Every IT professional would agree that servers are the lifeblood of your organization. No matter what daily task you perform, whether it is responding to email, preparing for a presentation, or completing other workday tasks, it’s important to have a server in your office that runs smoothly. No organization, no matter what the size, wants to face the IT issues associated with a slow or non-responsive server. While there is no way to accurately predict when a server will need to be replaced, there are some general guidelines you should observe to ensure that this critical piece of equipment is running properly.
With black Friday just around the corner, many of us are starting to think about holiday shopping. We all love the convenience of being able to be at home in front of a computer vs the hassle of crowded malls and searching for parking spots. You can click here and there and order whatever product you desire and have it delivered to your front door. You can compare pricing, look for deals, compare products, and it all can be done quickly and in the convenience of your own home, any time, night or day. The downfall? Wherever there is money and users to be found, there are malicious hackers roaming around.
A fierce New England Nor’Easter can create a lot of chaos and the only way to maintain your organization’s productivity levels at its peak is to be prepared — long before the storm hits.
Bryley Systems is encouraging our clients to call us now to ensure that Virtual Private Networks (VPNs) are set up and operational prior to that first snow day. The time to set up a VPN is now – not the day of the storm!
A VPN is a network created between your employee and what they access. The VPN connection will allow your employees the ability to access information from home (or while traveling) and will increase productivity while remaining secure. It will also allow employees to share files for long periods of time, in a secure manner. VPNs are not only beneficial during a snow storm, but also when an employee is battling a cold or flu.
If you don’t use your VPN regularly you may have forgotten your password or even how to log in. You may in fact, not even have a VPN set up yet.
Call Bryley today at 978.562.6077 to ensure your VPN connections are set up properly, or email us at Service-Request@bryley.com. We are here to help.
Monday, November 12, 2018. On a cool, crisp, Monday morning with clear blue skies , we proudly gathered outdoors by our 35’ flag pole and raised the American flag in a tribute to all veterans.
We are very proud to honor our own John DeCola, Engineer and Senior Airman, USAF, and retired employee James Livingstone, Captain, USAF. Thank you for your service.
What makes Bryley Systems different? Longevity.
It’s not just about the significant number of Microsoft, Cisco, and VMware Certified Engineers we employ, or the multiple Product Certifications we hold across company departments. What makes us strong as a Managed IT/Cloud/Security services provider is measured in 5 years, 10 years, even 20 years!
Our company’s long-term success lies in our ability to strengthen and support the network of relationships between our clients and employees in a way that advances the best interests of everyone.
We are very proud to say that 60% of our employees have been with us five years or longer, one third over 10 years, and 15% over 20 years!
And we are truly honored that 45% of our current, agreement-based clients have partnered with Bryley Systems for five years or longer, over 25% at 10 years or longer, and 10% at least 20 years or more.
Since 1987, our team of seasoned IT experts and our client longevity have truly made Bryley Systems – Bryley Strong.
Kudos to Tech Support!
Recent survey highlights – Here’s what Bryley clients are saying:
- Eric diligently worked through the issue and got our distribution working effectively and in a timely manner. Thanks, Eric.
- Ray has done a great job for us. He set up our new workstations and helps us work out some issues we’ve had.
- Always professional, kind and knowledgeable about our programs and systems. Thank you for your prompt assistance always!
Worcester Business Journal
October 15, 2018
Each year, the Worcester Business Journal (WBJ) compiles and publishes a list of IT Service Providers throughout Central Massachusetts. The list, published on October 15th, ranked Bryley Systems #5 in the organizations surveyed. Bryley has consistently ranked well on the WBJ list for the last 4 years.
If you are looking for a business partner to help you navigate the ever-changing technology and cybersecurity landscape, we’re here for you. For more information about Bryley’s full array of Managed IT Services, Managed Cloud Services, and Cybersecurity Services please contact us at 978.562.6077 or by email at ITExperts@Bryley.com.
With all the electronic devices that are used in homes and offices in today’s high tech world, oftentimes there just aren’t enough electrical outlets to plug them all into. Power strips offer a solution which enables a single outlet to handle multiple devices. But if you don’t choose one that also offers surge protection, you could be putting your devices at risk.
It’s easier than you think for organizations and their leaders to overlook cybersecurity. Unfortunately, the nature of the threat means some of the biggest worries for your organization might actually be out in plain sight. Here are five cybersecurity risks that are regularly overlooked.
- Inconsistent or Nonspecific Cybersecurity Training. In many cases, people are the weakest link. “From falling for phishing emails, and clicking on links or downloading documents that turn out to be malware, to being a victim of business email compromise scams that end up losing the company a lot of money, employees are a company’s greatest liability when it comes to cyber security.”1 More specifically, it’s how well and how consistently they’re trained on security essentials. Since you don’t want to assume any one employee is automatically better versed on digital security than another, it makes good sense to standardize the training. Everybody should be on the same page about the reality of the risks and how necessary a good human element is these days, even with all the anti-virus and anti-malware software available. The understanding of what a phishing email looks like comes in handy just as much at home as it does in the office. Even though most employees don’t like the idea of extra meetings, specific cybersecurity training helps employees feel a greater sense of ownership over the company and its processes and assets.
- Passwords. Ensure that any accounts associated with your organization are secured by a strong password, and two-factor authentication, if possible. It is always recommended that employees cannot reuse passwords from other online accounts for any of their work accounts. You can make it part of your IT policy that employees must change their passwords within a specific time limit. Communicate with your team that they should not share their passwords with anyone else.
- Patch Management. Keeping software patches up-to-date is a critical component to keep your company network safe from newly discovered vulnerabilities. The importance of keeping software updates current was underlined in a dramatic way during the WannaCry and Petya outbreaks. The primary way both of those attacks were spread was by exploiting a critical vulnerability in the Windows operating system known as Eternal Blue. Eternal Blue allowed the malware to spread within corporate networks without any user interaction, making these outbreaks particularly virulent.“The WannaCry outbreak occurred in May; the patch for the Eternal Blue vulnerability had been released by Microsoft in March. If the patch had been widely applied the impact of WannaCry, which mostly hit corporate networks, would have been greatly reduced. You would imagine that a high-profile incident like WannaCry, which underlined the importance of keeping patches up to date, would have ensured people and companies did just that. However, despite all the publicity the WannaCry outbreak received when it occurred in May, the Petya outbreak in June was still able to use the same Eternal Blue vulnerability as one of the ways it spread.”2“To be fair to the IT managers in the various companies that were hit due to the Eternal Blue vulnerability being exploited, updating software on company networks is not always entirely straightforward. IT managers can often be fearful that updating one part of the system could cause another part of it to break, and this can be a particular concern in, for example, healthcare organizations, which were heavily impacted by WannaCry.” 3 However, incidents like the above do underline the importance of protecting vulnerable systems, and patching is a key way to do that. The point is not that clicking refresh on software updates all day long will prevent every possible instance a cybercriminal could exploit a vulnerability or back door. Setting everything you can to auto-update at a convenient time, daily, does stand a chance of keeping you safer.
- Other Companies. A problem that many businesses encounter in the current business climate is that it is not just their cyber security practices that they have to worry about: they also have to worry about the cyber security protocols of other businesses they work with. Your company may have stringent cyber security practices implemented, but if a third party your company deals with is compromised then attackers could potentially gain access to your network. Network segmentation, or dedicated servers that vendors can use so that they do not connect directly into your company’s network, can help safeguard against weak links in third parties’ cyber security. If that isn’t possible, it is wise to at the very least have a conversation with potential vendors before doing business with them to ensure they take cyber security seriously, and have appropriate practices in place.
- Unsecured Personal Devices. “BYOD culture — or bring your own device — is a great thing for employees and employers alike. It lets employees perform their duties in a digital workspace they already know and feel comfortable in. On the employer side, the lack of a serious learning curve and the small bump in productivity are welcome. What’s less welcome are the cybersecurity risks that BYOD culture brings. It’s possible to permit and even encourage your teams to work on their own laptops and tablets, but this shouldn’t be done without a comprehensive and robust BYOD policy drawn up by your IT team. At a minimum, you should require that users access on-premises internet connections using VPNs and that all accounts are equipped with two-factor authentication.”4
In today’s connected workplaces, here’s no single department within an organization whose job it is to ensure cybersecurity. In fact, that’s the major message all across the digital landscape: No matter how large or small the organization, it’s vital to speak and act as one when it comes to protecting digital assets and company property. As with so many of the issues mentioned on this list, employee education is key: employees need to understand what good cybersecurity practices are, and the potential consequences for the company if they are not followed.
1-4: Symantec Security Response Team: Cybersecurity Weak Links. www.symantec.com/security-center – Bryley Systems is an SMB Specialized Symantec partner.
Connected devices are essential to our professional and personal lives, and criminals have gravitated to these platforms as well. Many common crimes—like theft, fraud, harassment, and abuse—are now carried out online, using new technologies and tactics. Others, like cyber intrusions and attacks on critical infrastructure, have emerged as our dependence on connected systems revealed new vulnerabilities.
Oftentimes, when you come across an article that someone is raving about as a ‘”MUST READ – Changed my life”, you glance through it with some skepticism, and then realize that it won’t change your life. However this time I came across one of these “life changing” articles and wow – it peaked my interest! It gave me an entirely different perspective on how to approach a conversation.