“People are one of the weakest links” in securing technology. Still organizations invest ten to twenty times the amount to secure the equipment and networks than they invest, “ensuring all people [using the technology] understand the organization’s IT security policy, procedures, and practices [4.5 min. read]
Author Archive for: LStrauss
You are here: Home / Lawrence Strauss
About Lawrence Strauss
Lawrence writes about networking and security. He's written for Bryley since 2015. Before that his writing made the technical accessible on behalf of EMC, UMass Medical, and several Massachusetts manufacturers. He was trained in HTML in the '90s by Easter Seals Mass, who hired him to code and manage its website. His tech interest goes back to Command-Prompting a mail-order clone and AppleScripting System 7 and has resulted in jars of dissected computers’ extra tiny screws.
Entries by Lawrence Strauss
Whether your business is using G-Suite, Office 365 or another email server, the fine-print agreements release those providers from liability for anything happening to your email data. The reality is Microsoft, Google, etc. are liable for the infrastructure on which your data resides (i.e. if their data center goes down, they’re going to do what they can to get it back and running). They are not answerable for your data, including emails [4.5 min. read]
Bryley, a long-time Cisco certified partner, has recently achieved the Cloud and Managed Services certification
3-2-1 is the baseline standard for Backup and Data Recovery. In this scheme you have three copies of your data on two different types of media and one of those versions is stored off-site.
How many times have you heard that email is not secure? But it was always too hard to do much about it. Well, it’s still not secure: The security exposures are on the devices that have the account […]
Just as a business relies on email to do its work, it needs to make sure its email service is uninterrupted; and to maintain the information in its emails. The fact is there’s actually a lot going on under email’s hood
Who isn’t looking for some answers? Are the risks of the virus serious for me and the people I’m around? Which government leaders have it right? Am I being asked to go back to work in an unsafe environment? How will the economy impact me and those I care about? This is the kind of uncertainty the unscrupulous prey on.
Don’t get me wrong, Bryley loves tech. We love what it brings us, for example:
1 Access to our collective knowledge
2 The extension of our minds 1
3 Time Travel 2 — the time it used to take to communicate with someone else has been erased
4 Collaboration tools
5 Productivity boosters
6 Twitch and Snood
But Bryley sees its function as helping a business run smoothly, reliably, continuously. And our tool to get this done is technology expertise.
Bryley’s a Managed Service Provider — Which Is What Exactly?
A Managed Service Provider (MSP) oversees a company’s computer network infrastructure. MSPs deliver ongoing support that can include the setup, installation, configuration and maintenance of the network and its assets. An MSP can augment a business’s internal IT department and provide higher-level, rarer skills that may not be available to the internal IT department. Because MSPs are proactive, bringing centralized systems management solutions, an MSP can give unmatched peace of mind, that a business’s functioning is secure. 3 The following is not comprehensive, but are some of the areas in which MSPs help.
While most of the Bryley team works from the Clinton office, I’m physically distanced, writing at home. And as the days have grown to months in this work-from-home-if-you-can-work-from-home world, our perspectives change as our settling-in has changed us. So here’s a bit of remote work advice, for the times they are still a-changin’.
Among the top headlines in Google News’s Technology section today was criminal hackers use of AI (Artificial Intelligence) and its subset, ML (Machine Learning)1. Opening the article, I found a synopsis of a Tech Republic report, “Cybersecurity: Let’s Get Tactical,” in which the authors give ten ways cybercriminals are attacking with AI2 including
- phishing attacks, in which, upon gaining credentialed access, automatic scripts can wreak havoc, including draining bank accounts
- credential stuffing and brute force attacks, in which AI systems try passwords — and password possibilities — on many websites
- bulletproof hosting services that use automation to hide the tracks of malicious websites, so they can’t be stopped by law-enforcement, or often flagged by network scanning tools
The fact is, it’s an arms race. Both malware and criminal sites would be pretty quickly and easily identified on a network by the nature of their activity. So the criminals try to disguise their malware in benign code and their sites in bulletproof hosting schemes. The way they keep the ruse going is through machine learning adapting to changing circumstances.