Garin

President Garin Livingstone on Cybersecurity

In recognition of cybersecurity awareness month Bryley President Garin Livingstone was invited to speak with Hank Stoltz on the Worcester Chamber’s WCRN radio program Voice of Business … [3 min. read]

Microscope

Why Don’t Businesses Do Network Assessments?

Too often network assessments wind up at the bottom of the to-do list as today’s urgencies move continually to the top of mind and focus … [5 min. read]

MSP 501 2021

Bryley Systems Named to 2021 Channel Futures MSP 501

The MSP 501 designation is an IT industry signifier that recognizes best-in-class operational efficiency and business models. The MSP 501 award is a sixty point, independent audit verifying that Bryley is a fit and stable operation from which to provide its clients dependable business continuity … [2 min. read]

Ethan

Ethan Crushed It

Ethan crushed it. Again. Thanks … [1 min. read]

Circuit tree

The Strengths of an Inter-Generational Tech Team

Founded in 1987 Bryley has a diverse group of talent serving its customers – from some for whom this is their first job out of college – like Ethan Brush – to those that (as Lear’s magazine used to say) weren’t born yesterday … [2 min. read]

keys

Responding to Cloud-Based Email Server Attacks

“Just awful” –the opinion on the state of a Fortune 500 company’s security by the hacker who stole fifty million credentials

Lately organizations have been choosing to migrate their email networks to cloud-based email providers like Microsoft 365. These cloud-based systems are appealing with their low cost per user monthly billing, ease of management and built-in security. But what are the risks these businesses can expect on a cloud-based email platform? … [5 min. read]

Scott Gold

Scott Gold Recognized for Twenty Years of Service

Senior Network Engineer Scott Gold has been recognized for his twenty years of service at Bryley Systems. Scott has designed and built many Bryley clients’ servers and and networks. Because of his experience in computer environment design Scott is a great problem-solving resource. Scott’s manager Kristin Pryor called Scott, “a skilled contributor and a mentor to other techs … [3 min. read]

Survey comment

Imagine using an MSP that isn’t Bryley …

Tech Service Team Member Ethan Brush’s good work won some comments from a Bryley client [1 min. read]

MFA

Why Don’t Businesses Use MFA?

The US Cybersecurity and Infrastructure Security Agency recommends that small- to medium-sized organizations implement MFA (multi-factor authentication). Multi-factor authentication refers to when you use two or more of the following factors … [6 min. read]

Kaseya VSA logo

Update on Attack Against Kaseya VSA

Kaseya VSA, a remote monitoring and management tool, was the victim of a cyberattack. Bryley uses Kaseya VSA. However Bryley was among a group of VSA users who were able to be warned by Kaseya of the unfolding attack. Because of the warning Bryley immediately shut down Bryley’s instance of the VSA server … [2 min. read]

Assessment

Risk Assessment Helps Identify the Security Holes in Hybrid

Although most organizations relied on a remote work model in the first year of the pandemic, the vaccine rollout has led to an increase in hybrid work environments that have elements of both on-site work and the remote work model … [5 min. read]

9 Ways to a Breach

Nine Ways Employees Can Leave Your Business Vulnerable

Employees’ work credentials can end up scattered across the web when employees use them on sites external to your company … [2 min. read]

Up all night

No Recess

“Just knowing my company was using a phishing simulator stopped me from opening emails I had doubts about,” said an employee of a business using Bryley’s Phishing Simulator. “Why risk it? I don’t want to end up an example at the next meeting” … [5 min. read]

PC Cyborg

Ransomware – What it Was, Is and What to Do About it

Ransomware claimed its first victims when Joseph Popp distributed 20,000 floppy disks with ransomware to AIDS researchers who had attended the World Health Organization’s 1989 AIDS conference in Stockholm … [6 min. read]

Myk Dinis

Zen Puzzle-Master

“Teaching improved my ability to diagnose all kinds of problems because interacting with the students I got to see problems from so many different angles. And that’s made my role at Bryley a lot easier,” Myk Dinis said in discussing his recent promotion to senior engineer … [3 min. read]

Bryley's front door

Bryley and the May-to-June COVID Situation

In light of Mass Governor Charlie Baker’s reopening plan, Bryley’s management team met and concluded that Bryley would continue the safety of using COVID protocols … [3 min. read]

Phishing click

Just a Click Away

An email with an intriguing subject line shows up in your inbox. You click on it because you’re curious and the sender seems trustworthy. This is how most cyberattacks begin … [7 min. read]

Clouds

Lost in the Clouds

The functioning, intellectual property and reputation of your organization – and so its survival – depend on your ability to bounce back from an incident with the help of backed-up data. This is why you need a comprehensive business continuity and disaster recovery solution that does not neglect backing-up your cloud-based data [5 min. read]

ARA Seminar

ARA Mass Trains Its Member Organizations

The American Rental Association of Massachusetts (ARA) set their member organizations on the path to cybersecurity awareness this month. ARA received six hour-and-fifteen-minute-long custom seminars that introduced the concepts of Security Awareness Training – tailored to their industry.

Bryley VP Roy Pacitto facilitated the online, interactive sessions that provided an introduction to Security Awareness Training (SAT) for ARA member organizations. The aim was to provide each participant with the basics that if the concepts presented were adhered-to the organizations would be less likely to experience a security breach. It was explained at the outset that one-time training sessions have only limited benefit. But couple initial training with ongoing Security Awareness Training and the results are historically impressive in minimizing cybersecurity risks … [six min. read]

Springs

BCDR: Get Back to Where You Once Belonged

Business Continuity and Data Recovery (BCDR) is a set of processes and products that enable an organization to recover from a cyber-incident and continue routine business functions … [9 min. read]