2FA!@$%

Thunder and Botheration!

“If there’s 2FA, enable it,” said Bryley’s Garin Livingstone when asked for his baseline recommendation for everybody for computer security.

2FA or MFA (two- or multi-factor authentication) is adding a second (or more) proof of your identity before being granted access to a machine or software.

2FA may also rank among the biggest pains in the neck … [4 min. read]

Win11

Tempted by Windows 11?

Like it did six years ago for Windows 10, Microsoft is wooing end-users via ads for a free Windows 11 upgrade. Who doesn’t want to take the latest tech out for a spin? And for free?!

But as far as business continuity is concerned (business continuity is the planning and process by which organizations maintain operation, not severely disrupted by a disaster or other unwanted incident) maybe this bargain is not yet a good deal … [5 min. read]

Building wireframe

Assessing Risk Helps Ensure Business Continuity

No construction company would undertake a building without first evaluating and then understanding how it will handle the project’s risks. But that is how a lot of Information Technology is executed. Does that make sense? Think for a moment how much of your employees’ livelihoods and the services and products your organization provides depend on networked computing. Isn’t that how you store and access your intellectual property, client information and business processes?

And do you keep building higher, putting more strain on the network? For instance does an Internet-of-Things machine need to be granted access to your network? Or does someone’s personal device need to log-into your system? … [5 min. read]

Garin

President Garin Livingstone on Cybersecurity

In recognition of cybersecurity awareness month Bryley President Garin Livingstone was invited to speak with Hank Stoltz on the Worcester Chamber’s WCRN radio program Voice of Business … [3 min. read]

Ethan Brush

Ethan Brush Promoted to Senior Field Technician

Ethan Brush has been promoted to Senior Field Technician. Ethan will be assuming more responsibilities immediately, including training new hires.

He started at Bryley earlier this year after graduating from Norwich University, a senior military college in Northfield, Vermont, an NSA-designate for Excellence in Cyber Defense. And he arrived at Bryley with programming skills that were tapped to improve Bryley’s automation. Also security is always his foremost concern when making a decision for Bryley’s clients. These are among the reasons for his promotion … [2 min. read]

Microscope

Why Don’t Businesses Do Network Assessments?

Too often network assessments wind up at the bottom of the to-do list as today’s urgencies move continually to the top of mind and focus … [5 min. read]

MSP 501 2021

Bryley Systems Named to 2021 Channel Futures MSP 501

The MSP 501 designation is an IT industry signifier that recognizes best-in-class operational efficiency and business models. The MSP 501 award is a sixty point, independent audit verifying that Bryley is a fit and stable operation from which to provide its clients dependable business continuity … [2 min. read]

Ethan

Ethan Crushed It

Ethan crushed it. Again. Thanks … [1 min. read]

Circuit tree

The Strengths of an Inter-Generational Tech Team

Founded in 1987 Bryley has a diverse group of talent serving its customers – from some for whom this is their first job out of college – like Ethan Brush – to those that (as Lear’s magazine used to say) weren’t born yesterday … [2 min. read]

keys

Responding to Cloud-Based Email Server Attacks

“Just awful” –the opinion on the state of a Fortune 500 company’s security by the hacker who stole fifty million credentials

Lately organizations have been choosing to migrate their email networks to cloud-based email providers like Microsoft 365. These cloud-based systems are appealing with their low cost per user monthly billing, ease of management and built-in security. But what are the risks these businesses can expect on a cloud-based email platform? … [5 min. read]

Scott Gold

Scott Gold Recognized for Twenty Years of Service

Senior Network Engineer Scott Gold has been recognized for his twenty years of service at Bryley Systems. Scott has designed and built many Bryley clients’ servers and and networks. Because of his experience in computer environment design Scott is a great problem-solving resource. Scott’s manager Kristin Pryor called Scott, “a skilled contributor and a mentor to other techs … [3 min. read]

Survey comment

Imagine using an MSP that isn’t Bryley …

Tech Service Team Member Ethan Brush’s good work won some comments from a Bryley client [1 min. read]

MFA

Why Don’t Businesses Use MFA?

The US Cybersecurity and Infrastructure Security Agency recommends that small- to medium-sized organizations implement MFA (multi-factor authentication). Multi-factor authentication refers to when you use two or more of the following factors … [6 min. read]

Kaseya VSA logo

Update on Attack Against Kaseya VSA

Kaseya VSA, a remote monitoring and management tool, was the victim of a cyberattack. Bryley uses Kaseya VSA. However Bryley was among a group of VSA users who were able to be warned by Kaseya of the unfolding attack. Because of the warning Bryley immediately shut down Bryley’s instance of the VSA server … [2 min. read]

Assessment

Risk Assessment Helps Identify the Security Holes in Hybrid

Although most organizations relied on a remote work model in the first year of the pandemic, the vaccine rollout has led to an increase in hybrid work environments that have elements of both on-site work and the remote work model … [5 min. read]

9 Ways to a Breach

Nine Ways Employees Can Leave Your Business Vulnerable

Employees’ work credentials can end up scattered across the web when employees use them on sites external to your company … [2 min. read]

Up all night

No Recess

“Just knowing my company was using a phishing simulator stopped me from opening emails I had doubts about,” said an employee of a business using Bryley’s Phishing Simulator. “Why risk it? I don’t want to end up an example at the next meeting” … [5 min. read]

PC Cyborg

Ransomware – What it Was, Is and What to Do About it

Ransomware claimed its first victims when Joseph Popp distributed 20,000 floppy disks with ransomware to AIDS researchers who had attended the World Health Organization’s 1989 AIDS conference in Stockholm … [6 min. read]

Myk Dinis

Zen Puzzle-Master

“Teaching improved my ability to diagnose all kinds of problems because interacting with the students I got to see problems from so many different angles. And that’s made my role at Bryley a lot easier,” Myk Dinis said in discussing his recent promotion to senior engineer … [3 min. read]

Bryley's front door

Bryley and the May-to-June COVID Situation

In light of Mass Governor Charlie Baker’s reopening plan, Bryley’s management team met and concluded that Bryley would continue the safety of using COVID protocols … [3 min. read]