Entries by Lawrence Strauss

CMMC is now active

What defense contractors need to know about CMMC going live – As of November 10, the Department of Defense (DoD) activated the Cybersecurity Maturity Model Certification (CMMC) program. The US government’s contracting officers can now require CMMC certification as a condition for awarding new contracts.

Without CMMC certification, businesses will no longer be awarded contracts or be able to work with the DoD when CMMC is specified in a solicitation (there is a window of grace and some exceptions). Understanding when this applies and how to prepare is essential to establishing or maintaining a position in the defense market … [8 min. read]

It takes AI to beat AI

For anyone who’s wrestled with the right way to say a thing, AI chatbots come across like a magic trick. And while OpenAI tries to dazzle us with a new announcement, criminal organizations have been figuring out how these technologies can make their operations faster and more efficient.

But let’s take a detour back through the mists of time to 2018. Before commonplace chatbots and diffusion image generators, bad guys had unleashed morphing malware to evade antivirus and anti-malware programs. Polymorphic malware was programmed to shape-shift, followed by more advanced morphing types that could also recognize a system’s defensive software and use evasion strategies tailored to its findings.

These are the sorts of attacks (and others like fileless or hard-drive-avoiding malware and insider threats) that led to the development of AI or ML (Machine Learning) defenses … [7 min. read]

Lessons from the Louvre: strengthening cybersecurity

On Sunday, October 19, 2025 at 9:30 AM four criminals approached Paris’ Louvre Museum and left seven minutes later with eight pieces of French royal jewelry containing 8,000 stones set in gold.

When these thieves targeted Napoleon-era crown jewels, they were exploiting specific vulnerabilities.

What in your organization is equivalent to France’s crown jewels? Meaning, what is most important? Is it your literal money in the bank? Is it advancements you’ve made in research and development? Is it your client data? What are you aware of that would make these vulnerable to theft? [10 min. read; audio available]

The Costs of Outsourcing IT

Download Bryley’s report, The Cost of Outsourced IT. It’s available to download with no obligation. The report presents a look at:

Outsourced IT costs depend on your business size, industry requirements, current infrastructure, and growth plans.

For instance what works for a regulated business might be overkill for a startup, while a low price may mean unwanted gaps in protection … [6 min. read]

Awfully quiet

A large part of Bryley’s mission is to make computer systems function so that the organizations that hire us can just go about their work with as few tech-related interruptions as possible. (The other large part is strategic consulting to optimize computer systems to help an organization achieve its goals.)

When you flip on a light, you expect it to work. Who considers the wiring in the walls, the breakers, the transformer outside the building, the larger transformer down the street, the overall grid? Electricity was meant to just work and around here it does. It’s invisible and reliable. And that’s how an organization’s IT systems should be, too … [6 min. read]

Taking Stock During Cybersecurity Awareness Month

Georgetown professor Cal Newport argues that not January, but the fall is the right time to start new projects, recommit to goals and check in on initiatives that are still at the ‘to-do’ stage and still feel important.

In this spirit here is a list of five things you can do now to improve your cybersecurity defenses. Perhaps you already have some of these things in place. If you do, October is a good time to take stock of how your organization is faring in these areas. As an example, CIO Magazine reports that more than 30% of IT managers believe their businesses are experiencing cloud-subscription creep – maybe services are redundant or just no longer useful … [8 min. read]

Guide to the Uptime Mindset

It’s hard to argue with the simple strategy of ‘fix it when it breaks.’ And when it comes to pencils and pens – absolutely. There is no risk in using these till you can’t anymore. Throwing a pencil away and picking up a new one is meaningless.

But the stakes are entirely different when it comes to how much organizations’ operations are now built on tech tools. If a server fails or becomes inaccessible or a database gets corrupted, the impact to many people in and outside of your organization can be great. And so the strategy for maintaining the operation of these tools should match the stakes … [6 min. read]

Endpoint Detection and Response, a guardian on the inside

Traditionally security was added at the perimeter – things like firewalls, passwords, MFA, etc. – creating a cordoned-off area in which we could get on with our work. What Bryley’s seeing lately are attempted attacks disguised as legitimate software. As an example, recently Endpoint Detection and Response (EDR) helped Bryley stop a data-exfiltration attempt that used two pieces of legitimate software (rclone [a file-copying program]) and Chrome Remote Desktop. Traditional perimeter defenses, dependable as they’ve been for years, would not be aware of good software being misused like this.

EDR at its core takes a behavioral approach to attacks. It watches systems for suspicious activities – like when a program suddenly attempts to encrypt dozens of files or when an unusual network connection appears during non-work hours … [4 min. read]

Bryley recognized as a regional top IT Services Provider

In Worcester Business Journal’s annual Book of Lists Bryley was ranked seventh largest among Central Massachusetts IT Services Providers. It gratifies us to see Bryley’s name listed near the top. And sincere thanks to the clients that have entrusted their IT support to Bryley. But is there any reason that the size of an IT operation should matter to you and your organization? [4 min. read]