Up Times
Up Times · February 2022
As Shira Ovide reports in the Washington Post (see, below), privacy and security work hand-in-hand: the more we allow our data to be collected, the more we risk our data being compromised.
Humans and their data are soon parted – Putting data on internet-connected machines straightaway puts organizations in a precarious spot. Organizations used to keep data on local, physical devices, which were pretty isolated from external threats. With the interconnectedness of systems and cloud computing, the potential for data breaches and unauthorized access has grown and grown.
And as actual data breaches have increased, government and industry bodies have upped their rules governing data privacy and security. These rules are designed as a baseline to protect individuals and entities the organizations interact with.
And through abiding by these rules, organizations can cut the risks of data losses and show their commitment to data protection. But governments and industry bodies can only take security so far. They have their own motives – industry groups want to avoid expensive lawsuits; politicians want to look good to stay in office. So compliance is not equivalent to consulting with a cybersecurity pro, though a cybersecurity pro can help you to be compliant.
It’s what you value
Consider that the more an organization respects the personal information trusted to it, the better the cybersecurity choices it will make. The problem is that even the most empathetic people may struggle to connect an organization’s collected data with the lives behind the data. In fact, there is a familiar discorrelation between face-to-face communicating and interactions that happen on the internet (I haven’t found an exact study, but the same internet tendency away from compassion probably holds true for interacting with a dataset).
Ken Tingle a data analyst at Cambridge Trust wrote about techniques to reconnect us to the people who provide the data we’re entrusted with: foster a natural curiosity about the data you are working with. Go beyond the numbers and seek to understand the context in which the data was generated. Ask questions … strive to unravel the stories and motivations behind the data.
Tingle advises that by pursuing empathy for the people behind the data, we can identify and mitigate biases, protect privacy, and ensure fair and responsible use of data.
What Bryley Did on Our Summer Outing
Friday, September 13, Bryley employees had a catered lunch at the office. And that’s where four bowling teams were chosen through a random drawing.
Then the Bryley bunch went down to Apex Entertainment in Marlborough … [2 min. read] Continue Reading >
A Business Continuity Dictionary
Volume 2 • From Compliance Readiness (like CMMC, HIPAA) to Comprehensive Support Program
The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too … [8 min. read] Continue Reading >
Bryley-curated stories from around the internet:
3 Privacy Tips – Naomi Brockwell is a privacy advocate who offers these tips for better privacy, including using startpage.com … like a private front end for Google, and gives you Google search results without Google data collection. I recommend changing some startpage settings, like toggling off Promotional Messaging and increasing the Results per page from 10 to 20.
Naomi’s linked commercial-VPN video is worth checking out, too, to help separate the products’ hype from the reality … [4 min. read] substack.com
FTC Safeguards compliance – Non-SEC-bound financial services companies must comply with the FTC Safeguards rules.
The FTC currently explains the scope of industries affected as, mortgage lenders, payday lenders, finance companies, mortgage brokers, account servicers, check cashers, wire transferors, collection agencies, credit counselors and other financial advisors, tax preparation firms, non-federally insured credit unions, and investment advisors …
The FTC also advises that their list of affected businesses is bound to evolve. (Bryley can help you understand the rules and what has to be done to fulfill the requirements, so please reach out.) [10 min. read] ftc.gov
Tell me how you really feel – According to security.org research about password habits, forty-two percent use curse words in their passwords. Maybe the forty-two percent just don’t realize that criminals may talk like sailors, too (no offense, sailor).
They end the article with the NIST (National Institute of Standards and Technology) password-practices guidance. It’s well worth being familiar with these … [10 min. read] security.org
Work from home? Have a fluffy friend? – Cat and dog hair, dander and ordinary dust can shorten the life and agreeableness of working at your (or your company’s) machine.
The Tech Quickie team offers some tips for keeping those machines clean and cleaning them when they get dirty, including using compressed air and static-free, soft paint brushes … [4 min. watch] youtube.com
We all have pretty good scam indicators, we just don’t always have them on –Thorin Klosowski, Electronic Frontier Foundation
The more data companies have about your whereabouts or your activities, the more risk that information could fall into the wrong hands, Shira Ovide writes in the Washington Post.
So here are three tips to vet iPhone and Android apps before you install them on your phone. The searching-for-California-in-the-Privacy-Policy tip from Mozilla was new to me and makes sense. Might as well take advantage of that state’s strict disclosure laws … [4 min. read] washingtonpost.com (paywall)
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, the New England Tech Newsletter in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).