Up Times
Up Times · February 2022
When we are looking for evidence we always seek the evidence that’s going to confirm the hypothesis. And we don’t look for disconfirming evidence. –Dean Ayanna Thomas of Tufts in a conversation with high-schooler Annie Wang
Let me help –Edith Keeler offering assistance to Kirk and Spock in Star Trek’s City on the Edge of Forever
When I saw the image, above, it looked ready to transport me to the future. But to someone not raised on American 20th Century sci-fi, it may look like a roll of wire fencing from a building site.
We see things differently. Even in the same neighborhood, we now bring different cultures to the table, where not long ago we could all only watch three TV networks. In 2019 a third of kids, per a Lego-commissioned study, wanted to be youtubers. That’s a lot of would-be influencers hoping for individual audiences. This move toward cultural fragmentation means we’ll need to rely on each other more than ever to make sense of – and in – the future.
This edition of Up Times is brought to you by people who have helped – like the folks at Heller Search giving Bryley a boost. Like Bryley’s Roy Pacitto, Tom Barnes, Courtney Leonard and Anna Livingstone who provided story and image suggestions. And it was Gavin Livingstone who initially gave me the heads-up about Kaspersky’s antivirus being barred from operating in the US.
A time-traveling-in-the-past Captain Kirk answers Edith Keeler that in the future the phrase let me help would rival the words I love you for significance. And let me help is a good way to put the role Bryley seeks to fulfill for your organization.
Risks in the Software Supply Chain
XDR (Extended Detection and Response) Can Help
Part of a Layered Security Approach
We all use software that is built on a foundation of strangers’ work. Even if you hire a developer to write a custom application, software calls trigger functions that were previously programmed by someone else. This means code weaknesses — put there either accidentally (like from mistyping) or maliciously by a criminal — end up in many different kinds of software. And these weaknesses can be exploited by criminals … [6 min. read] Continue Reading >
Heller Search Wins Best Client of July
And, yes, this sudden award has something to do with Heller Search sending Bryley ice cream!
To thank the Bryley team for its responsiveness – Heller Search sent Bryley a Cold Stone Creamery ice cream party. It was delicious and fun.
Also, I’d like to recommend you read Heller’s executive IT talent-focused newsletter the Heller Report.
Bryley-curated stories from around the internet:
Seen this in a Zoom meeting? – A cat comes strutting across a coworker’s desk and stands there pretending to be oblivious to having interrupted the agenda. But with cats and tech, things can turn from cute to ugly in an instant.
I heard about one of these cat-astrophes: a worker was at his laptop with his coffee cup beside the computer. His cat jumped up and knocked the coffee over onto the laptop. Yes, the laptop was lost – electrical connections and liquids do not mix. But this laptop was fully backed-up through Bryley Backup and Data Recovery (BUDR). BUDR for Endpoints means not only documents and applications are recoverable, but also the laptop’s settings. So this person was up and running again as efficiently as possible.
The question for you is: do you have Bryley’s BUDR for Endpoints coverage for your devices? Have a pet? Doesn’t it seem worth looking into BUDR? Think about that, why don’t you, while laughing at other peoples’ cats-will-be-cats videos … [5 min. watch] youtube.com
HIPAA and PCI DSS Compliance, what you should know – Bryley’s Manager of Client Services Tom Barnes showed me this article that gives a good overview of two far-reaching compliancies with general guidance about whether you need to be concerned with meeting these standards.
HIPAA is a federal law that establishes rules and practices that must be followed if you collect, store and transmit protected health information. HIPAA applies to doctors, dentists, pharmacies, hospitals, etc, and also to third-party vendors that access a medical provider’s personally-identifiable health database.
While the core principles of HIPAA are clear, complexities arise in applying them to various data types and situations … if you are unsure about whether a certain type of data is protected or not, it’s best to err on the side of caution and apply strong security measures, according to IT industry trade journal channele2e.
PCI DSS (Payment Card Industry Data Security Standards) is a set of protocols established by the major credit card issuers to protect cardholder data. If your organization collects, stores or transmits cardholder data you must comply with PCI DSS. Non-compliance can result in loss of processing privileges and fines.
PCI DSS compliance includes building and maintaining a secure network, using strong encryption for cardholder data and periodic vulnerability assessments.
If you need help determining if your organization needs to comply with PCI DSS and/or HIPAA consult with Bryley … [9 min. read] channele2e.com
Freezing out the bad guys – In a company meeting, VP of Client Services Anna Darlagiannis-Livingstone spoke about the importance of placing a credit freeze with the three main credit bureaus. Anna explained that a freeze keeps criminals who may have gotten your personal information via a data breach from being able to open credit cards or get other loans in your name. And Anna asked me to share about credit freezes here.
The federal Economic Growth, Regulatory Relief and Consumer Protection Act of 2018 contained the law that made credit freezes free. This was on the heels of the 148-million-record Equifax breach.
And for a fee every month from 2 of the 3 bureaus, they also offer credit locks that are similar, but are processed more quickly. Here’s a quick comparison of credit freezes and credit locks, both effective tactics for bolstering your personal security … [4 min. read] creditkarma.com
Kaspersky Labs to exit the US – The US government, once a client of Russian-headquartered Kaspersky Labs, has gradually stripped the antivirus company of its role in the US.
Citing national security concerns, last month the US Commerce Department announced a ban on the sale of Kaspersky software in the US. With the ban comes the end of virus-signature updates in the US, meaning the software’s virus-fighting effectiveness will shortly be out-of-date.
If your organization uses Kaspersky, Bryley can help it make the switch to another solution. Kaspersky made its name in part by not over-taxing system resources, Malwarebytes similarly is beyond speedy. Contact Roy Pacitto … [5 min. read] zetter-zeroday.com
Bryley’s Lawrence Strauss (left, behind the keyboards) played with the band Little Levity at WPI July 31 as part of the Summer Breeze Concert Series. This is the band’s sixth appearance as part of the lunchtime concerts. This year Worcester Polytech’s Registrar Michelle Borowski sang with the band on White Bird (originally from 1969 by It’s a Beautiful Day). Like that song, Little Levity plays a mix of early rock songs that also included Elvis’ That’s Alright, Ray Charles’ I’ve Got a Woman and the early Wilson Pickett single Let Me Be Your Boy … [2 min. read] wpi.edu
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, the New England Tech Newsletter in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).