What are the threats associated with cyber security?

In part three of his interview with The Cleaning Crew, Bryley Systems President, Gavin Livingstone, answers the question “what are some of the threats associated with cyber security?”  

Assabet Valley Chamber After-5 — Event a huge success!

I estimate about 50-60 attendees who arrived early (about 4:45pm) and left late (last one out the door at 8pm). Everyone seemed engaged; there were conversations in every nook and corner with people sitting in the comfortable chairs, moving from one area to another, and, generally, having a good time. Thank you to Telly and […]

Bryley Employees in Worcester Business Journal

There have been some changes recently at Bryley, and the Worcester Business Journal has commented: “MICHELLE DENIO has been promoted and JAMES WHEELERand TELLY CASTERNOPOULOS hired at Information technology service provider Bryley Systems of Hudson. Denio was promoted to administrative support technician. She joined Bryley Systems in 2008 and is a resident of Clinton. Wheeler has been hired as […]

Hackers Hijack Email Contacts

Have you received a rogue email from a friend or acquaintance that seems out of character?  For example:  Why is Aunt Mildred calling me “Friend” in her email?  Or, does neighbor Fred really want me to invest in Nigeria? Odds are, their email accounts – particularly if located at online services like Gmail, Yahoo! Mail, […]

Simple passwords = disaster

The top five end-user passwords from 2012 were: password (yes, the actual word itself) 123456 12345678 abc123 qwerty (top-left keys on your keyboard below the numbers)   The top three in this list, “password”, 123456”, and “12345678”, were also the top three passwords in 2011.  Basic analysis:  Most people prefer simple passwords that are easy […]

HP still top PC manufacturer worldwide in a slowing market

Despite internal issues, HP remained the top manufacturer of PCs worldwide in Q4 of 2012 followed by Lenovo (the Chinese firm that purchased IBM’s PC business in 2005) and then Dell. Overall, PC shipments dropped 6.4% from Q4 of 2011. Dan Reisinger of eWeek notes that Q4 of 2012 is the first time in five years […]

Preview into Microsoft Office 2013

In addition to Windows 8, I have also been using Office 2013 over the past few months; I like some things, but not everything: • Excel updates ripple slowly down the page; they seemed to run a bit faster in previous versions. • The top-right Window icons have shifted somewhat; the Minimize icon ( _ […]

Booting Windows 8 into Safe Mode

Safe Mode is useful for diagnosing PC problems. Because Windows 8 starts quickly, you cannot get into Safe Mode by pressing [F8] during the boot-up process (as you could with previous versions of Windows). The new procedure: Go to Settings and then select Power Hold [Shift] and then press Restart to open System Recovery Options Select Troubleshoot […]

$295 Raised for Hudson Charities by Bryley Systems Inc. and Yours for Children, Inc.

Bryley Systems and Yours for Children together raised $295 for the Hudson Food Bank and the Hudson Boys & Girls Club.  The money was generated through a free giveaway of refurbished PCs in exchange for the suggested donation of $35 to either Hudson non-profit organization. With the generous contribution of 9 used PCs by Yours […]

Job Promotion at Bryley Systems

I am very pleased to announce that Michelle Denio has been promoted to the position of Administrative Support Technician. Michelle is a key member of Bryley’s Technical Service Department and with this new expanded role she will be able to use her expertise and knowledge of Bryley’s clients to everyone’s advantage.   Congratulations!!!!   Hudson Sun

Why business users might consider an Ultrabook over a Tablet.

It seems that tablet computers are in the news daily, from Apple’s iPad (iOS) to Microsoft’s Surface (Windows RT) to Samsung’s Galaxy (Droid).  I like a tablet for viewing, but typing on a bare tablet is not the same as using a full keyboard.  Also, compatibility with office-productivity applications is limited on most tablets. Ultrabooks […]

System Builders Await Surface’s Impact

Gavin Livingstone, President of Bryley Systems, talks to Channel Pro Networkabout Microsoft’s Surface tablet.  Read the full article System Builders Await Surface’s Impact

Garin Livingstone Passes his Windows 7 Exam!

Congrats Garin Livingstone, Bryley Systems Senior Tech, for successfully completing and passing your Windows 7 configuring class and test!!! 

Cybercrime targets smaller organizations

A recent Data Breach Investigation Report (DBIR) from Verizon notes that 98% of data breaches stemmed from external sources using hacking techniques (81%) and malware (69%).  About 79% of the data breaches were directed at “targets of opportunity”, typically smaller organizations that are vulnerable through an “exploitable weakness”; most attacks were performed using relatively unsophisticated […]

Migrating Postini users to Google Apps for Business; also, an alternative

As mentioned in our August 2012 Bryley Tips and Information, Google has moved Google Message Security (GMS)/Postini into Google Apps for Business and will migrate all GMS/Postini customers to Google Apps for Business by the end of 2013.   Google will migrate GMS/Postini users gradually, focusing initially on its large, direct-billed customers and eventually tackling those […]

Protect your mobile device – Part 3: Enforcement, Tools, and First Steps

We have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security.   Enforcement   Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]

Microsoft Streamlines Windows Server Options, Kills Versions for Home and Small Business

Microsoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]

Protect your mobile device – Part 2: Training

Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data   Authenticate and encrypt […]

Turtle

Bryley Referral Program

Sticking your neck out to vouch for Bryley is, as far as we’re concerned, the ultimate compliment. Because of that, everyone you refer is treated with respect, kindness and good communication whether or not Bryley can help them with IT.

Protect your mobile device – Part 1

The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices   In addition, BYOD (Bring Your Own Device) […]