Entries by Garin Livingstone

Assessing Risk Helps Ensure Business Continuity

No construction company would undertake a building without first evaluating and then understanding how it will handle the project’s risks. But that is how a lot of Information Technology is executed. Does that make sense? Think for a moment how much of your employees’ livelihoods and the services and products your organization provides depend on networked computing. Isn’t that how you store and access your intellectual property, client information and business processes?

And do you keep building higher, putting more strain on the network? For instance does an Internet-of-Things machine need to be granted access to your network? Or does someone’s personal device need to log-into your system? … [5 min. read]

Bryley Systems Named to 2021 Channel Futures MSP 501

The MSP 501 designation is an IT industry signifier that recognizes best-in-class operational efficiency and business models. The MSP 501 award is a sixty point, independent audit verifying that Bryley is a fit and stable operation from which to provide its clients dependable business continuity … [2 min. read]

Responding to Cloud-Based Email Server Attacks

“Just awful” –the opinion on the state of a Fortune 500 company’s security by the hacker who stole fifty million credentials

Lately organizations have been choosing to migrate their email networks to cloud-based email providers like Microsoft 365. These cloud-based systems are appealing with their low cost per user monthly billing, ease of management and built-in security. But what are the risks these businesses can expect on a cloud-based email platform? … [5 min. read]

Scott Gold Recognized for Twenty Years of Service

Senior Network Engineer Scott Gold has been recognized for his twenty years of service at Bryley Systems. Scott has designed and built many Bryley clients’ servers and and networks. Because of his experience in computer environment design Scott is a great problem-solving resource. Scott’s manager Kristin Pryor called Scott, “a skilled contributor and a mentor to other techs … [3 min. read]

Why Don’t Businesses Use MFA?

The US Cybersecurity and Infrastructure Security Agency recommends that small- to medium-sized organizations implement MFA (multi-factor authentication). Multi-factor authentication refers to when you use two or more of the following factors … [6 min. read]