While most of the Bryley team works from the Clinton office, I’m physically distanced, writing at home. And as the days have grown to months in this work-from-home-if-you-can-work-from-home world, our perspectives change as our settling-in has changed us. So here’s a bit of remote work advice, for the times they are still a-changin’.
Another Friday in April, Bryley tried out Pajama Day. And it was again a lot of fun and informative!
Roy showed his true Patriot colors (Go Stidham!). Robin wore her awesome animal slippers (does she wear those to get the mail?). Michelle brought her well-loved blanket. Cathy was all about comfort — in her cotton flannels, and toting her coffee and a bit of chocolate therapy. The Legend of Zelda hooded robe donned by Lucas was fantastic (don’t recall if Link wore plaid pajamas? well he shoulda)! And Gavin was seen dragging around a green teddy bear (that an Okie thing?).
To bring a little levity during the crisis of the virus, the Bryley Team — essential services, so most are together at the office in Clinton, MA with some remoting — decided to have a costume day on Friday, April 3rd. The theme was ‘How About We Think About Any Other Year Besides 2020?’ And the thing actually delivered more than a few smiles and giggles around here. Here are some costume highlights:
Members of the Bryley Systems team were working weekends to meet our commitments, reduce interpersonal contacts, and keeping our clients operational; but everyone at BRYLEY SYSTEMS made it possible!
The office move
An office move is a complicated process, with many moving parts and plenty of vendors operating on inter-dependent schedules.
Over a Friday night and Saturday morning, our dedicated team members setup the network equipment and end-user workstations at our clients’ new facility; their efforts allowed the clients’ employees to return to work, with little disruption.
Among the top headlines in Google News’s Technology section today was criminal hackers use of AI (Artificial Intelligence) and its subset, ML (Machine Learning)1. Opening the article, I found a synopsis of a Tech Republic report, “Cybersecurity: Let’s Get Tactical,” in which the authors give ten ways cybercriminals are attacking with AI2 including
- phishing attacks, in which, upon gaining credentialed access, automatic scripts can wreak havoc, including draining bank accounts
- credential stuffing and brute force attacks, in which AI systems try passwords — and password possibilities — on many websites
- bulletproof hosting services that use automation to hide the tracks of malicious websites, so they can’t be stopped by law-enforcement, or often flagged by network scanning tools
The fact is, it’s an arms race. Both malware and criminal sites would be pretty quickly and easily identified on a network by the nature of their activity. So the criminals try to disguise their malware in benign code and their sites in bulletproof hosting schemes. The way they keep the ruse going is through machine learning adapting to changing circumstances.
Frank Walek has been recently hired as an IT Support Technician to operate Bryley Systems’ dispatch center. Mr. Walek graduated from the College of the Holy Cross, Worcester and has been working in customer service and support for the past ten years. He has worked for non-profit organizations and special education programs, developing a reputation […]
In July the World Economic Forum (WEF) delivered a paper1 that argued for putting the muscle of investment into shifting the cybersecurity landscape. WEF/Marsh & McLennan reports2 that among weapons of mass destruction and natural disasters, cyberattacks are seventh in likelihood and eighth in impact as the greatest threats to global prosperity.