Mike R. Cleans Up Pretty Good

Members of the Bryley Systems team were working weekends to meet our commitments, reduce interpersonal contacts, and keeping our clients operational; but everyone at BRYLEY SYSTEMS made it possible!

The Office Move

An office move is a complicated process, with many moving parts and plenty of vendors operating on inter-dependent schedules.

Over a Friday night and Saturday morning, our dedicated team members setup the network equipment and end-user workstations at our clients’ new facility; their efforts allowed the clients’ employees to return to work, with little disruption.

The Workstation Upgrade

Similarly, the deployment of upgraded equipment depends on a coordinated team effort to prepare, configure, deliver, unbox, deploy, and setup the new equipment, while sanitizing touched surfaces, and then removing, transporting, and preparing the old equipment for recycling.

On a recent Saturday, our team’s mission was to replace over 15 workstations, basically deploying new Windows 10 workstations, while recycling the old equipment.

The team worked together through the morning and most of the afternoon – in a safe and socially-responsible manner (also in an extremely clean environment, as shown by the photo of our Senior Technician, Mike, in our clients’ clean room) – to get the job done. (This client is an essential manufacturer that delivers the world’s finest specialty surgical products.)

This was a true team effort at a difficult time that included everyone at Bryley Systems; our clients were extremely appreciative, and we are proud of what we accomplished!



Can Machine Learning Save Us from Us?

Among the top headlines in Google News’s Technology section today was criminal hackers use of AI (Artificial Intelligence) and its subset, ML (Machine Learning)1. Opening the article, I found a synopsis of a Tech Republic report, “Cybersecurity: Let’s Get Tactical,” in which the authors give ten ways cybercriminals are attacking with AI2 including

  • phishing attacks, in which, upon gaining credentialed access, automatic scripts can wreak havoc, including draining bank accounts
  • credential stuffing and brute force attacks, in which AI systems try passwords — and password possibilities — on many websites
  • bulletproof hosting services that use automation to hide the tracks of malicious websites, so they can’t be stopped by law-enforcement, or often flagged by network scanning tools

The fact is, it’s an arms race. Both malware and criminal sites would be pretty quickly and easily identified on a network by the nature of their activity. So the criminals try to disguise their malware in benign code and their sites in bulletproof hosting schemes. The way they keep the ruse going is through machine learning adapting to changing circumstances.

Meet Frank Walek

Frank Walek has been recently hired as an IT Support Technician to operate Bryley Systems’ dispatch center.

Mr. Walek graduated from the College of the Holy Cross, Worcester and has been working in customer service and support for the past ten years. He has worked for non-profit organizations and special education programs, developing a reputation for excellent customer service and always going above and beyond to help others. In 2019, Frank completed a Google certificate program for IT support professionals and is merging his passion of helping others with technical services at Bryley Systems.