Entries by Garin Livingstone

Comparing Cloud-based services – Part 3: Backup and Recovery

Many Cloud-based services fall into one of these categories: Productivity suites – Applications that help you be more productive Storage – Storing, retrieving, and synchronizing files in the Cloud Backup and Recovery – Backing-up data and being able to recover it Prevention – Prevent malware, typically spam and related components Search – Find items from […]

CryptoLocker Case Study

The following event depicts a real-life malware attack that infected a New England manufacturing firm. The company has chosen to share its story anonymously to help other businesses avoid a similar fate. The unsuspecting sales rep certainly reacted in a way anyone would expect. He received an email with a voicemail attachment that looked like […]

Bryley Data-Backup Guidelines for 2014

Please note that this document has been depreciated, and a more up to date version can be obtained from our articles page. Bryley Systems is pleased to present our updated Data Backup Guidelines for 2014.  This free guide is updated annually and includes these topics: The Importance of Backups Backup Technologies Cartridge-Based Backups and Scheduling […]

5 Facts About Malware

One of our folk compiled this brief list on malware issues: Vulnerabilities in Java are the #1 exploited vulnerability.  (Java is a popular, computer-programming language used in web-based applications.) One of the main causes of malware is “Drive-By Downloads” where all you have to do is browse a website or click on a website from […]

Deploying software systems to manage a growing organization

Most organizations use software to manage at least these items: Accounting – Perform vital bookkeeping and accounting functions Contacts – Organize and manage clients, prospects, vendors, etc. Operations – Match assets to organization’s need on a daily basis In organizations with funding limitations, deployment of a software-based system to manage specific functions often starts as […]

Comparing Cloud-based services – Part 2: Storage

Many Cloud-based services fall into one of these categories: Productivity suites – Applications that help you be more productive Storage – Storing, retrieving, and synchronizing files in the Cloud Backup and Recovery – Backing-up data and being able to recover it Prevention – Prevent malware, typically spam and related components Search – Find items from […]

Kids Companion Halloween Costume Shop a Great Success

Congratulations to Kids Companion on last weekends successful Halloween Costume Shop We would like to thank Olivia Banks, Jen Kallin, Samantha Johnson, Allyson Waddell, and Julia Frias, all students at Hudson High School, for allowing Bryley Systems Inc. to host their annual Halloween Costume Shop.  Through their effort, with over 70 costumes sold at an […]

Bryley participates in 25th Assabet Valley Chamber Downtown Trick or Treat

Bryley Systems distributed candy to approximately 1500 children who walked the streets of Hudson, MA on the Thursday before Halloween during the Assabet Valley Chamber of Commerce’s 25th Downtown Trick or Treat.  Shown are Cathy and Gavin Livingstone meeting trick-or-treaters at the door of Bryley Systems. For more information, please visit http://www.assabetvalleychamber.org/trick_or_treat.shtm.

Kathy Mills joins Bryley Systems

Kathleen Mills, an experienced HR professional, administrator, and entrepreneur, has recently joined Bryley Systems Inc. of Hudson, MA, a provider of managed IT services. Ms. Mills. is a graduate of Rivier University in Nashua, NH having earned a Bachelor’s Degree in Business Management and certification in Human Resource Management.  She worked for Sentry Insurance for a number […]

Beware CryptoLocker

We have seen a rise in CryptoLocker virus attacks; these attacks can cripple the data files on your computer and on your computer network. CryptoLocker is a destructive, ransomware virus; once downloaded, it locates and encrypts data files, which renders them inaccessible.  CryptoLocker does not announce its presence until all data files (Microsoft Office files, […]