Entries by Guest Author

Another Annoying Robocall. Help!

How many times have you answered your phone only to hear a recorded message instead of a live person?  It’s annoying, it’s illegal and it’s known as a robocall.  “The FTC has seen a significant increase in the number of illegal robocalls because internet-powered phone systems have made it inexpensive and easy for scammers to […]

Refund and Recovery Scams

The following information was posted by the FTC on their website. Scam artists buy and sell “sucker lists” with the names of people who already have lost money to fraudulent promotions. These crooks may call you promising to recover the money you lost or the prize or merchandise you never received — for a fee […]

“Free” Security Scan? Beware of Scammers.

“Messages telling you to install and update security software for your computer seem to be everywhere. So you might be tempted by an offer of a “free security scan,” especially when faced with a pop-up, an email, or an ad that claims “malicious software” has already been found on your machine. Unfortunately, it’s likely that […]

Beware of Tech Support Scams!

There are scammers who will call and claim to be a computer tech associated with well-known companies like Microsoft or Apple.  Other scammers send pop-up messages that warn about computer problems.  They say they’ve detected viruses or other malware on your computer.  They claim to be ‘tech support’ and will ask you to give them […]

Android Security

In the past several months, Android security issues have become part of techie news.  Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they’re having more success than ever before. There are some things you can do to tighten up your Android security, and most of the features […]

Chrome, Edge and Firefox. Supporting Biometrics.

Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication which should give users more protection against phishing and may reduce the need for passwords. These internet browsers are expected to allow users to sign into online profiles through facial recognition, fingerprint scanners and voice authentication. Online biometric authentication through these browsers […]

Case Study: WRTA Turns to Bryley to Help Coordinate Move to New Facility and Deploy New Computer Infrastructure

The Company: Worcester Regional Transit Authority The Worcester Regional Transit Authority (WRTA) services the City of Worcester and 36 surrounding towns with a bus fleet that includes all-electric buses and many diesel-electric hybrid buses. As the second-largest regional transit authority in Massachusetts, WRTA features a real-time bus arrival information system that includes the latest advancements […]

Case Study – To Support Major Company Expansion, Leaktite Relies on Bryley Systems to Design and Coordinate New IT Infrastructure Deployment

The Company: Leaktite Corporation Leaktite Corporation manufactures and distributes metal, plastic and paper containers, buckets, pails and trays for a wide variety of industrial, commercial and consumer applications. From its establishment in 1945, the company has achieved solid growth based on experience and the flexibility to move with the times. Leaktite supports product development with […]

Making Working Remotely Work

By Lawrence Strauss, Strauss and Strauss Working remotely is trending. Yet, according to the American Community Survey, while telecommuting dramatically rose 79 percent between 2005 and 2012, telecommuters made up only 2.6 percent of the American work force; a pretty small percentage, and the true number is difficult to really get a handle on, as […]