Entries by Guest Author

Cyber Liability Risk…protect your business

While there are many publicized hacking attacks against large companies reported in the news, smaller companies face increasing computer liability risks, too. Almost every business uses technology in some way, and your business can be held liabile if certain types of information are compromised. It doesn’t have to be a hacking attack; it could be the loss or theft of a smartphone or laptop that could expose your business to liability…

Cybersecurity – Don’t Overlook These Risks Within Your Organization

It’s easier than you think for organizations and their leaders to overlook cybersecurity.  Unfortunately, the nature of the threat means some of the biggest worries for your organization might actually be out in plain sight. Here are five cybersecurity risks that are regularly overlooked. Inconsistent or Nonspecific Cybersecurity Training. In many cases, people are the […]

Another Annoying Robocall. Help!

How many times have you answered your phone only to hear a recorded message instead of a live person?  It’s annoying, it’s illegal and it’s known as a robocall.  “The FTC has seen a significant increase in the number of illegal robocalls because internet-powered phone systems have made it inexpensive and easy for scammers to […]

Refund and Recovery Scams

The following information was posted by the FTC on their website. Scam artists buy and sell “sucker lists” with the names of people who already have lost money to fraudulent promotions. These crooks may call you promising to recover the money you lost or the prize or merchandise you never received — for a fee […]

“Free” Security Scan? Beware of Scammers.

“Messages telling you to install and update security software for your computer seem to be everywhere. So you might be tempted by an offer of a “free security scan,” especially when faced with a pop-up, an email, or an ad that claims “malicious software” has already been found on your machine. Unfortunately, it’s likely that […]

Beware of Tech Support Scams!

There are scammers who will call and claim to be a computer tech associated with well-known companies like Microsoft or Apple.  Other scammers send pop-up messages that warn about computer problems.  They say they’ve detected viruses or other malware on your computer.  They claim to be ‘tech support’ and will ask you to give them […]

Android Security

In the past several months, Android security issues have become part of techie news.  Hackers are developing a record number of cyberattacks that could compromise your mobile operating system and they’re having more success than ever before. There are some things you can do to tighten up your Android security, and most of the features […]

Chrome, Edge and Firefox. Supporting Biometrics.

Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication which should give users more protection against phishing and may reduce the need for passwords. These internet browsers are expected to allow users to sign into online profiles through facial recognition, fingerprint scanners and voice authentication. Online biometric authentication through these browsers […]

Case Study: WRTA Turns to Bryley to Help Coordinate Move to New Facility and Deploy New Computer Infrastructure

The Company: Worcester Regional Transit Authority The Worcester Regional Transit Authority (WRTA) services the City of Worcester and 36 surrounding towns with a bus fleet that includes all-electric buses and many diesel-electric hybrid buses. As the second-largest regional transit authority in Massachusetts, WRTA features a real-time bus arrival information system that includes the latest advancements […]

Making Working Remotely Work

By Lawrence Strauss, Strauss and Strauss Working remotely is trending. Yet, according to the American Community Survey, while telecommuting dramatically rose 79 percent between 2005 and 2012, telecommuters made up only 2.6 percent of the American work force; a pretty small percentage, and the true number is difficult to really get a handle on, as […]