Awfully quiet

A large part of Bryley’s mission is to make computer systems function so that the organizations that hire us can just go about their work with as few tech-related interruptions as possible. (The other large part is strategic consulting to optimize computer systems to help an organization achieve its goals.)

When you flip on a light, you expect it to work. Who considers the wiring in the walls, the breakers, the transformer outside the building, the larger transformer down the street, the overall grid? Electricity was meant to just work and around here it does. It’s invisible and reliable. And that’s how an organization’s IT systems should be, too … [6 min. read]

Taking Stock During Cybersecurity Awareness Month

Georgetown professor Cal Newport argues that not January, but the fall is the right time to start new projects, recommit to goals and check in on initiatives that are still at the ‘to-do’ stage and still feel important.

In this spirit here is a list of five things you can do now to improve your cybersecurity defenses. Perhaps you already have some of these things in place. If you do, October is a good time to take stock of how your organization is faring in these areas. As an example, CIO Magazine reports that more than 30% of IT managers believe their businesses are experiencing cloud-subscription creep – maybe services are redundant or just no longer useful … [8 min. read]

Cubicles and office workers

Guide to the Uptime Mindset

It’s hard to argue with the simple strategy of ‘fix it when it breaks.’ And when it comes to pencils and pens – absolutely. There is no risk in using these till you can’t anymore. Throwing a pencil away and picking up a new one is meaningless.

But the stakes are entirely different when it comes to how much organizations’ operations are now built on tech tools. If a server fails or becomes inaccessible or a database gets corrupted, the impact to many people in and outside of your organization can be great. And so the strategy for maintaining the operation of these tools should match the stakes … [6 min. read]

Summer retirement party

In honor of Audrey Baker and Scott Gold – This summer brought the retirement of two of Bryley’s long-time associates Scott and Audrey. … [2 min. read]

Endpoint Detection and Response, a guardian on the inside

Traditionally security was added at the perimeter – things like firewalls, passwords, MFA, etc. – creating a cordoned-off area in which we could get on with our work. What Bryley’s seeing lately are attempted attacks disguised as legitimate software. As an example, recently Endpoint Detection and Response (EDR) helped Bryley stop a data-exfiltration attempt that used two pieces of legitimate software (rclone [a file-copying program]) and Chrome Remote Desktop. Traditional perimeter defenses, dependable as they’ve been for years, would not be aware of good software being misused like this.

EDR at its core takes a behavioral approach to attacks. It watches systems for suspicious activities – like when a program suddenly attempts to encrypt dozens of files or when an unusual network connection appears during non-work hours … [4 min. read]

Bryley recognized as a regional top IT Services Provider

In Worcester Business Journal’s annual Book of Lists Bryley was ranked seventh largest among Central Massachusetts IT Services Providers. It gratifies us to see Bryley’s name listed near the top. And sincere thanks to the clients that have entrusted their IT support to Bryley. But is there any reason that the size of an IT operation should matter to you and your organization? [4 min. read]

 

MSP 501

Bryley Awarded 11th MSP 501

An IT-industry symbol of reliability

The MSP 501 award is meaningful in the IT industry. It’s a thorough 60-point evaluation that includes measures of growth and verified financials to identify IT providers with true operational strength.

The award is an independent endorsement, so organizations can better recognize which IT companies have built something solid and sustainable, worthy of their trust … [3 min. read]

Alarm clock

A Salt Typhoon Wake-Up

A Salt Typhoon wake-up

A vulnerability had a rare maximum severity score, but went unpatched

Chinese-state-backed hackers spent months inside America’s largest telecom networks, reading private messages from government officials and accessing law enforcement wiretap requests. The Salt Typhoon attacks compromised AT&T, Verizon, Charter and others by exploiting unpatched Cisco router vulnerabilities – vulnerabilities that were discovered and had patches released by the manufacturer up to seven years ago. Not only this, but among the vulnerabilities, one had a rare National Institute for Standards and Technology (NIST) severity score of ten – the very highest priority according to NIST’s calculus of what should be addressed.

As far as bottom-line relevance, first, there is a documented connection between the attack methods at the highest levels and cybercrime operations that go after businesses of all sizes; the heavy-hitters clear the paths that others imitate. But these breaches also reveal patterns that can teach us how to improve our defenses … [4 min. read]

Popcorn in a cinema machine as a way of showing being distracted and having your cybersecurity credentials stolen

Huntress ITDR in Action

Not all cybersecurity tools are equal – and there are a lot, so Bryley evaluates potential partners to offer an effective mix of security and value. This evaluation process helps us identify partners who provide reliable performance and whose products integrate well with our existing solutions.

We’re excited about the analysis and alerts that our partner Huntress’ Identity Threat Detection and Response (ITDR) has provided us. With several Bryley clients’ systems the ITDR has shown itself to be an invaluable tool … [5 min. read]

Atlantic puffin, an endangered bird – businesses that have not suffered a cyber-incident are getting to be rare

Achieving Business Continuity

An accountancy thought their daily backups were protecting their data. They thought encryption was protecting their data.

But weeks ago their office manager clicked a malicious link in an email. And nobody ever knew about it. Operations just continued as normal.

Until they didn’t … [6 min. read]