MSP 501

Bryley Awarded 11th MSP 501

An IT-industry symbol of reliability

The MSP 501 award is meaningful in the IT industry. It’s a thorough 60-point evaluation that includes measures of growth and verified financials to identify IT providers with true operational strength.

The award is an independent endorsement, so organizations can better recognize which IT companies have built something solid and sustainable, worthy of their trust … [3 min. read]

Alarm clock

A Salt Typhoon Wake-Up

A Salt Typhoon wake-up

A vulnerability had a rare maximum severity score, but went unpatched

Chinese-state-backed hackers spent months inside America’s largest telecom networks, reading private messages from government officials and accessing law enforcement wiretap requests. The Salt Typhoon attacks compromised AT&T, Verizon, Charter and others by exploiting unpatched Cisco router vulnerabilities – vulnerabilities that were discovered and had patches released by the manufacturer up to seven years ago. Not only this, but among the vulnerabilities, one had a rare National Institute for Standards and Technology (NIST) severity score of ten – the very highest priority according to NIST’s calculus of what should be addressed.

As far as bottom-line relevance, first, there is a documented connection between the attack methods at the highest levels and cybercrime operations that go after businesses of all sizes; the heavy-hitters clear the paths that others imitate. But these breaches also reveal patterns that can teach us how to improve our defenses … [4 min. read]

Popcorn in a cinema machine as a way of showing being distracted and having your cybersecurity credentials stolen

Huntress ITDR in Action

Not all cybersecurity tools are equal – and there are a lot, so Bryley evaluates potential partners to offer an effective mix of security and value. This evaluation process helps us identify partners who provide reliable performance and whose products integrate well with our existing solutions.

We’re excited about the analysis and alerts that our partner Huntress’ Identity Threat Detection and Response (ITDR) has provided us. With several Bryley clients’ systems the ITDR has shown itself to be an invaluable tool … [5 min. read]

Atlantic puffin, an endangered bird – businesses that have not suffered a cyber-incident are getting to be rare

Achieving Business Continuity

An accountancy thought their daily backups were protecting their data. They thought encryption was protecting their data.

But weeks ago their office manager clicked a malicious link in an email. And nobody ever knew about it. Operations just continued as normal.

Until they didn’t … [6 min. read]

OneDrive’s Files On-Demand, Backup and Archiving

It’s on me. I never really examined the defaults, but I was surprised one day to learn Windows 11 by-default puts the files you’re working on on your bit of Microsoft’s OneDrive servers. I tried to work without internet access and the file I expected to have on my laptop was just a ghostly bookmark to my file on some distant, unreachable server … [6 min. read]

Garin Livingstone Becomes CEO

In a race to adopt the newest technology buzzword, it’s easy for any business to lose sight of its purpose. How much more so IT providers, who are in the thick of new tech introductions. I had the opportunity to speak with CEO Garin Livingstone about his refreshing perspective on IT service … [5 min. read]

M365 Copilot Amplifies a Security Problem

Its intentions are good, but Microsoft 365 Copilot can help and also hurt an organization. Its deployment should be carefully thought about … [6 min. read]

Bryley Among Boston Business Journal’s Top Growth Companies

Bryley has made the Boston Business Journal Fast 50 List thanks to the support of its loyal clients. A noteworthy “accomplishment to be one of the fastest growing private [Massachusetts] companies based on three years of growth,” said Peter Sande of the Boston Business Journal … [5 min. read]

TB

Tom Barnes Achieves Cybersecurity Certification

In his role as Director of Client Services, Tom Barnes had been helping clients navigate CMMC and other compliance regulations. To bolster Bryley’s compliance expertise, COO Anna Darlagiannis-Livingstone supported Tom in strengthening his knowledge of the security protocols that underlie CMMC and other standards.

And so, after his studying and testing, Bryley is excited to announce that Tom Barnes has become Certified in Cybersecurity through ISC2 … [5 min. read]

Hand of blame

How a Small Business Becomes a Liability

A plastics supplier sells parts to a major appliance manufacturer. The small business, focused on production, meeting deadlines and tight budgets, hasn’t prioritized cybersecurity. The small business relies on outdated equipment and software, has weak or default passwords on machinery and networked devices, and lacks properly configured firewalls. Employees are allowed to use personal devices on the company network. There is no formal security training program. These qualify the small business as a springboard for a cybercriminal operation seeking access to the larger, more moneyed appliance manufacture … [5 min. read]