
|
Per-device features |
Basic |
|
|
Response to network-critical issues |
Within four hours. |
Within four hours. |
|
Response to non-critical issues |
Within eight hours. |
Within eight hours. |
|
Performance optimization |
Included |
Included |
|
Security optimization |
Included |
Included |
|
Monitoring and alerts |
Included |
Included |
|
File and patch updates |
Included |
Included |
|
Reporting |
Included |
Included |
|
Administration |
Included |
Included |
|
Reliability optimization |
Partial |
Included |
|
Software issues |
Partial |
Included |
|
Hardware issues |
Partial |
Included |
|
Network issues |
Partial |
Included |
|
PC imaging |
Included |
|
|
On-site response |
Included |
Crunching the Patching Numbers
/in Blog Post, Managed IT, Security /by RPacittoThere were 16,516 Common Vulnerabilities and Exposures (CVEs)1 published in 2018. The time needed to analyze the relative importance of these to your organization would be something like 16,516 alerts times fifteen minutes to read and assess each one, which works out to about 500 days of work. If you decide that your organization is affected by twenty percent of these, that’s 3,304 vulnerabilities times an average of about an hour to patch each one — that will take about 40 days. And how many devices do you have that need this patch deployment? 2
Our New Sign
/in Announcement, Blog Post /by Cathy LivingstoneBryley Systems was awarded a $3,500 grant from the Town of Clinton’s Downtown Commercial Improvements Program. This Program, which is funded jointly by the Massachusetts Department of Housing and Community Development, makes funds available to business and property owners who wish to make improvements to their property. With funds from this grant, Paul Tucker of Sign Logic, transformed the Bryley logo into a visually interesting sign, complimenting the company’s historic building at 200 Union Street.
The Curious Case of Windows 7 Legacy Apps
/in Blog Post, Microsoft, Tips /by RPacitto“Support for Windows 7 is Coming to an End. … January 14, 2020 …” nagged a Windows 7 screen last week.
Like any other piece of technology, Operating System software gets obsolete. The obsolescence comes in the form of vulnerabilities to hackers, who get rich knowing how to look for and exploit these weaknesses in the code, compromising the contents of your computer and network.
Bryley Systems Ranks Among Top 501 MSPs for 6th Consecutive Year
/in Blog Post, Press Release /by Cathy LivingstoneFor the sixth consecutive year (2014 through 2019), Bryley Systems Inc. has been named as one of the world’s premier managed IT service providers via the prestigious Channel Futures MSP 501 rankings.
Every year, MSPs worldwide complete an extensive survey and application to report their product offerings, growth rates, annual total and recurring revenues, pricing structures, revenue mix and more. MSPs were ranked according to a unique methodology that weights revenue figures according to how well the applicant’s business strategy anticipates trends in the fast-evolving channel ecosystem.
Retired Bryley employees celebrate 65th anniversary
/in Announcement, Blog Post /by Garin LivingstoneOn June 12, 1954, James K. Livingstone married Shirley M. Byerly*; both former employees of Bryley Systems, with Jim’s tenure extending from 1988 through his retirement in 2013. (Shirley’s was employed at Bryley Systems in the late 1980s.)
The wedding ceremony was conducted at a local church, after which the group congregated at 6pm at Shirley’s parent’s home in Pansy, PA. (Pansy is 17 miles north of Punxsutawney, PA; it is farm and (was) coal country where the local population remains sparse, but slightly larger than when Shirley went to the area’s one-room schoolhouse where grades K through 12 sat together; upon entering school, Shirley was immediately promoted from first grade to second grade due to her being the only first grader in the room.)
Did You Feel a Drop? BUDR Pt. 2
/in Blog Post, Data-Backup, Security /by RPacittoRemember the panicked manufacturer with a progression of computer problems that recalled the proverbial “perfect storm”? Today I’m going to sort those problems out, and recommend ways to help keep those things from happening to you. To refresh, here’s what went on with that manufacturer:
The installed version of their ERP (Enterprise Resource Planning software) was too old to receive application maintenance and support. They hadn’t wanted to interrupt their workflow, and so hadn’t upgraded the ERP in more than five years.
When and How to Stop Google Chrome From Running in the Background
/in Blog Post, Newsletter, Tips /by 3mediawebBy default, when you close Google Chrome, the browser window closes, but the application itself continues to run in the background. There are a few reasons for this. First and foremost, this makes it faster to open a new browser window. Since Chrome is already running in the background, there is less that has to […]
It is time to consider upgrading from Windows 7
/in Blog Post, Newsletter, Security /by Garin LivingstoneThere are plenty of reasons to upgrade from Windows 7 before it reaches its end of life date on January 14, 2020. Chief among them, Microsoft has indicated that, on this date, they will stop releasing security updates for Windows 7. This will have major implications for anyone still running Windows 7, as it will […]
Ray Baldez and Tony Fierimonte Complete Cisco SMB Select Partner Certification
/in Announcement, Blog Post, Newsletter, Press Release /by Cathy LivingstoneBryley is pleased to announce that Tony Fierimonte and Ray Baldez have completed the training and testing to become certified Cisco Small and Midsize Business (SMB) Account Representatives. These certifications augment Bryley’s expertise as a Cisco SMB Select Partner.
The Snoopiness of Things
/in Blog Post, Newsletter, Security, Tips /by 3mediawebThe 2015 Arkansas murder case that depended on smart-home devices, made the news again as the judge in the civil case upheld his ruling that James Bates is financially liable for the death of Victor Collins. The case against the accused was built on, among other forensics, records from Amazon whose Echo device was installed by the scene of Collins’ death, as well as evidence from a so-called smart meter. The smart meter reported inordinate usage of water around the time of death, which led the police to argue that a bloody patio was hosed down.
Avoiding the Perfect Storm
/in Blog Post, Data-Backup /by RPacittoA nearby manufacturer called Bryley panicked. The problems started with a failed upgrade to their ERP (Enterprise Resource Planning software). Because they hadn’t wanted to interrupt their workflow, the company hadn’t upgraded the ERP in more than five years. But the installed version was now beyond maintenance and support, so they bit the bullet. Only, during the upgrade there was a power fluctuation so that the upgrade did not complete. In fact no computer on the network would boot normally. In addition while trying to resolve the failed upgrade, they found a flaw in their in-house back-ups. Now the business was losing days and money to downtime.
World Backup Day 2019
/in Blog Post, Data-Backup /by 3mediawebCelebrated On March 31st Data is essential to us all. We rely on it complete even the most basic daily tasks, and yet it is so easy to take for granted. World Backup Day was established to remind us of the importance of data in our lives, and why we must make a sincere effort […]
GDPR and You
/in Blog Post, Newsletter, Security /by Garin LivingstoneSurprised that in the last month, between two small marketing list brokers, more than a billion personal records were found to have been leaked on the internet?1
That data then gets leaked and sold to potentially hold users’ computers or reputation for ransom. Or as in a 2018 hack, of DNA tester, MyHeritage, there is the ability to sell the data to the insurance and mortgage industries, revealing DNA disease susceptibilities, thereby making the user ineligible for coverage or a loan.2
GDPR to the Rescue!
From Farm to Bryley’s Table
/in Blog Post, Events /by Cathy LivingstoneBryley’s client, Wilson Farm, is an upscale market for farm-fresh produce, home baked goods and prepared foods. On Sunday, we took a trip to their farm stand and came home with delicious prepared gourmet dinners, fruits and treats. For our employees, we bought them a beautiful cake decorated as a present and Monday became “Cake […]
Best Practices for Using Social Media
/in Blog Post, Newsletter, Tips /by Garin LivingstoneA sense of belonging, a sense of community and for businesspeople, a touchpoint for customer service and the ability to market to specific demographics are among social media’s benefits. And like every technology, social media – by which I mean websites that offer sharing tools that allow people to interact (e.g. Instagram, Twitter, SnapChat, Facebook, YouTube) – have their drawbacks.
Garin Livingstone Promoted to Director of Operations
/in Announcement, Blog Post, Press Release /by Cathy LivingstoneBryley Systems Inc. is pleased to announce Garin A. Livingstone as Director of Operations. Mr. Livingstone will be responsible for business leadership and vision as well as the day-to-day operations and performance of the company. “We are team-oriented at Bryley Systems,” said Livingstone, “and I look forward to continue working within a collaborative environment, providing […]
Virginia Livingstone Promoted to Director of Technical Services
/in Announcement, Blog Post, Press Release /by Cathy LivingstoneBryley Systems Inc. is pleased to announce Virginia Livingstone as Director of Technical Services. “Ms. Livingstone will lead our technical-services team,” states Gavin Livingstone, Bryley’s President, “while expanding and providing the highest-level of service quality and client care.” Early 2017, Virginia joined Bryley Systems, bringing with her over 20 years’ experience troubleshooting and diagnosing client […]
National Battery Day 2019
/in Blog Post /by 3mediawebNational Battery Day is observed on February 18, 2019. Think on that day about the usefulness of the batteries – and charging some up again, if you like. Recognize, just how important the simple battery is to our way of life. In electricity, a battery is a device consisting of one or more electrochemical cells […]
Safer Internet Day!
/in Blog Post, Security /by 3mediawebTuesday, February 5th is Safer Internet Day. Being observed on the first Tuesday in February, what started out as a campaign to raise awareness about Internet safety is now celebrated in over 100 countries worldwide. With Valentine’s Day just around the corner, many of us will go online for gifts such as flowers, candy, cute […]
Cryptojacking: Are you funding cybercrime without even knowing?
/in Blog Post, Security /by 3mediawebIn 2017 we saw cybercriminals adopt a whole new approach to generating value from malware. Rather than stealing information or encrypting a victim’s files and demanding a ransom, cybercriminals started discretely hijacking computer systems and using them to generate cryptocurrency. In 2018, cryptojacking became one of the most prevalent forms of malware on the internet. The question to ask yourself in 2019 is “can I spot such an attack and, if I can, what do I do about it?”