Entries by Lawrence Strauss

Mah Bad

“People are one of the weakest links” in securing technology. Still organizations invest ten to twenty times the amount to secure the equipment and networks than they invest, “ensuring all people [using the technology] understand the organization’s IT security policy, procedures, and practices [4.5 min. read]

The Truth About Your Email Host and Archiving

Whether your business is using G-Suite, Office 365 or another email server, the fine-print agreements release those providers from liability for anything happening to your email data. The reality is Microsoft, Google, etc. are liable for the infrastructure on which your data resides (i.e. if their data center goes down, they’re going to do what they can to get it back and running). They are not answerable for your data, including emails [4.5 min. read]

Email Encryption That Works

How many times have you heard that email is not secure? But it was always too hard to do much about it. Well, it’s still not secure: The security exposures are on the devices that have the account […]

Continuous Email Service

Just as a business relies on email to do its work, it needs to make sure its email service is uninterrupted; and to maintain the information in its emails. The fact is there’s actually a lot going on under email’s hood

Avoiding Cybercriminal Exploitation of COVID-19

Who isn’t looking for some answers? Are the risks of the virus serious for me and the people I’m around? Which government leaders have it right? Am I being asked to go back to work in an unsafe environment? How will the economy impact me and those I care about? This is the kind of uncertainty the unscrupulous prey on.

Is Bryley a Technology Company? Sorta

Don’t get me wrong, Bryley loves tech. We love what it brings us, for example:

1 Access to our collective knowledge
2 The extension of our minds 1
3 Time Travel 2 — the time it used to take to communicate with someone else has been erased
4 Collaboration tools
5 Productivity boosters
6 Twitch and Snood

But Bryley sees its function as helping a business run smoothly, reliably, continuously. And our tool to get this done is technology expertise.

Bryley’s a Managed Service Provider — Which Is What Exactly?

A Managed Service Provider (MSP) oversees a company’s computer network infrastructure. MSPs deliver ongoing support that can include the setup, installation, configuration and maintenance of the network and its assets. An MSP can augment a business’s internal IT department and provide higher-level, rarer skills that may not be available to the internal IT department. Because MSPs are proactive, bringing centralized systems management solutions, an MSP can give unmatched peace of mind, that a business’s functioning is secure. 3 The following is not comprehensive, but are some of the areas in which MSPs help.

If This Is Week Seven It Must Be Tuesday

While most of the Bryley team works from the Clinton office, I’m physically distanced, writing at home. And as the days have grown to months in this work-from-home-if-you-can-work-from-home world, our perspectives change as our settling-in has changed us. So here’s a bit of remote work advice, for the times they are still a-changin’.

Can Machine Learning Save Us from Us?

Among the top headlines in Google News’s Technology section today was criminal hackers use of AI (Artificial Intelligence) and its subset, ML (Machine Learning)1. Opening the article, I found a synopsis of a Tech Republic report, “Cybersecurity: Let’s Get Tactical,” in which the authors give ten ways cybercriminals are attacking with AI2 including

  • phishing attacks, in which, upon gaining credentialed access, automatic scripts can wreak havoc, including draining bank accounts
  • credential stuffing and brute force attacks, in which AI systems try passwords — and password possibilities — on many websites
  • bulletproof hosting services that use automation to hide the tracks of malicious websites, so they can’t be stopped by law-enforcement, or often flagged by network scanning tools

The fact is, it’s an arms race. Both malware and criminal sites would be pretty quickly and easily identified on a network by the nature of their activity. So the criminals try to disguise their malware in benign code and their sites in bulletproof hosting schemes. The way they keep the ruse going is through machine learning adapting to changing circumstances.