makes it possible for MSPs to strengthen their clients’ defenses against cybercriminals who exploit human errors to steal vital financial data […]
Study finds that 30% of SMEs lack an incident response plan
Cybersecurity issues have become very prevalent in the modern era, making headlines with their disasters and fines associated with them. While it may seem obvious that businesses should take precautions to protect themselves against these potential attacks, they have been slow to move forward with improving their security measures – especially small and medium-sized enterprises […]
Article: What Happens When Your Small Business Is Hacked
As cyber-attacks continue to sweep across the globe, the pressure is also increasing for IT providers and security professionals to keep security measures a top priority. An article on Entrepreneur explores the consequences of falling victim to a data breach and ways to prepare for one in the event it were to occur. While you […]
Don’t count on getting your data back even if you pay the ransom
Ransomware, a popular form of a cyber-attack usually involves criminals tricking their victims into installing malware. The malware causes serious issues for its victims by preventing them from accessing their files unless a ransom is paid to the criminal. An article on Inc. explains why ransomware is becoming more dangerous and how you can ensure […]
Is the massive global cyberattack enough to get people to care about their online security?
A major cyberattack took the world by storm Friday, hitting 150 countries and affecting 200,000 computers and over 20 hospitals in the U.K. This attack serves as a major wakeup call to both companies and consumers that securing systems and devices is vital. Although this incident should prompt immediate action in increasing security measures, if history repeats […]
Are hackers the new pirates? Billionaire superyacht owners can be held to ransom
Cybercriminals have no boundaries when experimenting with ways to successfully carry out a cyberattack. We have seen these criminals prove time after time just how creative they can be when choosing their victims, but who have these hackers chosen as their newest targets? Ransomware operators have now made targets of superyacht owners. Experts believe that […]
Couple loses their new home to email hackers
We’ve all heard of hackers going extreme lengths to steal information from their victims, but just how far will they go? A couple from North Carolina can attest to these unfathomable measures, having lost the contract on their new home to email hackers. An article on Graham Cluley depicts the nightmare suffered by the couple. […]
New Mexico, Tennessee and Virginia Pass New Data Breach Legislation
Three States Pass New Data Breach Legislation With data breaches increasing drastically across the United States, the need for states to have appropriate data breach legislation in place is vital. States are now stepping up to further explain, update and enact data breach laws to protect those affected by a breach. New Mexico, Tennessee and […]
Ransomware Increasingly Targets the Little Guys
Identified by the U.S. Department of Justice as 2017’s “biggest cyberthreat”, ransomware is making a name for itself across the board. While you may think, cybercriminals are only after large corporations like hospitals or banks, the focus is increasingly shifting towards targeting smaller organizations, who may be more vulnerable. An article on The Parallax […]
How to Protect Yourself from a Tax Scam
Tax season can be stressful. From filing to paying taxes, Americans have enough to worry about this time of year without adding identity theft and refund fraud to the equation. Unfortunately, tax scams have become so common in today’s world that not considering ways to protect yourself from tax scams would result in more […]
Americans receive mixed results in cybersecurity IQ
While it is true that Americans are becoming more aware of the need to protect their information online through methods such as utilizing strong passwords or being conscious of how they’re using public Wi-Fi, many still lack in key areas which could cause significant data breaches. Things like recognizing “phishing” emails or determining if a […]
Downtime of a Ransomware Attack – Costly Concern
We all know that ransomware can be detrimental to businesses, but just how much could an attack cost your business? According to a survey released by Imperva, on average a ransomware attack could cost businesses anywhere from $5,000 to $20,000 dollars per day. These figures were gathered with the help of 170 security professionals at […]
TV Show – Chicago Med a Ransomware Victim
You know ransomware is a real threat when it starts showing up on TV shows. Chicago Med is a victim of a ransomware attack on the hospital. It is time to be concerned in real life! [tvideo type=”youtube” clip_id=”LOQfWaKOSnU”]
Security Awareness Training is Essential for Small Businesses
According to research by the Ponemon Institute, approximately 80% of business data breaches are a result of human error. An article over on Entrepreneur explores ways to improve your small businesses security awareness. It only takes one careless employee to cause a big issue.” Entrepreneur provides a great example of how one employees’ simple mistake […]
Article: 35% of LinkedIn users’ passwords are weak enough to hack
Although it is no secret that some significant breaches have occurred with cybercriminals stealing user’s information and passwords from sites like LinkedIn and Yahoo, business users continue using passwords that do not offer adequate protection, according to a study by Preempt. An article over on Tech Republic goes into detail about the poor password practices of […]
MSPs need to offer their clients security solutions
In an article over at Business Solutions, Ellen Jennings, CEO of BEI, talks about cloud based security services that every MSP should offer. Here at BEI we have been using Breach Secure Now a platform that allows us to easily deliver data security training to our client employees under our brand. Our clients may also […]
Ransomware attacks keep growing and are costing businesses $1B
It is no secret that cybercrime has been increasing rapidly, but the statistics may surprise you. According to a report released by PhishMe, 2016 saw a massive increase in ransomware, toppling over 2015 by 600%. An article on TechRepublic explains how PhishMe came up with these statistics and what you can do to protect your […]
Protect Yourself from a Ransomware Disaster in 3 Simple Ways
As awareness of ransomware continues to grow globally, so does the sophistication and efforts of cybercriminals to successfully carry out these detrimental attacks on large and small businesses alike. An article on Entrepreneur gives us some great insight on the severity of ransomware as well as simple steps to protect yourself from falling victim. Small […]
Data breaches at smaller companies can be devastating
According to a Verizon study, data breaches at Small and Midsize Businesses (SMBs) occur more frequently than at larger companies. Another study found that the impact of a SMB breach could be devastating to the business. Find out more about the leading cause of SMB data breaches and what you can do to prevent a […]
The Breach Prevention Platform Has Been Launched!
On Friday we launched the Breach Secure Now! Breach Prevention Platform (BPP)! The BPP is a security service built for MSPs to help lower the chance of a client having a data breach. The MSP branded service includes: Simulated phishing attacks Continuous weekly security micro-training lessons Monthly magazine styled security newsletters Security policies Security risk assessments […]
MSPs: Defending Yourself from Data Breach Lawsuits
In the mistaken belief that their companies are not big enough to attract data thieves, small and midsize businesses notoriously resist tightening their IT security, ranking it as a low priority. Yet, when those same SMBs experience a data breach, they sometimes point the finger at their MSPs. Worse, they may file lawsuits and haul […]
Secure Now! and Trusted Metrics Webinar
We are excited to announce a webinar with our technology partner Trusted Metrics. The webinar is geared towards MSPs and will provide insight into monitoring clients’ networks from a security point of view. Find out more about Intrusion Detection Systems (IDS), Security Information Event Monitoring (SIEM) and more. Very good introduction on how an MSP […]
Free Wi-Fi is hard to resist for most people
In this “always connected” society being without Wi-Fi and Internet access makes a lot of people uncomfortable. Many people have heard about the dangers of free Wi-Fi but still that doesn’t stop a majority of people from connecting when it is available. According to an article over at ZDNet, the security company Avast setup open […]
Texas Print Shop Hit by Ransomware
Ransomware that crippled Hollywood Presbyterian Hospital made national headlines but ransomware continues to be a major menace for small to midsize businesses. A print shop in Lubbock, Texas was shut down last week due to ransomware. An employee opened an infected file and ransomware took control of the network. Questions Ransomware is rapidly becoming one […]
Free Security Training = More Security Sales
The following article appeared in ChannelPro Network Want to increase the number of security solutions your clients purchase? Give them something of value up front for free. By Art Gross In the spirit of “go-giving,” some MSPs provide valuable information to prospective customers that can make them more receptive to additional conversations later on. When […]
Top 5 Cyber Risks for Businesses
Travelers Insurance put together the top 5 cyber risks for businesses. There are no surprises in their list. They not only look at each risk but give associated costs with each risk. Let’s take a look at the top risks. Cyber Risk #1: Human Error: Lost and Stolen Laptops and Smartphones Everyone at one time […]
NYT: No Business Too Small to Be Hacked
The New York Times has a very good article titled: No Business Too Small to Be Hacked. We have been saying for the past few years that businesses of all sizes are vulnerable to cyber-crime. The more examples of real-life, documented cyber-crime the more awareness will be raised. Awareness of risks is critical because many […]
FCC fines Cox Communication $595,000 over data breach
According to an article over at The Register, the FCC has fined Cox Communication $595,000 over a 2014 data breach. Hacker disguised as IT support The breach in question occurred in August of 2014 when, the FCC says, a hacker called “eviljordie” phoned Cox customer service claiming to be an employee in the company’s IT […]