Bryley is excited to announce that it is one of a few New England IT providers that have an Apple Certified Support Professional (ACSP) tech on-staff … [1 min. read]
Author Archive for: LStrauss
You are here: Home / Lawrence Strauss
About Lawrence Strauss
Lawrence writes about networking and security. He's written for Bryley since 2015. Before that his writing made the technical accessible on behalf of EMC, UMass Medical, and several Massachusetts manufacturers. He was trained in HTML in the '90s by Easter Seals Mass, who hired him to code and manage its website. His tech interest goes back to Command-Prompting a mail-order clone and AppleScripting System 7 and has resulted in jars of dissected computers’ extra tiny screws.
Entries by Lawrence Strauss
Eleven-year-old Ethan Brush envisioned a life of adventure as an NSA agent, but knew it would require serious discipline to accomplish what he wanted. So Ethan decided — at almost the youngest age possible — to join the Naval Sea Cadet Corps. He stuck by his trajectory … [3 min. read]
Last Thursday was Bryley’s Annual Sweater Day … check it out! [1 min. read]
For some perspective on the massive hack I spoke with David Byler, a Bryley trusted security advisor, “… what’s scary about this versus say the Equifax breach or the Home Depot breach is that in those the target was the customer data for that specific company. Also Equifax and Home Depot are not known as tech companies. SolarWinds is a tech company supplying tech to help tech companies manage their tech. So for them to get breached feels like this extra big thing …” [7 min. read]
“I found myself at 30 unsatisfied with the professional roles I’d had,” said Frank Walek. “I saw that every job had just kind of presented itself to me. And if I was going to do things better going forward, I’d have to start by asking, ‘what work would I actually want to do?’” [3 min. read]
Seventy percent of hacking-related breaches are due to stolen or weak passwords. Passwords are no longer enough to keep your business from unauthorized access and malicious attacks. [3 min. read]
Cybercriminals have gotten through some of the world’s best defenses. They’re often after data, corrupting it, and locking it up for payment through ransomware. No security strategy is complete until it takes the last step of protecting data with quickly available, full, uncorrupted copies of everything your business depends on [6.5 min. read]
Last month Bryley got an email about the work of Michelle Denio from a happy client [2.5 min. read]
Office 365 … er actually Microsoft 365 … keeps changing. Unlike when you could purchase licenses with three-year feature cycles, the Software-as-a-Service (SAAS) model with rolling updates means that every month we’re getting feature updates [6.5 min. read]
The barrier to ransomware entry has become so low. Ransomware is now distributed on the dark web like any other Software as a Service (SAAS, e.g. Spotify, Netflix, Dropbox). And its pricing starts at about $20 for a basic-level ransomware attack. Type “RAAS” or “ransomware as a service” in a dark web search engine. You’ll get pages of results. Most people think of hackers as geniuses. That’s far from true any more.