Bryley is on the move!
We expect to move in mid to late Fall.
We expect to move in mid to late Fall.
Raymond “Ray” Baldez successfully became MAC certified as an Apple Support Professional (ACSP). With this certification, Ray understands the MacOS core functionalities and has the knowledge to support MacOS users, manage their networks, and provide technical support.
The cost of a data breach
What causes a Small Organization to be a target?
The difference between larger vs. smaller organizations is that oftentimes the smaller organizations don’t always have the budget to be able to afford their own IT department.
“A survey published by Manta last month shows that 87 percent of small-business owners don’t feel that they’re at risk of a cybersecurity attack, and 1 in 3 small businesses don’t have the tools in place — firewalls, antivirus software, spam filters or data-encryption tools — to protect themselves.
“The general majority of small-business owners don’t have an IT person. It’s not the first place they spend their money,” said John Swanciger, CEO of Manta. “They’re really relying on themselves to update their software and check for security patches.”4
How can Small business owners limit their risk of an attack?
Firewalls allow you to either add or remove filters based on certain circumstances such as:
Working with a managed IT service provider can remove a lot of the burden and take away the mystery of proactive measures to protect your business.
Protecting your company’s data and infrastructure should be a top priority, but you do not need to do it alone. Let the Bryley experts help protect your company’s data and infrastructure. Please contact us at 844.449.8770 or by email at ITExperts@Bryley.com. We’re here for you.
1 “43 Percent Of Cyber Attacks Target Small Business”. Sophy, Joshua. 28 April 2016 – smallbiztrends.com
2 “CYBER SECURITY STATISTICS – Numbers Small Businesses Need To Know”. Mansfield, Matt. 3 Jan 2017 – smallbiztrends.com
3 “Why Ransomware Costs Small Businesses Big Money”. CNN Tech. Larson, Selena. 27 July 2017 – money.cnn.com
4 “Congress Addresses Cyberwar On Small Business: 14 Million Hacked Over Last 12 Months”. CNBC. Zaleski, Andrew. 5 Apr 2017 – cnbc.com
Phishing emails are malicious emails sent by criminals attempting to compromise your personal information. They often appear to be legitimate, so beware.
Most phishing emails are disguised as messages from an authoritative entity asking you to visit a website and enter personal information. These websites are set up to gather personal details, which they can then use to hack into your accounts and commit fraud. Some links and attachments in these emails contain malicious software, known as malware, which will install itself on your computer. Malware then collects data such as usernames and passwords. If you recognize these emails, delete them immediately.
Being informed about Phishing techniques and the current news relating to it is very important because new phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about them as early as possible, you will be at much lower risk of getting lured in by one.
Being able to recognize these emails will lessen your chances of being compromised. Here are some tips:
Hold on, there’s more…
“Spear Phishing”. Criminals who target specific individuals use what is called “spear phishing.” Spear Phishing emails are even more sophisticated than your run-of-the-mill phishing emails, often using personal information obtained from social media pages to make the emails appear credible. These cyber criminals might use your name or tailor the email to reflect your hobbies, interests, where you live or events that are happening locally. They may even make the email look as if it came from the organization you work for. People are sometimes targeted because of their position within the company or because they have access to sensitive data.
As a general rule, you should never share personal or financially sensitive information over the Internet. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”.
When in doubt, don’t click! Contact your IT administrator. And remember, legitimate organizations will never ask you to disclose personal data via email.
You can also report the scam to the FBI’s Internet Fraud Complaint Center at ic3.gov.
Bryley Systems specializes in protecting you from malware. Contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.
Read the case study about a particularly vicious cryptolocker attack that Bryley remediated.
Additional Resources:
“Notice Regarding Phishing Scam Targeting EDGAR Filers” – sec.gov
usatoday.com/tech/
apwg.org
After being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.
“Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™. We thank Channel Partners for this prestigious Channel Partners 360° award!”
– Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA
Each year, the Worcester Business Journal (WBJ) compiles and publishes a list of IT Service Providers throughout Central Massachusetts. The list, published on June 12, 2017, ranked Bryley Systems among the top 15 organizations surveyed. Rankings are determined based on survey results, federal filings and Web sites.
Bryley Systems, for the fourth-straight year, ranks among the world’s most progressive 501 Managed Service Providers (MSPs), according to MSPmentor’s 10th-annual MSP 501 Worldwide Company Rankings. The top MSP 501 companies ranked this year include organizations from around the world and from diverse technology and business backgrounds. Collectively, they amassed $14.48 billion in total revenue (based on 2016 results), up more than 15 percent from a year earlier. (The complete 2017 MSP 501 list is available at MSPmentor.net.)
“We are honored to be named to the MSP 501 for the fourth consecutive year.” said Gavin Livingstone, President of Bryley Systems. “It is a great honor and demonstrates our dedication to remain one of the top providers of managed IT services worldwide. We look forward to continuing to provide excellent service to our clients.”
“On behalf of MSPmentor, I would like to congratulate Bryley Systems for its recognition as an MSP 501 honoree,” said Aldrin Brown, Editor in Chief, MSPmentor. “The managed service provider market is evolving at a rapid pace and the companies showcased on the 2017 MSP 501 list represent the most agile, flexible and innovative organizations in the industry.”
The 2017 MSP 501 list is based on data collected by MSPmentor and its partner, Clarity Channel Advisors. Data was collected online from Feb. 16 through May 15, 2017. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, growth and other factors.
With an uptick in cyberattacks and phishing scams, we thought it prudent to provide some tips to avoid becoming a victim:
A periodic review of Business Security practices with users is recommended. Keep your business best practices along with computer security best practices in the forefront of your employees’ minds. Emphasis on how to handle emails that “look” like they could be legitimate will pay big dividends in terms of time and money.
Sending people email about what to do to keep your company secure will not be nearly as effective as taking the time to gather in a room for ½ an hour face-to-face to demonstrate the seriousness of the situation.
Bryley Systems specializes in protecting you from malware. Contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.
As they always said in the TV series “Hill Street Blues” at the end of the morning briefing, “Let’s be careful out there…”
Bryley Employees took some time to gather together and celebrate all that we have accomplished this year. We ventured out to Puzzlescape in Hudson, to see if we had what it took to get out! We are happy to announce that everyone safely escaped their respective rooms! Here are some photos from our adventure.
![]() |
![]() |
![]() |
Trudging through the pouring rain. | We did it! | Making our own Ice Cream Sundaes! |
It seems nearly everyone we know today has some sort of Social Media account. It keeps us connected with loved ones near and far, enables the sharing of personal and professional milestones, and provides information about current events. This is great as long as certain precautions are taken. Safety and security must be considered when doing anything online.
One must also remember that anything done online can be seen by anyone no matter how “private” the group may be. The rule to remember is “once it’s on the Internet, it’s there for all to see forever.” A group of incoming Harvard freshmen learned that lesson the hard way. Roughly 10 incoming freshmen saw their offers rescinded after it was discovered that they posted explicit memes and messages targeting minorities in a private Facebook group chat.1 These students learned a valuable, albeit costly, lesson, there is no such thing as private groups or messages when it comes to the Internet.
There are several steps that can be taken to protect your online reputation:
As much time as you take to curate your reputation in person, a similar amount of time, if not more, should be taken to manage your online reputation. In this day and age, perception is reality. Make sure you are the individual molding your digital persona.
1 Natanson, Hannah. The Harvard Crimson. “Harvard Rescinds Acceptances For At Least Ten Students For Obscene Memes” – thecrimson.com. 5 June 2017.
2 “Facebook Privacy Settings” – facebook.com/about/basics
3 Erskine, Ryan. Entrepreneur. “How To Protect Your Online Reputation In 2017” – entrepreneur.com. 23 Jan 2017.
4 O’Loughlin, Erin. Security Intelligence by IBM. “Identity Theft And Social Media: How Are They Related?” – securityintelligence.com. 5 August 2016.
Call our managed IT services department at (978) 547-7221 or fill out this form to set up a no-obligation, introductory call.
200 Union Street Clinton, MA 01510
© Copyright 2025 Bryley Systems Inc. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy | Accessibility Statement