DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).
Bryley Systems Talks Technology on Career Day at Doherty Memorial High School
/in Blog Post, Press Release /by Cathy LivingstoneBryley executives, Gavin Livingstone, President, and Kristin Pryor, Director of Services/Delivery, along with Helder Machado, President of Machado Consulting (left), were invited on November 21 to attend Career Day at Doherty Memorial High School in Worcester. The goal of career day was to introduce students to careers by bringing community members into the school to discuss their jobs.
Bryley Systems’ Services/Delivery Team Expands
/in Blog Post, Press Release /by Cathy LivingstoneMichael Racine of Fitchburg joins Bryley Systems’ Services/Delivery team as a Senior Technician. With over 5 years of professional IT experience, Michael will support end-user service requests, both onsite at the client and remotely, in all facets of end-user technology. Mr. Racine completed the Computer and Networking Technology Program at Porter and Chester Institute in […]
Don’t You Be Singing those Black Friday Buyer Beware Blues
/in Blog Post, Security, Tips /by ABakerAlongside links to Amazon, Home Depot, Staples, etc. Google’s sponsored shopping sections also show unfamiliar stores with lower prices than those of the well-known retailers. But are these really good deals?
Here are some ways to see if an inexpensive site is really going to get you what you want. None of these are absolute rules; the more information you have to make your decision about trusting an unknown website with your account or other personal information, the better sense you can get whether it’s worth making the bargain.
Bryley Honors the Nation’s Veterans
/in Blog Post, Press Release /by Cathy LivingstoneOn November 11th, 2019, the Bryley Team, led by John DeCola, Senior Airman, USAF, assembled to raise the flag in honor of the Nation’s veterans. We are proud to honor Mr. DeCola, as well as retired employee, James Livingston, Captain, USAF, and are grateful for the sacrifices made by all veterans, past and present. We […]
Low-Down on Office 365
/in Blog Post, Cloud, Data-Backup, Microsoft, Office 365 /by ABakerLast week, Microsoft rolled out its promised “Unverified Sender” enhancement to Office 365 to help users “identify suspicious messages” (i.e. spam or phishing emails) that reach the Outlook inbox. 1 This comes after a bulletin in which Microsoft urged Office 365 administrators and users to not turn off its built-in spam filters to “minimize the potential of a data breach or a compromised account.” 2
Many users are mistaken that there are different kinds of protections to their data in the cloud. But the risks of data loss or compromised data are no less of a problem in the cloud than in a modern server, desktop or phone.
So What Gets Patched Around Here Anyway?
/in Blog Post, Security /by 3mediawebGiven the number of vulnerabilities and exposures that are revealed every day [ https://www.bryley.com/2019/07/23/crunching-the-patching-numbers/ ], Mike Carlson, Bryley’s Chief Technology Officer, and Garin Livingstone, Director of Operations, agreed to be interviewed to walk me through the process they go through to keep computer systems updated. Mike has deep experience with local- and wide-area network design and implementation, and is a Microsoft Certified Systems Engineer™. Garin is a Microsoft Certified Technician™ and holds an A+ Certification, and has expertise in operations and technology.
Bryley Systems Picks Macs
/in Announcement, Blog Post /by Cathy LivingstoneLast month, I had an opportunity to volunteer at the Community Harvest Project located in Harvard; an event hosted by the Corridor 9 Chamber of Commerce. Harnessed in canvas bags and supervised by farm staff, we rhythmically picked the trees clean in about an hour, then carefully sorted and packaged the apples for delivery to […]
Infographic: Tips for detecting a phishing email
/in Blog Post, Security, Tips /by ABakerPhishing emails are getting more complex all the time. As the stakes rise, cyber criminals are employing increasingly subtle techniques and messaging. Gone are the days when you simply had to turn down preposterous offers from royalty who had miraculously decided to become your unlikely benefactor.
The phishing email of today is designed to look as legitimate as possible. It will try to distract you from clues that give away its true intent by creating a sense of urgency. Typically they front as legitimate emails from familiar sources, sometimes even appearing to come from within your own organization.
Fortunately, once you know what to look for, these emails will be as easy to spot as those starting “I am a prince from [insert random country name here], and I wish to bathe you in riches…”
The Compliance Effect
/in Blog Post, Security /by ABakerThe Managed Security Service Providers journal, MSSP Insider, interviewed Bryley president Gavin Livingstone about General Data Protection Regulation (GDPR) 1 compliance.
“Our manufacturing clients were especially observant and working toward [regulatory] compliance,” said Gavin. The interview was prompted by a survey by Scale Venture Partners, Cybersecurity Perspectives 2019 2 . In the report, 2018 data breaches like at Exactis, exposures like at Cambridge Analytica, and regulations like GDPR triggered businesses to improve cybersecurity and increase investment in their security solutions. As a result fifty-five percent of the surveyed executives increased their investment in new solutions, forty-nine percent increased their measurement and reporting around data privacy, and forty-eight percent increased investment in data privacy personnel.
The Day the Cloud Went Down
/in Blog Post, Cloud, Data-Backup /by RPacitto7:33 AM, August 31, 2019, a power failure hit Amazon Web Services (AWS) US-East-1 datacenter in North Virginia. As expected, the datacenter’s backup generators kicked in.
Then at about 9 AM the generators started failing
The result was 7.5% of Amazon’s data storage units were unavailable for several hours. Some of the affected websites and services included Reddit, Styleseat, Fortnite, Sendhub … and many smaller sites and services. Power was restored, and around noon most of the drives were functioning. But the outage rendered some data unrecoverable. For those that had not backed up their data, the power failure was a disaster.
Your Windows 10 Transition
/in Blog Post, Microsoft /by RPacittoUsing Windows 7 and Windows Server 2008/R2 after January 14, 2020 puts your systems at risk of vulnerabilities and cyberattacks. When over 200,000 computers were infected by WannaCry in 2017, it was the result of a Windows vulnerability. If a WannaCry-type attack occurs that affects Windows 7 after January 14, 2020, your Windows 7 installations will only have had access to the patch if you are paying for Extended Security Updates. 1
One in three breaches is due to unpatched vulnerabilities. For an organization, the average cost of a data breach is $3.86 million — the average cost for each lost or stolen record is $148. This makes data breaches worse for most businesses than floods, fire, and transit strikes combined. 2 Data breaches end businesses.
The Mysteries of Microsoft’s Model for Windows
/in Blog Post, Microsoft, Security, Tips /by ABaker“All they had to do was come up with a way to charge ten bucks a month and now no one steals music,” I overheard a college student say. He was talking about how Apple transformed from selling software (mp3s via iTunes) to renting access to songs, aka Software as a Service (SaaS). Apple Music now has the most paid music subscribers in the US and based on this success, “announced new subscription offerings for magazines, TV shows and video games”. 1
Per Forbes, 84% of new software is being delivered as SaaS. 2 This selling model built Netflix memberships (20 million renters at the height of its DVD service compared to over 150 million SaaS subscribers today 3 ), Dollar Shave Club razors, Stitch Fix and Amazon’s Subscribe and Save. Subscriptions moved Adobe’s market cap more than 87% since 2012 to $108 billion. 4
Bryley Systems Ranks #3 as a Top IT Service Provider – WBJ 2019
/in Announcement, Blog Post, Press Release /by Cathy LivingstoneBryley Systems is excited to announce that we have been ranked as one of the top 3 on the Worcester Business Journal’s 2019 list of Top IT Service Providers. We are proud to be recognized for our commitment to our clients, as well as our staff, and wish to thank everyone for making this possible.
Crunching the Patching Numbers
/in Blog Post, Managed IT, Security /by RPacittoThere were 16,516 Common Vulnerabilities and Exposures (CVEs)1 published in 2018. The time needed to analyze the relative importance of these to your organization would be something like 16,516 alerts times fifteen minutes to read and assess each one, which works out to about 500 days of work. If you decide that your organization is affected by twenty percent of these, that’s 3,304 vulnerabilities times an average of about an hour to patch each one — that will take about 40 days. And how many devices do you have that need this patch deployment? 2
Our New Sign
/in Announcement, Blog Post /by Cathy LivingstoneBryley Systems was awarded a $3,500 grant from the Town of Clinton’s Downtown Commercial Improvements Program. This Program, which is funded jointly by the Massachusetts Department of Housing and Community Development, makes funds available to business and property owners who wish to make improvements to their property. With funds from this grant, Paul Tucker of Sign Logic, transformed the Bryley logo into a visually interesting sign, complimenting the company’s historic building at 200 Union Street.
The Curious Case of Windows 7 Legacy Apps
/in Blog Post, Microsoft, Tips /by RPacitto“Support for Windows 7 is Coming to an End. … January 14, 2020 …” nagged a Windows 7 screen last week.
Like any other piece of technology, Operating System software gets obsolete. The obsolescence comes in the form of vulnerabilities to hackers, who get rich knowing how to look for and exploit these weaknesses in the code, compromising the contents of your computer and network.
Bryley Systems Ranks Among Top 501 MSPs for 6th Consecutive Year
/in Blog Post, Press Release /by Cathy LivingstoneFor the sixth consecutive year (2014 through 2019), Bryley Systems Inc. has been named as one of the world’s premier managed IT service providers via the prestigious Channel Futures MSP 501 rankings.
Every year, MSPs worldwide complete an extensive survey and application to report their product offerings, growth rates, annual total and recurring revenues, pricing structures, revenue mix and more. MSPs were ranked according to a unique methodology that weights revenue figures according to how well the applicant’s business strategy anticipates trends in the fast-evolving channel ecosystem.
Retired Bryley employees celebrate 65th anniversary
/in Announcement, Blog Post /by Garin LivingstoneOn June 12, 1954, James K. Livingstone married Shirley M. Byerly*; both former employees of Bryley Systems, with Jim’s tenure extending from 1988 through his retirement in 2013. (Shirley’s was employed at Bryley Systems in the late 1980s.)
The wedding ceremony was conducted at a local church, after which the group congregated at 6pm at Shirley’s parent’s home in Pansy, PA. (Pansy is 17 miles north of Punxsutawney, PA; it is farm and (was) coal country where the local population remains sparse, but slightly larger than when Shirley went to the area’s one-room schoolhouse where grades K through 12 sat together; upon entering school, Shirley was immediately promoted from first grade to second grade due to her being the only first grader in the room.)
Did You Feel a Drop? BUDR Pt. 2
/in Blog Post, Data-Backup, Security /by RPacittoRemember the panicked manufacturer with a progression of computer problems that recalled the proverbial “perfect storm”? Today I’m going to sort those problems out, and recommend ways to help keep those things from happening to you. To refresh, here’s what went on with that manufacturer:
The installed version of their ERP (Enterprise Resource Planning software) was too old to receive application maintenance and support. They hadn’t wanted to interrupt their workflow, and so hadn’t upgraded the ERP in more than five years.
When and How to Stop Google Chrome From Running in the Background
/in Blog Post, Newsletter, Tips /by 3mediawebBy default, when you close Google Chrome, the browser window closes, but the application itself continues to run in the background. There are a few reasons for this. First and foremost, this makes it faster to open a new browser window. Since Chrome is already running in the background, there is less that has to […]