Entries by Lawrence Strauss

Michelle Denio Named Director of Service Operations

“We love Michelle!” I hear that from so many clients

–Vice President Anna Darlagiannis-Livingstone

Michelle Denio has been named Director of Service Operations. Michelle joined Bryley in 2008. Her time in tech services and managerial roles gave her the ground on which to display the listening skills, tech knowledge and strategic thinking that have contributed to Bryley Systems’ evolution.

This new role is partly an acknowledgment of the work Michelle has put in to R&D solutions to meet clients’ needs … [4 min. read]

Tom Barnes Named Director of Client Services

He has a way of putting [tech] across so that it’s helpful to businesspeople

–Vice President Anna Darlagiannis-Livingstone

Tom Barnes has been announced as Director of Client Services after nearly five years at Bryley Systems. Tom has been responsible for improving Bryley’s periodic client review process among other innovations. Tom came to Bryley from non-tech fields – he holds a degree in psychology and worked in RV sales. He is a problem-solver and brings that skillset to the process of serving IT clients.

Tom not only has an acumen for tech, he has a way of putting it across so that it’s helpful to businesspeople, Vice President Anna Darlagiannis-Livingstone said. Because of how he relays information, they’re able to see how the tech will help them. Tom is also personable and reliable. These are necessary skills and among the reasons I feel Tom’s promotion is warranted. … [4 min. read]

A Business Continuity Dictionary Vol. 3

From Compliance to Comprehensive Support Program

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too … [8 min. read]

The Joint Is Pumpkin

On October 22 Bryley gave employees mini pumpkins and some markers to decorate them with. The decorated pumpkins were put behind a number on a table in the central common area of the Bryley building … [2 min. read]

A Business Continuity Dictionary Vol. 2

From Compliance to Comprehensive Support Program

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too … [8 min. read]

What Bryley Did on Our Summer Outing

Friday, September 13, Bryley employees had a catered lunch at the office. And that’s where four bowling teams were chosen by a random drawing.

Then the Bryley bunch went down to Apex Entertainment in Marlborough … [2 min. read]

Hitting A Particular Target

Bryley Partner Huntress Releases its 2024 Threat Report

Its main findings involve ransomware changes and the abuse of remote access software

Last year the FBI announced a major, international disruption to a ransomware-delivering botnet (botnets are networked, task-executing computers). While to be celebrated, from the new data it doesn’t look like ransomware criminals have given up – they have found other ways of stealing and causing havoc.

According to Huntress’ researchers ransomware continues to be a significant and growing threat that affects businesses of all sizes. Over the past year cybercriminals have ramped up their efforts to exfiltrate sensitive data so they can extort large sums of money. And in 2023 until now Huntress’ data scientists have seen a shift in adversarial tactics, with threat actors using trusted tools – like remote access software – to exploit vulnerabilities … [5 min. read]

A Business Continuity Dictionary

Volume 1 From Anti-Malware to Backup and Data Recovery

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too.

Because cyberthreats affect all of us, it’s good for everyone to have a basic understanding of the terminology and principles that underpin cybersecurity.

So by familiarizing yourself with these terms, you will be better prepared to engage in discussions, make informed decisions and implement helpful security measures in your organization … [7 min. read]

Heller Search Wins Best Client of July

And, yes, this sudden award has something to do with Heller Search sending Bryley ice cream!

To thank the Bryley team for its responsiveness – Heller Search sent Bryley a Cold Stone Creamery ice cream party. It was delicious and fun… [2 min. read]

Risks in the Software Supply Chain

XDR (Extended Detection and Response) Can Help

Part of a Layered Security Approach

We all use software that is built on a foundation of strangers’ work. Even if you hire a developer to write a custom application, software calls trigger functions that were previously programmed by someone else. This means code weaknesses — put there either accidentally (like from mistyping) or maliciously by a criminal — end up in many different kinds of software. And these weaknesses can be exploited by criminals … [6 min. read]