Up Times
Up Times · February 2022
Business continuity is the planning and process by which organizations maintain operation, not severely disrupted by a disaster or other unwanted incident. Helping you achieve business continuity is Bryley’s mission.
Your tech hopes – We didn’t pick the language of business continuity to rank with a search engine (in fact we learned through marketing research that IT Services is Google’s preferred term for our kind of work).
But the thing we couldn’t escape was that business continuity was the better answer to tell Bryley’s reason for being. Business continuity is Bryley’s standard. For us to help our clients attain business continuity would be to fulfill Bryley’s contribution to its business community.
Tech is well-known for bringing possible disruptions: crashes, outages, updates, patches, nation-state actors, cybercrime. Bryley’s aim is to help proactively plan for and implement solutions that will optimize business continuity, in order for our clients have more dependable access to their data. If we do that job well, you end up with more of just the helpfulness that tech promises – so you and your team can better realize the reasons you invested in the technology to begin with.
IT Services maybe a good-enough label, but it doesn’t begin to explain why Bryley has kept its role for so many clients for so many years. We’ve collected some explanations from clients on the Why Bryley? webpage; scroll down to read how they express Bryley’s role. I think you can sum these up pretty well with the phrase business continuity. But I’d like to know how you see Bryley being of help to your organization.
Hitting a Particular Target
Bryley Partner Huntress Releases its 2024 Threat Report
Its main findings involve ransomware changes and the abuse of remote access software
Last year the FBI announced a major, international disruption to a ransomware-delivering botnet (botnets are networked, task-executing computers). While to be celebrated, from the new data it doesn’t look like ransomware criminals have given up – they have found other ways of stealing and causing havoc.
According to Huntress’ researchers ransomware continues to be a significant and growing threat that affects businesses of all sizes. Over the past year cybercriminals have ramped up their efforts to exfiltrate sensitive data so they can extort large sums of money. And in 2023 until now Huntress’ data scientists have seen a shift in adversarial tactics, with threat actors using trusted tools – like remote access software – to exploit vulnerabilities … [5 min. read] Continue Reading >
A Business Continuity Dictionary
Volume 1 • From Anti-Malware to Backup and Data Recovery
The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too.
Because cyberthreats affect all of us, it’s good for everyone to have a basic understanding of the terminology and principles that underpin cybersecurity.
So by familiarizing yourself with these terms, you will be better prepared to engage in discussions, make informed decisions and implement helpful security measures in your organization … [7 min. read] Continue Reading >
Bryley-curated stories from around the internet:
What can you do? – The recent so-called MOAB (mother of all breaches), reported in July’s Up Times, means this is a good time to increase your security measures.
Check if your email address or addresses have shown up in breaches at haveibeenpwned.com. This particular breach is displayed on the haveibeenpwned.com site as National Public Data, the data broker that seems to have been the source of the leaked data. The site also shows that social security numbers are among this leaked data.
So get a credit freeze or lock. And take steps to guard your social security number, as explained in this investopedia piece … [7 min. read] investopedia.com
Can’t go wrong here – The New York Times compiled this hierarchy of personal security practices and their associated time and money investment. Many of the practices they advocate are quick and free.
Top among the security practices is having strong passwords and not reusing them from site to site (and reuse includes barely changing them). Bryley’s recommendations about what makes for a strong password is here (the principles are the same as in the Times).
Also consider the advice about using alternate email addresses and phone numbers on websites when possible – like the anonymizers via Apple’s iCloud or simplelogin.io. Though less conventional, it’s a similar tactic to having a different password at each website … [the overview can be read in about 15 min.] nytimes.com
… it was abstract, part of a murky continuum of financial crimes aided by technology – At the time of her daughter’s wedding Globe Magazine reporter Linda Matchan was defrauded of $5000. Matchan spent two years to try and uncover what went amiss and try to find some kind of justice.
She writes that after futilely trying to get resolution with the bank on the phone over the course of days, she drove the three-and-a-half hours from Boston to learn for herself from a Saratoga Springs bank employee that, someone had actually come into the bank and spoken to a teller, presented a driver’s license, and then correctly answered some authentication questions ...
Was this bank perpetrator just a front for a well-funded mob? Who are the federal and state laws set up to protect? Along the way she discovered other countries’ much better governmental safeguards.
For Matchan the stress of getting her bank statement each month and the actual nightmares persist … [25 min. read] bostonglobe.com (paywall)
Nothing is real maybe – This image turns out to be AI-generated. It’s among those I got wrong on the Northwestern test linked in this article from the MIT Media Lab. The MIT researchers tell you the signs to look out for. But some of the generated images are awfully good. Looking again – those jeans are a bit wrinkled weird, the knuckles are off on the bow hand and the fingers on the neck are kind of missing the neck. Do we need to become experts at this? Maybe you heard about the fake Kamala Harris video. (oh, and the Northwestern test is lacking some images, but it’s still worthwhile and unsettling) … [4 min. read] media.mit.edu
Anatomy of a Business Email Compromise scam – Gallery owner Jason Horjes played along with criminals to see what their game was. And they tried to manipulate him with flattery, urgency, anger and a big, fat, good-looking, worthless check (or two) … [10 min. read] reddotblog.com
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, the New England Tech Newsletter in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).