dressing like workers fooled people to gain the criminals' access

Lessons from the Louvre: strengthening cybersecurity

On Sunday, October 19, 2025 at 9:30 AM four criminals approached Paris’ Louvre Museum and left seven minutes later with eight pieces of French royal jewelry containing 8,000 stones set in gold.

When these thieves targeted Napoleon-era crown jewels, they were exploiting specific vulnerabilities.

What in your organization is equivalent to France’s crown jewels? Meaning, what is most important? Is it your literal money in the bank? Is it advancements you’ve made in research and development? Is it your client data? What are you aware of that would make these vulnerable to theft? [10 min. read; audio available]

The Costs of Outsourcing IT

Download Bryley’s report, The Cost of Outsourced IT. It’s available to download with no obligation. The report presents a look at:

Outsourced IT costs depend on your business size, industry requirements, current infrastructure, and growth plans.

For instance what works for a regulated business might be overkill for a startup, while a low price may mean unwanted gaps in protection … [6 min. read]

Awfully quiet

A large part of Bryley’s mission is to make computer systems function so that the organizations that hire us can just go about their work with as few tech-related interruptions as possible. (The other large part is strategic consulting to optimize computer systems to help an organization achieve its goals.)

When you flip on a light, you expect it to work. Who considers the wiring in the walls, the breakers, the transformer outside the building, the larger transformer down the street, the overall grid? Electricity was meant to just work and around here it does. It’s invisible and reliable. And that’s how an organization’s IT systems should be, too … [6 min. read]

Taking Stock During Cybersecurity Awareness Month

Georgetown professor Cal Newport argues that not January, but the fall is the right time to start new projects, recommit to goals and check in on initiatives that are still at the ‘to-do’ stage and still feel important.

In this spirit here is a list of five things you can do now to improve your cybersecurity defenses. Perhaps you already have some of these things in place. If you do, October is a good time to take stock of how your organization is faring in these areas. As an example, CIO Magazine reports that more than 30% of IT managers believe their businesses are experiencing cloud-subscription creep – maybe services are redundant or just no longer useful … [8 min. read]

Cubicles and office workers

Guide to the Uptime Mindset

It’s hard to argue with the simple strategy of ‘fix it when it breaks.’ And when it comes to pencils and pens – absolutely. There is no risk in using these till you can’t anymore. Throwing a pencil away and picking up a new one is meaningless.

But the stakes are entirely different when it comes to how much organizations’ operations are now built on tech tools. If a server fails or becomes inaccessible or a database gets corrupted, the impact to many people in and outside of your organization can be great. And so the strategy for maintaining the operation of these tools should match the stakes … [6 min. read]

Summer retirement party

In honor of Audrey Baker and Scott Gold – This summer brought the retirement of two of Bryley’s long-time associates Scott and Audrey. … [2 min. read]

Endpoint Detection and Response, a guardian on the inside

Traditionally security was added at the perimeter – things like firewalls, passwords, MFA, etc. – creating a cordoned-off area in which we could get on with our work. What Bryley’s seeing lately are attempted attacks disguised as legitimate software. As an example, recently Endpoint Detection and Response (EDR) helped Bryley stop a data-exfiltration attempt that used two pieces of legitimate software (rclone [a file-copying program]) and Chrome Remote Desktop. Traditional perimeter defenses, dependable as they’ve been for years, would not be aware of good software being misused like this.

EDR at its core takes a behavioral approach to attacks. It watches systems for suspicious activities – like when a program suddenly attempts to encrypt dozens of files or when an unusual network connection appears during non-work hours … [4 min. read]

Bryley recognized as a regional top IT Services Provider

In Worcester Business Journal’s annual Book of Lists Bryley was ranked seventh largest among Central Massachusetts IT Services Providers. It gratifies us to see Bryley’s name listed near the top. And sincere thanks to the clients that have entrusted their IT support to Bryley. But is there any reason that the size of an IT operation should matter to you and your organization? [4 min. read]

 

MSP 501

Bryley Awarded 11th MSP 501

An IT-industry symbol of reliability

The MSP 501 award is meaningful in the IT industry. It’s a thorough 60-point evaluation that includes measures of growth and verified financials to identify IT providers with true operational strength.

The award is an independent endorsement, so organizations can better recognize which IT companies have built something solid and sustainable, worthy of their trust … [3 min. read]

Alarm clock

A Salt Typhoon Wake-Up

A Salt Typhoon wake-up

A vulnerability had a rare maximum severity score, but went unpatched

Chinese-state-backed hackers spent months inside America’s largest telecom networks, reading private messages from government officials and accessing law enforcement wiretap requests. The Salt Typhoon attacks compromised AT&T, Verizon, Charter and others by exploiting unpatched Cisco router vulnerabilities – vulnerabilities that were discovered and had patches released by the manufacturer up to seven years ago. Not only this, but among the vulnerabilities, one had a rare National Institute for Standards and Technology (NIST) severity score of ten – the very highest priority according to NIST’s calculus of what should be addressed.

As far as bottom-line relevance, first, there is a documented connection between the attack methods at the highest levels and cybercrime operations that go after businesses of all sizes; the heavy-hitters clear the paths that others imitate. But these breaches also reveal patterns that can teach us how to improve our defenses … [4 min. read]