Popcorn in a cinema machine as a way of showing being distracted and having your cybersecurity credentials stolen

Huntress ITDR in Action

Not all cybersecurity tools are equal – and there are a lot, so Bryley evaluates potential partners to offer an effective mix of security and value. This evaluation process helps us identify partners who provide reliable performance and whose products integrate well with our existing solutions.

We’re excited about the analysis and alerts that our partner Huntress’ Identity Threat Detection and Response (ITDR) has provided us. With several Bryley clients’ systems the ITDR has shown itself to be an invaluable tool … [5 min. read]

Atlantic puffin, an endangered bird – businesses that have not suffered a cyber-incident are getting to be rare

Achieving Business Continuity

An accountancy thought their daily backups were protecting their data. They thought encryption was protecting their data.

But weeks ago their office manager clicked a malicious link in an email. And nobody ever knew about it. Operations just continued as normal.

Until they didn’t … [6 min. read]

OneDrive’s Files On-Demand, Backup and Archiving

It’s on me. I never really examined the defaults, but I was surprised one day to learn Windows 11 by-default puts the files you’re working on on your bit of Microsoft’s OneDrive servers. I tried to work without internet access and the file I expected to have on my laptop was just a ghostly bookmark to my file on some distant, unreachable server … [6 min. read]

Garin Livingstone Becomes CEO

In a race to adopt the newest technology buzzword, it’s easy for any business to lose sight of its purpose. How much more so IT providers, who are in the thick of new tech introductions. I had the opportunity to speak with CEO Garin Livingstone about his refreshing perspective on IT service … [5 min. read]

M365 Copilot Amplifies a Security Problem

Its intentions are good, but Microsoft 365 Copilot can help and also hurt an organization. Its deployment should be carefully thought about … [6 min. read]

Bryley Among Boston Business Journal’s Top Growth Companies

Bryley has made the Boston Business Journal Fast 50 List thanks to the support of its loyal clients. A noteworthy “accomplishment to be one of the fastest growing private [Massachusetts] companies based on three years of growth,” said Peter Sande of the Boston Business Journal … [5 min. read]

TB

Tom Barnes Achieves Cybersecurity Certification

In his role as Director of Client Services, Tom Barnes had been helping clients navigate CMMC and other compliance regulations. To bolster Bryley’s compliance expertise, COO Anna Darlagiannis-Livingstone supported Tom in strengthening his knowledge of the security protocols that underlie CMMC and other standards.

And so, after his studying and testing, Bryley is excited to announce that Tom Barnes has become Certified in Cybersecurity through ISC2 … [5 min. read]

Hand of blame

How a Small Business Becomes a Liability

A plastics supplier sells parts to a major appliance manufacturer. The small business, focused on production, meeting deadlines and tight budgets, hasn’t prioritized cybersecurity. The small business relies on outdated equipment and software, has weak or default passwords on machinery and networked devices, and lacks properly configured firewalls. Employees are allowed to use personal devices on the company network. There is no formal security training program. These qualify the small business as a springboard for a cybercriminal operation seeking access to the larger, more moneyed appliance manufacture … [5 min. read]

Why you should care about BEC

… within a week of my business partner and I taking over the retail space, we were visited by a firefighter in a firefighting suit who said that because the business had changed hands he needed to inspect the location for safety violations. He walked around and pointed out problems with extension cords, wiring, circuits, fixtures and junction boxes and left us with a notice saying that if we did not have his substantial violations corrected within 30-days the doors would be padlocked. We panicked.

But it turns out the firefighter’s uniform, a sign of trust, had been exploited to intimidate us. This mirrors what happens with Business Email Compromise (BEC). Like the firefighter used a symbol of trust to gain access, BEC attackers use trusted email communication to infiltrate your organization and steal funds … [6 min. read]

Anna

To Strengthen Operations Anna Darlagiannis-Livingstone Named COO

… motivated employees are going to provide better service, leading to happier clients
–COO Anna Darlagiannis-Livingstone

Anna Darlagiannis-Livingstone’s role has evolved from Vice President of Client Services to Chief Operating Officer. This title change reflects Anna’s focus on keeping day-to-day operations on track and making sure teams have the tools and support they need. By improving processes, supporting staff and streamlining workflows, Anna will help create a more efficient and well-functioning environment so Bryley can stay focused on serving clients … [6 min. read]