Up Times
Up Times · April 2025
And that has made all the difference. –Robert Frost
When I finish a day’s work I head up to the hills for a hike … as my surface mind empties with the walk, I know another part will chime in and start talking … Steven Pressfield writes. He continues that the voice makes revisions to his work, and the process is so common we don’t even notice. But it’s a miracle … insights pop into our heads while we’re [hiking or] shaving or taking a shower …1
It’s hard to value not having an answer, even though it’s in the discovery process’s silence that breakthroughs come.
Still sometimes we want an answer so bad we take shortcuts.
Last year the ASCII Group of IT-service providers (Bryley’s a member) drafted its first responsible-use of AI document to advise end-users about the implications of chatbot use.
As far as data management, AI-chatbot use is not unlike emailing: An email does not go straight to the recipient, Fortinet explains, it travels between networks and servers, some vulnerable and unsecured, before landing in an inbox.2
And it’s a similar situation with AI chatbots. Interactions generally are free in order to train the models. Models have been compromised, corrupted and unstable. And there are data-management issues of even local instances of Large Language Models (LLMs), too.
The emphasis on User Interface design that has made chatbots so appealing-to-use, means the temptation to use them without sound thinking will continue. Bryley can advise about a data strategy and employee training that consider how to most securely integrate chatbots into your workflow. This would be in the spirit of Pressfield’s observation about stepping back from the day-to-day to let better insights come.
1 Steven Pressfield, War of Art, 2002
2 https://www.fortinet.com/resources/cyberglossary/email-security

Bryley has been an MSP 501 recipient for eleven years
Bryley awarded 11th MSP 501
An IT-industry symbol of reliability
The MSP 501 award is meaningful in the IT industry. It’s a thorough 60-point evaluation that includes measures of growth and verified financials to identify IT providers with true operational strength.
The award is an independent endorsement, so organizations can better recognize which IT companies have built something solid and sustainable, worthy of their trust … [3 min. read] Continue Reading >

These breaches reveal patterns of behavior that can show how to improve defenses
A Salt Typhoon wake-up
A vulnerability had a rare maximum severity score, but went unpatched
Chinese-state-backed hackers spent months inside America’s largest telecom networks, reading private messages from government officials and accessing law enforcement wiretap requests. The Salt Typhoon attacks compromised AT&T, Verizon, Charter and others by exploiting unpatched Cisco router vulnerabilities – vulnerabilities that were discovered and had patches released by the manufacturer up to seven years ago. Not only this, but among the vulnerabilities, one had a rare National Institute for Standards and Technology (NIST) severity score of ten – the very highest priority according to NIST’s calculus of what should be addressed.
As far as bottom-line relevance, first, there is a documented connection between the attack methods at the highest levels and cybercrime operations that go after businesses of all sizes; the heavy-hitters clear the paths that others imitate. But these breaches also reveal patterns that can teach us how to improve our defenses … [4 min. read] Continue Reading >

We adapt to AI’s limitations, not vice versa
Linguistics Professor Emily Bender on AI
Computer History Museum interview
We very quickly learn you can only ask [a Magic 8-Ball] yes/no questions if you want to have a successful conversation…and we’re doing the same thing with chatbots. We are telling ourselves a story as we put an input into the chatbot so that we can use that story to make sense of what comes back, Dr Bender said in her talk with David Brock.
I knew a kid in 4th grade that used to keep a Magic 8-Ball in her bag and consult it for, I don’t know, who to sit with at lunch.
Using chatbots, we’re getting fluent in AI-prompting, like we learned to hone our Google searches, but the effect on us is pretty unconscious.
Dr Bender shows how we adapt our thinking to accommodate AI’s limitations. We’re adjusting our prompts – so therefore our thoughts – to fit what we believe AI can handle (a college professor friend told me he can’t get the post-ChatGPT students to come up with ideas without consulting their AI 8-Ball).
Dependency risks stunting our thinking. And then it’s easy to mistake the AI answers for AI understanding (we’re the one’s doing the understanding bit).
Is it a fair deal, to train ourselves to think in a way to yield better AI answers, and risk our own potential good sense? [37 min. watch] youtube.com

Just because something worked when it was new, doesn’t mean it won’t need attention down the road
Salt Typhoon and patching
Steve Gibson has thoughts about the reported breaches of telecom companies, including Charter Communications
Salt Typhoon is a Chinese-state-backed hacking/spying group that has infiltrated, at the least (these are the one’s that have been reported), many US telecom companies.
It’s speculated that the infiltrated phone records give the Chinese fairly complete information about the whereabouts of US government officials, business leaders, competitors, and no telecom is sure that the spying has ended.
But one thing about these telecom companies that really upsets Steve Gibson as he explains on his Security Now podcast, is that the compromised entry-points were routers that had been patched by the manufacturer Cisco years ago, but the telecoms did not apply these patches … [2 hr. listen] twit.tv

How much privacy remains possible?
Practical privacy
A friend told me that there is no privacy if we carry cell phones. Partly true.
I found this Electronic Frontier Foundation’s (EFF) guidance helpful in giving an overview of what’s happening with devices and software that compromise our privacy.
Yes, EFF admits to limitations in what we can do to prevent triangulating our locations if the devices are on and in our pockets, but Warren and Brandeis witnessed and foresaw a kind of intrusion that in their words, both belittles and perverts our lives. Belittles by exaggerating the importance of what may be trivial in the breadth of our lives. Perverts by being able to access and using select words or actions against us. Except in genuine criminal cases, who benefits by this kind of access and scrutiny?
EFF offers a guide of what we can do whether or not we carry Android or Apple phones with us … [10 min. read] eff.org

The 10-year moratorium to stay individual states’ regulatory power over AI was stopped loudly, bipartisanly in the Senate
States retain their rights to regulate AI
Speaking of privacy concerns and looking for a bit of accountability from Big Data, the federal government will not be able by law to limit states’ rights to represent their citizens’ interests concerning the AI-tech mammoths.
And loss of privacy and personal and business information are concerns of AI-chatbot use – the more data we put in, the more of a challenge it is for Google, Meta, Amazon, etc. to control.
Sure, the chatbot agents have a nice interface, but how sure are we about the code on which these various platforms are built? [4 min. read] arstechnica.com

Lessening the impact of mistakes
To err is human
Minimizing employee risks
One of 2024’s most prominent breaches, the Change Healthcare cyberattack, was attributed to human risk. A low-level employee’s credentials were compromised through a phishing email, allowing the attackers to gain access to the network without multifactor authentication, enabling them to exfiltrate sensitive data and deploy ransomware.
Bryley partner Mimecast recommends steps to address and lessen human risk factors like limiting permissions (so if there’s an error, it can be contained to the extent of the responsible employee’s access) … [7 min. read] mimecast.com
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, useful tech news by New Englanders in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
-
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
Imagine using an MSP that isn’t Bryley Systems ... the only better MSP would be one from a technologically-superior species from another galaxy. –RM, Central Mass manufacturer
Don't settle
Call our managed IT services department at (978) 547-7221 or fill out this form to set up a no-obligation, introductory call.
Fill in this quick form. Pick a time for a call. A Bryley rep listen and plan the next steps with you.

Central MA Office
200 Union Street Clinton, MA 01510

Existing Customers

Sales Inquiries

© Copyright 2025 Bryley Systems Inc. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy | Accessibility Statement