How Worcester Industries Are Adapting to Modern IT Solutions
Worcester’s economic landscape is evolving rapidly, presenting savvy leaders with the opportunity to capitalize on emerging trends and strengthen thei…

Lawrence writes about networking and security. He's written for Bryley since 2015.
Worcester’s economic landscape is evolving rapidly, presenting savvy leaders with the opportunity to capitalize on emerging trends and strengthen thei…
And this creates risk … [4 min. read]
On the surface that may feel like a relief, but that’s not the whole story.
That old password in the report comes associated with a company email address. If that address is active, criminals have the start of a dossier … [5 min. read]
AI defenses work along the general premise that when an action occurs or data is accessed in an unexpected way, the action can be halted and a human investigator notified to learn if the action was benign or malicious. These tools are helpful as criminal attacks have been developed that can shape-shift to evade the standard means of detection … [7 min. read]
Recently the post office announced it’s changing the date-stamping part of its automation. It now makes more sense to the USPS to hand-stamp the few pieces that still need today’s date recorded on the mailpiece. Automation routines are not permanent – it only makes sense when the volume justifies the complexity.
You may have looked around your place of business and thought, ‘there must be waste in the routine and manual.’ Three years ago ChatGPT arrived with an influx of automating-promising AI tools. Because of the endlessness and variety of internet promises, it’s easy to not think strategically about what AI can realistically do for your organization … [4.5 min. read]
Managed IT services offer organizations a powerful lever for growth by providing scalable solutions that optimize performance, enhance security, and f…
Without CMMC certification, businesses will no longer be awarded contracts or be able to work with the DoD when CMMC is specified in a solicitation (there is a window of grace and some exceptions). Understanding when this applies and how to prepare is essential to establishing or maintaining a position in the defense market … [8 min. read]
But let’s take a detour back through the mists of time to 2018. Before commonplace chatbots and diffusion image generators, bad guys had unleashed morphing malware to evade antivirus and anti-malware programs. Polymorphic malware was programmed to shape-shift, followed by more advanced morphing types that could also recognize a system’s defensive software and use evasion strategies tailored to its findings.
These are the sorts of attacks (and others like fileless or hard-drive-avoiding malware and insider threats) that led to the development of AI or ML (Machine Learning) defenses … [7 min. read]
When these thieves targeted Napoleon-era crown jewels, they were exploiting specific vulnerabilities.
What in your organization is equivalent to France’s crown jewels? Meaning, what is most important? Is it your literal money in the bank? Is it advancements you’ve made in research and development? Is it your client data? What are you aware of that would make these vulnerable to theft? [10 min. read; audio available]
Outsourced IT costs depend on your business size, industry requirements, current infrastructure, and growth plans.
For instance what works for a regulated business might be overkill for a startup, while a low price may mean unwanted gaps in protection … [6 min. read]
Bryley Systems helps you get dependable results from your technology investment at a predictable cost. We are a full-service partner, fulfilling the information-technology needs of our clients throughout central New England since 1987

