Bryley attends Table Talk Facility Ribbon-Cutting Ceremony

Gavin Livingstone, President and Co-Owner, along with Cathy Livingstone, Co-Owner, attended Table Talk’s ribbon-cutting ceremony last month as part of the Worcester Regional Chamber of Commerce.

The facility is 50,000sq ft. and has state-of-the-art machinery capable of producing 10,500 pies/hour, nearly doubling current production1.  The land it sits upon was former industrial wasteland, but Table Talk went to great lengths to clean up the site and provide more Worcester residents with employment opportunities.

Touring the facility

Gazing at the production line

Learning about the new facility



Bryley’s Prestigious Channel Partners 360 Award Travels the U.S.

After being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.

5 Mile Bridge.  The Mackinac Bridge, more commonly known as the 5 Mile Bridge is the longest suspension bridge in the Western Hemisphere. It was built in 1957 to connect the Upper and Lower Peninsulas of Michigan. Prior to 1957, individuals had to take a ferry to get from one side to the other. The bridge was designed to withstand the incredible Michigan weather including high winds, drastic temperature fluctuations, and shifts in weight (due to traffic and ice).

“Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™. We thank Channel Partners for this prestigious Channel Partners 360° award!”

– Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA

Bryley Systems named in Top 501 Managed IT Service Providers (MSPs) Worldwide for the Fourth Consecutive Year!

Bryley Systems, for the fourth-straight year, ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top MSP 501 companies ranked this year include organizations from around the world and from diverse technology and business backgrounds. Collectively, they amassed $14.48 billion in total revenue (based on 2016 results), up more than 15 percent from a year earlier. (The complete 2017 MSP 501 list is available at

“We are honored to be named to the MSP 501 for the fourth consecutive year.” said Gavin Livingstone, President of Bryley Systems.  “It is a great honor and demonstrates our dedication to remain one of the top providers of managed IT services worldwide.  We look forward to continuing to provide excellent service to our clients.”

“On behalf of MSPmentor, I would like to congratulate Bryley Systems for its recognition as an MSP 501 honoree,” said Aldrin Brown, Editor in Chief, MSPmentor. “The managed service provider market is evolving at a rapid pace and the companies showcased on the 2017 MSP 501 list represent the most agile, flexible and innovative organizations in the industry.”

The 2017 MSP 501 list is based on data collected by MSPmentor and its partner, Clarity Channel Advisors. Data was collected online from Feb. 16 through May 15, 2017. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, growth and other factors.

Bryley Employees Enjoy a Summer Outing!

Bryley Employees took some time to gather together and celebrate all that we have accomplished this year.  We ventured out to Puzzlescape in Hudson, to see if we had what it took to get out!  We are happy to announce that everyone safely escaped their respective rooms!  Here are some photos from our adventure.


 Trudging through the pouring rain. We did it! Making our own Ice Cream Sundaes!

Cloud Computing – A Green Solution

Moving to the cloud has benefits like simplicity, efficiency, easier management, etc. Cloud Computing has become the next wave of computing infrastructure and for many, the added benefit of having a “green” IT environment may be that extra incentive to move to the next generation of cloud computing and IT management.

The huge data centers that house the data require an abundance of electricity to run properly, which generates heat emissions. These emissions do add to the carbon footprint, but with the help of renewable energy, data centers are able to lower them, doing their best for both clients and the environment. While there is still a carbon footprint, the cloud has been proven to be more environmentally friendly.

Virtualization. With traditional computing, depending on the size of the organization, they can manage anywhere from a few servers to upwards of hundreds. This is inefficient as it leads to both wasted energy and physical equip­ment. Energy use is not customized to the needs of the organization, and the hardware used needs to be constantly replaced or updated, leaving behind a trail of physical excess. The cloud is a major improvement on traditional computing as it has redesigned the way busi­nesses operate. With the cloud, information is virtualized, eliminating the need for wasteful, in-house equipment. Busi­nesses can operate through this virtual location, drastically reducing energy usage and the need for excessive physical equipment.

The Option to Pay as You Go. Your monthly prices depend on your monthly usage. It’s a simple model and allows organizations to remain in control of their spending.

Multitenancy. Multitenancy allows many different organizations (public cloud), or many different units within the same organization (private cloud) to benefit from a common cloud-based infrastructure. When used in conjunction with automation software, multi-tenancy ensures fewer machines are required for operations.

“Automation Software. Cloud based infrastructure relies on automation to maximize energy and resources efficiency. Through automation software it is possible to provide and scale workload within shared data centers. IT specialists are able to push the limits of traditional utilization and consolidation limits. The higher the ratios the less physical hardware is required and this directly contributes to energy efficiency and resource optimization.”1

“Organizations Allow Telecommuting. Companies using internal, on-premises solutions have a hard time offering their staff remote working options because of the security risks that can arise when trying to connect to the enterprise network from an outside location. The cloud offers businesses the ability to secure their networks while still increasing accessibility and improving collaboration and productivity.”2

Cloud computing can be an important facet of an organization’s push to be greener and meeting critical IT operational goals.

Reduce cost. Consolidation means fewer servers, which in turn means lower cooling and space requirements, ultimately producing lower energy costs.

Comply with regulation. By tapping more efficient and therefore lower-emitting resources, cloud computing customers can reduce their carbon emissions and be better-positioned to meet regulatory standards.

Improve resiliency. Consolidation and improved utilization create more space, more power, and more cooling capacity within the same facility envelope. And tapping into public cloud providers offloads management of those resources from the customer to the service provider.

A cloud environment is one that is often created and always managed by a Managed Cloud Services Provider (MCSP) like Bryley Systems. MCSPs typically construct and then manage the overall infrastructure based on best practices and available resources; their overall cost tends to be less since they employ a variety of experts skilled in computer networks, cloud infrastructures, and cyber-security.

To inquire about Bryley’s full array of Managed Cloud Services and Managed IT Services, please contact us by phone at 844.449.8770 or by email at We’re here for you.


References and Sources:

  2. (ISG Tech) (Harvard Business Review) (MSPmentor) (IT ProPortal) (Forrester Research)


What we can learn from the GOP Data leak

It was recently discovered that a third part analytics firm, Deep Root, had left the GOP’s voting database open to the public.  As reported by UpGuard, a security firm, “The data repository, an Amazon Web Services S3 bucket, lacked any protection against access. As such, anyone with an internet connection could have accessed the Republican data operation used to power Donald Trump’s presidential victory, simply by navigating to a six-character Amazon subdomain: “dra-dw.”1 The database contained roughly 25 Terabytes of data about more than half of the US population’s information including personal identifying information such as birth dates, home addresses, and phone numbers as well as other demographic information like ethnicity and religion.

This leak is a wake-up call for companies to ensure that their data is protected.  There are several steps an organization can take to ensure their data is protected:

  • Password Protect your data. The main problem with the GOP’s database was that it was left unprotected.  Make sure you have a strong password and that it is changed regularly.
  • Institute two-factor authentication. This adds a layer of security as it is used confirm a user’s claimed identity by utilizing a combination of two different components, generally something you know with something you have (in this case the password with a code sent to your email or phone).
  • Have a regular review of your infrastructure. It can often be difficult to do on your own as you may not have all the knowledge and expertise or the bandwidth to conduct a proper evaluation. Do not be afraid to ask an MSP, such as Bryley, to conduct a network assessment and evaluate your infrastructure. They have expertise and breadth of knowledge that will prove valuable and can highlight what you are doing well and areas where you can improve.

If you would like to improve your cybersecurity plan, or to inquire about Bryley’s full array of our Managed Cloud Services and Managed IT Services, please contact us at 844.449.8770 or by email at We’re here for you.


1 Hatmaker, Taylor. Techcrunch.Exposed GOP database demonstrates the risks of data-hungry political campaigns.” 19 June 2017.

O’Sullivan, Dan. UpGuard.The RNC Files: Inside the Largest US Voter Data Leak.” 19 June 2017.

WRCC Ambassadors on the Move — Tower Hill Botanic Garden

The WRCC Ambassadors visited Tower Hill Botanic Garden in Boylston, MA on May 3rd. Gavin Livingstone, President of Bryley Systems, is the Chairman of the WRCC Ambassadors.  He is pictured in the front row, 3rd from the right.

Joann Vieria, Director of Horticulture, was our host. She provided some information:

  • Tower Hill is located on 132 beautiful acres with two, large (4000sq’) greenhouses, an education center, outdoor gardens with fountains, walking trails, and views of Mount Wachusett and the Wachusett Reservoir.
  • Core values include:
    • Learning
    • Stewardship
    • Sustainability
  • It was founded in 1986 by the Worcester County Horticultural Society, which originated in downtown Worcester in 1842.
  • Tower Hill hosts indoor and outdoor events and programs year-round, from weddings to flower shows to Tai Chi to gardening classes.
  • It has several, pet-friendly times, permitting leashed-pets and their owner access to walking trails during specified, non-peak hours.
  • Tower Hill is volunteer-oriented; volunteers maintain the grounds, man the receptions areas, and present educational programs with only seven, permanent, grounds-based staff.
  • Affordable memberships start at $25/year (Student) and include access to facilities and most events.


Main Street in Hudson was quite busy with production and film crews working hard from the early morning hours until late in the evening for a few days in early May. During the filming of an upcoming movie starring David Spade, in “Who Do You Think Would Win”, downtown Hudson was bustling with excitement – and all the action was just a few doors away from Bryley Systems.

Why Is Data Loss So Serious?

Data Loss Can Completely Cripple Business Operations. In the event of extreme data loss such as the loss of an entire database, even temporarily, it is not uncommon for the impacted business processes to fail at multiple levels. The organization may be rendered helpless, unable to fulfill orders and struggling to update employee records. Producing financial reports and providing customer services may also be impossible.

This occurs because technology is the backbone of most business operations and most of these operations are connected through a central IT system. Therefore, any disruption to the IT system can affect other business areas such as phone systems and manufacturing processes. As a result, employees may be idled for prolonged periods of time while the lost data is being recovered. Productivity will suffer.

The Impact of Data Loss on Sales. Organizations can suffer significant harm when data loss makes it impossible to interact with customers, often resulting in lost sales. Since email is the primary channel of communication between organizations and their customers, if your email system were to go down, how difficult would it be for you to conduct business as usual? Any disruption in your communication with leads, prospects, or clients can translate into lost business. For instance, should you fail to submit a proposal or bid on time, the result would potentially be a major loss of projected revenue.

The same applies when a data breach is directed at a call center or CRM provider. This is particularly true for small businesses that rely on independent call centers for customer support assistance and Customer Relationship Management (CRM) providers for managing customer relationships. In a worst-case scenario, the harm resulting from an attack on either of these two might be enough to force a small organization into bankruptcy.

Data Loss Resulting from Theft. Data loss can also take the form of data theft where a hacker breaks into a computer or network and steals critical private business information. Business plans, product designs, and a variety of other mission-critical information can disappear. The economic impact of information theft is difficult to measure because the extent of the harm caused may only manifest itself over a long period of time.

Data theft often results in lawsuits, breaches of contracts, regulatory compliance failures, and loss of business.

Lawsuits and hefty fines typically go hand-in-hand when a company experiences data theft. As an example, if personal information such as names, addresses and financial account numbers are accessed by hackers, then organizations may find themselves embroiled in lengthy legal court battles.

Data thefts can also result in contract breaches and a variety of fines and lawsuits. Shareholders, for example, can sue an organization for failure to perform duties outlined in a contract. Customers can sue companies for direct and collateral damages resulting from a data theft that caused an order to be delayed or lost.

Regulatory Compliance Failures. In 2007, the State of Massachusetts Legislature passed 201 CMR 17.00, a comprehensive set of regulations addressing data breaches. Under these laws are a set of regulations that affect any business that collects and retains personal information of its customers. For the purpose of these regulations, “personal information” includes names, social security numbers, driver’s license numbers or financial account numbers, including credit or debit card numbers.

The regulations took effect January 1, 2010, and mandate that personal information – a combination of a name along with a Social Security number, bank account number, or credit card number – be encrypted when stored on portable devices, or transmitted wirelessly or on public networks. Additionally, the regulations call on organizations to utilize up-to-date firewall protection that creates an electronic gatekeeper between the data and the outside world and only permits authorized users to access or transmit data, according to preset rules.

Loss of business isn’t uncommon after data loss incidents especially if the loss was a result of a preventable event such as a security breach. Customers may feel that the company didn’t take adequate measures to safeguard their information and may therefore choose to discontinue doing business with the organization for fear of a similar event recurring in the future.

Data loss or theft can strike any organization. The wise choice is to be proactive by deploying an up-to-date and secure data backup system.

The main takeaway from these costly consequences of data loss is that businesses bear a huge responsibility for protecting the data they own. Failure to do so means facing serious operational and legal ramifications.

If you’re ready to get serious about protecting your business data, select a talented Managed IT Services/Managed Cloud Services company, like Bryley Systems, to help you double-check your IT infrastructure, recommend solutions to eliminate weak links in your security chain, and help you develop an organization-wide policy to help prevent data loss. Please contact us at 978.562.6077 or by email at We’re here to help.


Tour of the new maintenance facility of the WRTA

Bryley’s President, Gavin Livingstone, who currently chairs the Worcester Regional Chamber of Commerce (WRCC) Ambassadors, arranged for a group of 20 WRCC Ambassadors and staff to tour the new Worcester Regional Transit Authority (WRTA) maintenance facility at 42 Quinsigamond Avenue, Worcester. The tour was conducted by Jim Parker, General Manager of Central Mass Transit Management Inc. (CMTM), which operates and maintains all of the WRTA buses and facilities.

Touring Maintenance Facility

Created in 1974, the WRTA is the second-largest regional transit authority in Massachusetts, servicing Worcester and its surrounding 37 communities. WRTA buses typically run continuously from early morning through midnight (with some holiday exceptions); seven days a week, 365 days a year.

The WRTA’s new, 156,000-square-foot facility is roughly double the size of the original, outdated garage, which was built in 1928 as a trolley barn. The new facility is large enough for 75 transit buses and 30 vans (the current fleet includes 52 buses), and has nine maintenance bays. Buses enter the facility and head to a refueling bay where they can get a wash, repairs, fluid checks and adjustments – even get repainted – before rolling back into service.

Window View from the Upstairs Office


The new facility is also home to significant, up-to-date technology, including a WRTA BusTracker app, Track by Text, Track by QR Code, and WRTA-schedule/ tracking Kiosks located throughout the city.

Control Center

All operations run through the sophisticated Control Center, which is continuously manned when buses are on the road.

In 2014, Bryley Systems – the Managed IT provider for CMTM and the WRTA – designed and deployed an IT-infrastructure platform to support the technologies listed above, but with managed redundancies to allow continuous operation. (For details, visit Transportation Company Relies on Bryley Systems to Stabilize Technology Platform and Create Blueprint for the Future for details.)