Entries by Garin Livingstone

Protect your mobile device – Part 3: Enforcement, Tools, and First Steps

We have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security.   Enforcement   Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]

Google moves Postini spam-filtering into Google Apps

Google purchased Postini in 2007 to provide spam-filtering and related security and compliance services to Google enterprise-services clients; they initially branded Postini under Google Messaging, but have now integrated Postini into Google Apps for Business.  They will retire the Postini brand name in 2013.   Users of Google Message Security (spam filtering) will be transitioned […]

Microsoft Streamlines Windows Server Options, Kills Versions for Home and Small Business

Microsoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]

Protect your mobile device – Part 2: Training

Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data   Authenticate and encrypt […]

DNS-changing malware in the news this week

A well-publicized, DNS-changing malware was detected and temporarily thwarted by the FBI late last year.  The FBI will remove its temporary fix at midnight on Monday, July 9th, which could cause any remaining infected machines to lose their Internet connection.   Windows-based PCs managed by Bryley Systems under our Comprehensive Support Program are not at risk.  The […]

Bryley Referral Program

Sticking your neck out to vouch for Bryley is, as far as we’re concerned, the ultimate compliment. Because of that, everyone you refer is treated with respect, kindness and good communication whether or not Bryley can help them with IT.

Protect your mobile device – Part 1

The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices   In addition, BYOD (Bring Your Own Device) […]