{"id":1466,"date":"2022-02-14T18:16:00","date_gmt":"2022-02-14T18:16:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/bsn-security-training\/"},"modified":"2023-05-12T09:58:17","modified_gmt":"2023-05-12T09:58:17","slug":"bsn-security-training","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/","title":{"rendered":"Breach Secure Now: education for your security-hesitant clients"},"content":{"rendered":"<p>Solving nonprofit-specific challenges through purpose-built technology.<\/p>\n<p>Today\u2019s cyber threat landscape is continually expanding, making it riskier than ever.<\/p>\n<p>Recent <a href=\"https:\/\/www.pax8nebula.com\/m\/770723d63cf231d0\/original\/ESG-eBook-Pax8-MSSP-October-2021-Final.pdf\" target=\"_blank\" rel=\"noopener\">ESG research highlights that 60% of MSP partners reported a breach within the last year. Phishing controls and end-user training have been identified as top security priorities for MSPs.<\/a><\/p>\n<p>With &#8220;ransomware&#8221; and &#8220;phishing&#8221; now part of our everyday lexicon, it\u2019s easier for managed service providers (MSPs) to educate clients on the importance of cybersecurity. Convincing them to invest in training their team can be more difficult.<\/p>\n<p>A critical part of a cybersecurity plan is a <a href=\"https:\/\/www.breachsecurenow.com\/2021\/08\/18\/why-you-should-do-a-security-risk-assessment\/\" target=\"_blank\" rel=\"noopener\">security risk assessment <\/a>to get a complete picture of risks and vulnerabilities your client is exposed to. One area often overlooked is the human factor. Social engineering can lead to one person thwarting an entire organization\u2019s security plan. Organizations spend millions on security, but decisions made and actions taken by <a href=\"https:\/\/www.shrm.org\/resourcesandtools\/hr-topics\/technology\/pages\/data-breach-report-emphasizes-cybersecurity-human-element.aspx\" target=\"_blank\" rel=\"noopener\">employees have the biggest impact on protecting a company. <\/a>A human element enabled more than 85% of 2020 breaches among 20,000 studied by Verizon.<\/p>\n<p>Most cyberattacks \u2013 <a href=\"https:\/\/www2.deloitte.com\/my\/en\/pages\/risk\/articles\/91-percent-of-all-cyber-attacks-begin-with-a-phishing-email-to-an-unexpected-victim.html\" target=\"_blank\" rel=\"noopener\">91% \u2013 begin with a phishing email to an unsuspecting victim<\/a>. Account takeover attempts grew <a href=\"https:\/\/abnormalsecurity.com\/resources\/threat-report-q3-2021-brute-force-attacks\" target=\"_blank\" rel=\"noopener\">nearly 700% <\/a>in Q3 of 2021. Late 2021 saw nearly $600 million ransomware-related transactions. That is expected to double in 2022 and has attracted the attention of the U.S. Treasury as <a href=\"https:\/\/thecrimereport.org\/2021\/10\/21\/u-s-treasury-tags-ransomware-as-growing-threat-to-economy\/\" target=\"_blank\" rel=\"noopener\">a direct threat to the U.S. economy<\/a>.<\/p>\n<p>Ensuring your clients understand how critical it is to educate their employees can set the stage for awkward conversations about how their people are a significant part of the risk landscape. Management may have difficulty accepting that <a href=\"https:\/\/www.cybersecuritydive.com\/news\/insider-threat-malicious-negligent-employee\/617656\/\" target=\"_blank\" rel=\"noopener\">individuals on their team may unknowingly compromise the business\u2019s security<\/a> and its viability.<\/p>\n<p>To help you have a productive discussion about this critical topic and keep your clients\u2019 systems secure, Breach Secure Now (BSN) offers a suite of products and end user training tools. These allow you to perform detailed security risk assessments and provide in-depth, ongoing training for their internal staff to shift team members from risk factors to proactive participants in the organization\u2019s cybersecurity plan.<\/p>\n<h3>BSN\u2019s Partner Program<\/h3>\n<p>It\u2019s understandable your clients and prospects may be reticent to invest in security awareness training. They may not see the vulnerabilities in their business. However, <a href=\"https:\/\/www.breachsecurenow.com\/partner-subscription\/\" target=\"_blank\" rel=\"noopener\">BSN\u2019s partner program<\/a> enables you to demonstrate what a breach can cost them to help them understand this is a necessary investment\u2014 not an expense.<\/p>\n<p>The partner program includes tools necessary to help set the stage on the need for end-user training. Dark web scans can identify whether a client\u2019s data and information are at risk on the dark web. Phishing simulations test a client\u2019s employees to identify the vulnerabilities that already exist. But MSPs need a new way to clearly show prospects and clients the human security risks present in their organization\u2019s security stack.<\/p>\n<p>This is the purpose of BSN\u2019s Baseline Employee Cybersecurity Assessment (BECA). It gives you a place to start the conversation and evaluate the true risk your clients are facing. It tests your client\u2019s knowledge around cybersecurity and shows what training they need to lower their risks of falling victim to cyberattacks.<\/p>\n<h3>What is BECA?<\/h3>\n<p>The BECA assessment sends a unique URL to each team member at a prospect or client. Individuals answer questions in six categories. Results, including the time to complete the assessment, go into a report for management. An average score for the team along with individual scores highlight where, individually and collectively, risk is highest.<\/p>\n<p>The employee risk score establishes a human security risk baseline and illustrates where knowledge is lacking. This objective tool makes the need clear and provides context to tailor a unique training program for each organization.<\/p>\n<p>BECA\u2019s six areas of focus are:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/2021\/12\/29\/breaking-down-the-baseline-employee-cybersecurity-assessment-general-cybersecurity-knowledge\/\" target=\"_blank\" rel=\"noopener\">-General Cybersecurity Knowledge<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/2022\/01\/04\/breaking-down-the-baseline-employee-cybersecurity-assessment-phishing\/\" target=\"_blank\" rel=\"noopener\">-Phishing Awareness<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/2022\/01\/17\/breaking-down-the-baseline-employee-cybersecurity-assessment-password-hygiene\/\" target=\"_blank\" rel=\"noopener\">-Password Hygiene<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/2022\/01\/10\/breaking-down-the-baseline-employee-cybersecurity-assessment-handling-pii\/\" target=\"_blank\" rel=\"noopener\">-Handling PII<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/2022\/01\/26\/breaking-down-the-baseline-employee-cybersecurity-assessment-social-media\/\" target=\"_blank\" rel=\"noopener\">-Social Media<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.breachsecurenow.com\/webinar-human-security-demand\/\" target=\"_blank\" rel=\"noopener\">-Working Remotely<\/a><\/li>\n<\/ul>\n<p>BECA results offer a road map of how to create a more secure environment. Cybersecurity Awareness Training makes it easy to automate educating teams and transforming human risk factors into a new line of cybersecurity defense.<\/p>\n<p>A complete approach designed for each client organization can include, as needed:<\/p>\n<ul>\n<li>-Cybersecurity Training<\/li>\n<li>-HIPAA Privacy &amp; Security Training<\/li>\n<li>-Dark Web Monitoring<\/li>\n<li>-Simulated Phishing<\/li>\n<li>-Weekly Micro Training<\/li>\n<li>-Monthly Security Newsletter<\/li>\n<li>-Employee Vulnerability Assessment (EV)<\/li>\n<li>-Catch Phish Outlook Plug-In<\/li>\n<li>-Annual Risk Assessment<\/li>\n<li>-Policy &amp; Procedure Templates<\/li>\n<\/ul>\n<p>Sell a broader scope of services and build relationships with existing clients. Expand services to offer prospects a turnkey, end-to-end approach to cyber security. Build trust and empower management to show team members they are valued.<\/p>\n<h3>ROI for MSPs and Your Clients<\/h3>\n<p>As an MSP, you realize the tangible benefits from providing security risk assessments and awareness training. Financial results include more revenue from existing clients through additional services and closing more deals thanks to compelling data to show prospects why they need security awareness training.<\/p>\n<p>For your clients and prospects, it can be difficult to assess the value or cost savings from security breaches that don\u2019t happen. However, even conservative estimates are striking. HIPAA violations can incur fines of a minimum of $50,000. Recovering from successful <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">malware attacks can cost more than $1 million<\/a>.<\/p>\n<p>Companies that suffer data breaches not only <a href=\"https:\/\/www.hipaajournal.com\/ponemon-study-reveals-impact-data-breaches-organizations-reputation-8846\/\" target=\"_blank\" rel=\"noopener\">lose revenue, <\/a>they incur damage to their reputations. 31% of consumers report ending relationships with organizations that exposed<\/p>\n<p>their data, while 65% say they lost trust in the company. A two percent customer loss rate leads to an average revenue loss of almost $3 million. Nearly <a href=\"https:\/\/www.csoonline.com\/article\/3019283\/does-a-data-breach-really-affect-your-firm-s-reputation.html\" target=\"_blank\" rel=\"noopener\">90% of customers <\/a>are hesitant to use a company that has been breached.<\/p>\n<p><a href=\"https:\/\/ostermanresearch.com\/2019\/08\/19\/orwp_0313\/\" target=\"_blank\" rel=\"noopener\">Osterman Research <\/a>found employees who receive security awareness training are significantly better at recognizing and avoiding security threats. <a href=\"https:\/\/www.ponemon.org\/\" target=\"_blank\" rel=\"noopener\">Ponemon Institute <\/a>found 79% of organizations believe security training is beneficial for employee performance and job satisfaction, which can boost morale and retention.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-6254 size-full alignleft\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/it-professionals-cyber-attack-data-table.jpg\" alt=\"it professionals cyber attack data table\" width=\"290\" height=\"182\" \/><\/p>\n<p><strong><em>P<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>r<\/em><\/strong><strong><em>c<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>n<\/em><\/strong><strong><em>t<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>g<\/em><\/strong><strong><em>e<\/em><\/strong> <strong><em>o<\/em><\/strong><strong><em>f<\/em><\/strong> <strong><em>I<\/em><\/strong><strong><em>T<\/em><\/strong><strong><em>\/<\/em><\/strong><strong><em>s<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>c<\/em><\/strong><strong><em>u<\/em><\/strong><strong><em>r<\/em><\/strong><strong><em>i<\/em><\/strong><strong><em>t<\/em><\/strong><strong><em>y<\/em><\/strong> <strong><em>p<\/em><\/strong><strong><em>ro<\/em><\/strong><strong><em>f<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>s<\/em><\/strong><strong><em>s<\/em><\/strong><strong><em>i<\/em><\/strong><strong><em>on<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>l<\/em><\/strong><strong><em>s<\/em><\/strong> <strong><em>r<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>po<\/em><\/strong><strong><em>r<\/em><\/strong><strong><em>t<\/em><\/strong><strong><em>i<\/em><\/strong><strong><em>n<\/em><\/strong><strong><em>g<\/em><\/strong> <strong><em>e<\/em><\/strong><strong><em>m<\/em><\/strong><strong><em>p<\/em><\/strong><strong><em>l<\/em><\/strong><strong><em>o<\/em><\/strong><strong><em>y<\/em><\/strong><strong><em>ee<\/em><\/strong><strong><em>s<\/em><\/strong> <strong><em>a<\/em><\/strong><strong><em>s<\/em><\/strong> <strong><em>&#8220;<\/em><\/strong><strong><em>c<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>p<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>b<\/em><\/strong><strong><em>le<\/em><\/strong><strong><em>&#8220;<\/em><\/strong> <strong><em>o<\/em><\/strong><strong><em>r<\/em><\/strong> <strong><em>&#8220;<\/em><\/strong><strong><em>v<\/em><\/strong><strong><em>e<\/em><\/strong><strong><em>r<\/em><\/strong><strong><em>y<\/em><\/strong> <strong><em>c<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>p<\/em><\/strong><strong><em>a<\/em><\/strong><strong><em>b<\/em><\/strong><strong><em>le<\/em><\/strong><strong><em>&#8220;<\/em><\/strong> <strong><em>o<\/em><\/strong><strong><em>f <\/em><\/strong><strong><em>recognizing cyber attacks:<\/em><\/strong><\/p>\n<p>(<a href=\"https:\/\/resources.infosecinstitute.com\/topic\/the-roi-of-security-awareness-training-2\/\" target=\"_blank\" rel=\"noopener\">https:\/\/resources.infosecinstitute.com\/topic\/the-roi-of-security-awareness-training-2\/<\/a>)<\/p>\n<h2>Help Clients &amp; Win Prospects<\/h2>\n<p>The BSN Partner Program is designed specifically to help your customers, and in turn boost trust, leading to more converted prospects.<\/p>\n<p>Begin your conversation with prospects or clients around the risks the BECA exposes. Discuss the value of security awareness training, dark web scanning, phishing simulations, and more. As a partner, BSN provides everything you need to help your customers avoid data breaches while improving their trust in you, and in term increasing your bottom line.<\/p>\n<p>As a BSN partner it is simple to expand your service offerings, be a more helpful partner for your clients, and differentiate your organization from competitors. We look forward to speaking with you about how to get started.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Solving nonprofit-specific challenges through purpose-built technology. Today\u2019s cyber threat landscape is continually expanding, making it riskier than ever. Recent ESG research highlights that 60% of MSP partners reported a breach within the last year. Phishing controls and end-user training have been identified as top security priorities for MSPs. With &#8220;ransomware&#8221; and &#8220;phishing&#8221; now part of [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-1466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-management","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Breach Secure Now: education for your security-hesitant clients - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/bsn-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breach Secure Now: education for your security-hesitant clients - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/bsn-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-14T18:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-12T09:58:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Breach Secure Now: education for your security-hesitant clients\",\"datePublished\":\"2022-02-14T18:16:00+00:00\",\"dateModified\":\"2023-05-12T09:58:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/\"},\"wordCount\":1154,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/breach-secure-now.jpg\",\"articleSection\":[\"Business management\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/\",\"name\":\"Breach Secure Now: education for your security-hesitant clients - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/breach-secure-now.jpg\",\"datePublished\":\"2022-02-14T18:16:00+00:00\",\"dateModified\":\"2023-05-12T09:58:17+00:00\",\"description\":\"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/breach-secure-now.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/breach-secure-now.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"breach secure now\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/bsn-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Breach Secure Now: education for your security-hesitant clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breach Secure Now: education for your security-hesitant clients - Pax8 Blog","description":"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Breach Secure Now: education for your security-hesitant clients - Pax8 Blog","og_description":"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.","og_url":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/","og_site_name":"Pax8 Blog","article_published_time":"2022-02-14T18:16:00+00:00","article_modified_time":"2023-05-12T09:58:17+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Breach Secure Now: education for your security-hesitant clients","datePublished":"2022-02-14T18:16:00+00:00","dateModified":"2023-05-12T09:58:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/"},"wordCount":1154,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg","articleSection":["Business management","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/","url":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/","name":"Breach Secure Now: education for your security-hesitant clients - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg","datePublished":"2022-02-14T18:16:00+00:00","dateModified":"2023-05-12T09:58:17+00:00","description":"Most network breaches start with social engineering. Breach Secure Now tools help MSPs educate clients and prospects on security risks and give them solutions.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/bsn-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/breach-secure-now.jpg","width":2000,"height":1333,"caption":"breach secure now"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/bsn-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Breach Secure Now: education for your security-hesitant clients"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1466"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/354"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}