Sign up for Up Times by Bryley monthly newsletter
Site Navigation
All content on this site is copyright ©1987-2023 Bryley Systems Inc.
Per-device features | Basic | |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
Simple passwords = disaster
/in Newsletter /by Gavin LivingstoneThe top five end-user passwords from 2012 were: password (yes, the actual word itself) 123456 12345678 abc123 qwerty (top-left keys on your keyboard below the numbers) The top three in this list, “password”, 123456”, and “12345678”, were also the top three passwords in 2011. Basic analysis: Most people prefer simple passwords that are easy […]
HP still top PC manufacturer worldwide in a slowing market
/in Blog Post /by Gavin LivingstoneDespite internal issues, HP remained the top manufacturer of PCs worldwide in Q4 of 2012 followed by Lenovo (the Chinese firm that purchased IBM’s PC business in 2005) and then Dell. Overall, PC shipments dropped 6.4% from Q4 of 2011. Dan Reisinger of eWeek notes that Q4 of 2012 is the first time in five years […]
Preview into Microsoft Office 2013
/in Blog Post, Microsoft /by Gavin LivingstoneIn addition to Windows 8, I have also been using Office 2013 over the past few months; I like some things, but not everything: • Excel updates ripple slowly down the page; they seemed to run a bit faster in previous versions. • The top-right Window icons have shifted somewhat; the Minimize icon ( _ […]
Booting Windows 8 into Safe Mode
/in Blog Post, Microsoft /by Gavin LivingstoneSafe Mode is useful for diagnosing PC problems. Because Windows 8 starts quickly, you cannot get into Safe Mode by pressing [F8] during the boot-up process (as you could with previous versions of Windows). The new procedure: Go to Settings and then select Power Hold [Shift] and then press Restart to open System Recovery Options Select Troubleshoot […]
$295 Raised for Hudson Charities by Bryley Systems Inc. and Yours for Children, Inc.
/in Blog Post /by Gavin LivingstoneBryley Systems and Yours for Children together raised $295 for the Hudson Food Bank and the Hudson Boys & Girls Club. The money was generated through a free giveaway of refurbished PCs in exchange for the suggested donation of $35 to either Hudson non-profit organization. With the generous contribution of 9 used PCs by Yours […]
Job Promotion at Bryley Systems
/in Blog Post /by Gavin LivingstoneI am very pleased to announce that Michelle Denio has been promoted to the position of Administrative Support Technician. Michelle is a key member of Bryley’s Technical Service Department and with this new expanded role she will be able to use her expertise and knowledge of Bryley’s clients to everyone’s advantage. Congratulations!!!! Hudson Sun
System Builders Await Surface’s Impact
/in Blog Post, Microsoft, Mobile /by Gavin LivingstoneGavin Livingstone, President of Bryley Systems, talks to Channel Pro Networkabout Microsoft’s Surface tablet. Read the full article System Builders Await Surface’s Impact
Garin Livingstone Passes his Windows 7 Exam!
/in Blog Post, Microsoft /by Gavin LivingstoneCongrats Garin Livingstone, Bryley Systems Senior Tech, for successfully completing and passing your Windows 7 configuring class and test!!!
Cybercrime targets smaller organizations
/in Newsletter /by Gavin LivingstoneA recent Data Breach Investigation Report (DBIR) from Verizon notes that 98% of data breaches stemmed from external sources using hacking techniques (81%) and malware (69%). About 79% of the data breaches were directed at “targets of opportunity”, typically smaller organizations that are vulnerable through an “exploitable weakness”; most attacks were performed using relatively unsophisticated […]
Protect your mobile device – Part 3: Enforcement, Tools, and First Steps
/in Blog Post, Mobile, Security /by Gavin LivingstoneWe have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security. Enforcement Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]
Microsoft Streamlines Windows Server Options, Kills Versions for Home and Small Business
/in Blog Post, Microsoft, Office 365 /by Gavin LivingstoneMicrosoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]
Protect your mobile device – Part 2: Training
/in Blog Post, Mobile, Security /by Gavin LivingstoneTraining is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data Authenticate and encrypt […]
Protect your mobile device – Part 1
/in Blog Post, Mobile, Security /by Gavin LivingstoneThe need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) […]