DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).
Doublecheck Those Figures
/in Blog Post /by Lawrence StraussThe threat posed by overconfidence
–Jeetu Patel, Cisco
Economist Daniel Kahneman’s life’s work (he died last month at 90) was to point out how irrationally we behave, including telling the Guardian that if he had a magic wand, he’d most like to correct our overconfidence.
The Titanic’s sinking may have been due to overconfidence. Investors’ ideas on moves they should make in the stock market wind up costing them 4%. And now we have the Cisco 2024 Cybersecurity Readiness Index Report. This is a double-blind survey of over 8,000 business and cybersecurity leaders. The findings show the greatest cybersecurity weakness is a disconnect between overconfidence that their business will be able to avoid a disrupting attack and their analyzed readiness for avoiding disruption. To be exact: 73% of business leaders anticipate an attack in the next two years, but a surprising 3% were shown to be prepared for such an attack … [6 min. read]
MFA Still Tops
/in Blog Post /by Lawrence StraussIn SonicWall’s 2024 Threat Report the Number One Attack-Deterrent Is MFA
Complex, Locked Vaults and Double Keys
How would you feel about giving your valuable documents to a bank that only had a single lock on the bank’s outside doors? One lock might put off a less-determined intruder, but I’d expect it would be pretty easy for a burglar to figure a way past just one lock. So how would you expect a bank to responsibly treat your valuables? Not only would those outer doors have locks, there should also be a built-in cement and steel vault secured to the building’s structure to withstand destructive weather, fire and thieves, the vault’s lock should be complex to resist cracking, within the vault should be locked steel boxes that usually require two keys (one that you hold and one that the bank holds and authorizes its use after you prove your identity).
What is the relative value of what people keep so securely at a bank compared with the data an organization is trusted to protect? [6 min. read]
Building a Future-Proof IT Strategy: Clinton Business Guide for Providers Selection
/in Blog Post /by Garin LivingstoneHaving a strong IT foundation is essential for companies of all sizes. This is especially true in Clinton, Massachusetts, where businesses are increasingly reliant on technology for efficiency, growth, and innovation. Building a future-proof IT strategy requires finding the right IT provider that can cater to your organization’s unique needs, including assessing the IT requirements, […]
Ever See an Ant Back Up?
/in Blog Post /by Lawrence StraussAnd Now for Something Completely Different
In the light of summer in a forest, a colony of ants was busy. It was known as The Colony of Methodical Memory. And the colony worked hard. The ants built clever storerooms within the earth. And they meticulously copied their knowledge and wisdom onto many gathered leaves and placed these in the secure storerooms.
There was at the same time in the same wood a swarm of grasshoppers, known as The Swarm of ‘Hi There’. While the ant colony worked, the grasshoppers swayed on leaves in the sun … [5 min. read]
Look Past the Weeds
/in Blog Post /by Lawrence StraussDon’t Get Lost In The Vulnerabilities
The lockdowns found me in my garden more. One of the things I learned those couple years was that I started out intently focused on the annoyance of weeds – pulling them, pouring boiling water on them when they popped up in the cracks of my driveway, generally trying to kill them. But at some point my focus shifted and I began to see the whole yard – I especially noticed where different plants thrived or failed to. I moved things around. Happy, healthy plants – including working on achieving thicker ground covers (like that sedum pictured) – look beautiful while making the conditions less hospitable to weeds.
Vulnerabilities, which includes unpatched software and misconfigured systems, can be thought of like weeds … [6 min. read]
Question Everything
/in Blog Post /by Lawrence StraussA set of policies … would have identified, I believe, a pattern of activity here …
–Navy CTO Don Yeske
The US military is in the process of moving to a Zero Trust networking framework. But before they began that process in November, a Cape Cod-stationed National Guardsman leaked 350 classified documents over the course of between six and fourteen months before his detection and arrest. And Zero Trust – that enforces stringent policies or rules over permitted network activities – might have stopped the rogue airman sooner (he was serving as an IT admin without need to access those military secrets).
This type of breach is called an insider attack. Insider breaches make up 20% of all breaches. Zero Trust is useful to handle these and many of the other attacks that begin outside an organization’s network … [5 min. read]
Are we there yet?
/in Blog Post /by Lawrence StraussThere is no doubt that over time, people are going to rely less and less on passwords
–Bill Gates, 2004
A 2023 study found that 64% of people surveyed are not confident they are managing their passwords well. Most discouraging in the new survey was the report that of those born after 1990 only 20% use unique and strong passwords. These stats bring also a feeling of futility: ‘so many data exposures – what does it matter?’ ‘there is no privacy anymore – whatever.’
I don’t share the opinion that we should throw in the towel, though who can’t sympathize with the sentiment? But Bryley sees time and again that, in fact, compromised passwords matter to an organization’s security. As an example of the severity of the problem, Google Cloud reported in October that 54% of breaches “are resulting from common and well-known threat actor attack techniques, such as obtaining and using stolen credentials …” [4 min. read]
How an Email Compromise Attack Begins
/in Blog Post /by Lawrence StraussFaced with the right con, we’re all vulnerable
–Tim Harford
On his Cautionary Tales podcast, Tim Harford told the story of an ex-con who put on an army captain’s uniform and an air of authority and proceeded to demand to inspect a military financial account and confiscate (that is, steal) the $250,000 it contained.
If your employee gets an email from an executive at your organization requesting urgent action, how does the employee respond? … [4 min. read]
A Review of 2023
/in Blog Post /by Lawrence StraussHere are some notable events and stories from 2023:
A Guiding Principle
Bryley is a client of Bryley, President Garin Livingstone said in a 2023 interview. We have people at Bryley that need technical help. We also need to make sure that our computer systems are being maintained and updated. Among the benefits of adhering to this model?
This principle of being one’s own client has been a standard that Bryley has observed over the course of its thirty-six years … [6 min. read]
Holiday Scams: Safeguarding Your Festive Celebrations From Fraudsters
/in Blog Post /by Tech Pro MarketingIs the End of Windows 10 a Real Worry?
/in Blog Post /by Garin LivingstoneIn the past year-and-a-half Microsoft has made Windows 11 more stable and usable. And most critically, Windows 10 support – that is, providing security patches – is ending. So this means in October 2025, it will become unsafe to use devices running Windows 10.
Now is the ideal time to create a plan for migration, including performing an audit of devices: some will be able to be upgraded and some will need to be sunsetted. Also Windows 11’s compatibility with legacy software and hardware must also be assessed and addressed … [4 min. read]
There’s Power in Least Privilege
/in Blog Post /by Garin LivingstoneEvolution of Evil
Ransomware is a somewhat straightforward criminal action – data is illicitly encrypted and you may be able to restore systems from a backup or pay the crooks to hopefully get a decryption key from them.
Things have veered in a different direction now (see Allianz Commercial insurer’s report). Today a lot of ransomware attacks are cyber-extortion attacks. In these attacks the criminals capture your data and encrypt it, but they also exfiltrate your data to their servers. And the threat is often, ‘unless you pay, we will release your data on the web’ … [5 min. read]
Choosing the Right IT Services Provider: A Comprehensive Guide
/in Blog Post /by Tech Pro MarketingWhen it comes to managing IT services, choosing the right provider can make or break a company’s success. With so many options available, it can be overwhelming to decide which provider is the best fit for your business. However, taking the time to identify your company’s IT needs and carefully evaluating potential service providers can ensure a successful partnership.
Identifying Your IT Needs is the first step in choosing the right IT services provider. It’s important to assess your current IT infrastructure and identify areas that need improvement or support. This includes evaluating hardware, software, security, and support needs. Once you have a clear understanding of your needs, you can begin researching potential service providers that offer the services and support that align with your business goals.
When the Going Gets Tough
/in Blog Post /by Garin LivingstoneNew data from the Federal Trade Commission shows that scams originating on social media have accounted for $2.7 billion in reported losses since 2021, more than any other contact method …
Reports during the first half of [2023] show that the most frequently reported scams on social media are related to online shopping, with 44 percent of reports pointing to fraud related to buying or selling products online. [source: FTC]
Social media shopping has grown huge: 67% of shoppers in 2022 purchased through social media channels and this course we’re on shows no signs of changing. And while it’s easy to see why people do it (among the reasons: more time spent on social media than with traditional media, the simulated, relaxed feeling of a community and the ease-of-purchase), it doesn’t mean that we shouldn’t see if what we’re doing is in our best interests. Or at least ask, ‘can we do it better?’ … [4 min. read]
Patrick Walsh Promoted to Senior IT Field Technician
/in Blog Post /by Garin LivingstoneBryley Systems is pleased to announce the promotion of Patrick Walsh from IT Field Technician to Senior IT Field Technician. In his new role, Patrick will be responsible for leading a team of techs in support of its clients’ IT environments.
Patrick has a history of success at Bryley: supporting clients – early in his time at Bryley he migrated many client devices to M365, solving tech problems and winning plaudits from those he’s worked with. During his time at Bryley he’s embraced the field tech role, showing not only technical expertise, but also peer-recognized troubleshooting skills with a determination to see that people are properly helped … [3 min. read]
Managed IT Services in Clinton, MA: Streamline Your Business Operations
/in Blog Post /by Garin LivingstoneManaged IT services have become increasingly popular in Clinton, MA, as businesses look to outsource their IT needs to experts who can provide comprehensive support and maintenance. These services offer businesses a range of benefits, including reduced downtime, increased security, and improved efficiency. By partnering with a managed IT services provider, businesses can focus on […]
IT Support Company Serving Clinton, MA: Your Top Choice for Reliable Tech Assistance
/in Blog Post /by Garin LivingstoneRemembering Mike Carlson
/in Blog Post /by Tom BarnesIt is with great sadness that we announce the passing of Mike Carlson, Bryley Systems’ Chief Technology Officer.
Mike joined Bryley Systems in 1997 and, due to his brilliance, dedication, extensive knowledge in both local and wide-area network design and implementation, and love for technology became the Bryley CTO in 2007 … [4 min. read]
As if what you do matters
/in Blog Post /by Garin LivingstoneUnited We Stand
Organizations look to IT professionals for tools and services to protect them from cyberthreats. But IT can only get them so far. Two-thirds of the way, in fact, according to the CIA (Confidentiality, Integrity, Availability) Triad. The National Institute of Standards and Technology calls the CIA Triad “the fundamental guiding principle of cybersecurity.”
End-User Responsibility
According to Gartner 69% of end-users violated their organizations’ cybersecurity practices the past year. So how do we counter this trend? Eric Sokolowski president of Bryley education partner Knowledgewave advocates a “drip-drip” method of Security Awareness Training … [4 min. read]
Then And Now: How Bryley Systems Has Evolved
/in Blog Post /by Tech Pro Marketing