DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
- Fill in our quick form.
- We’ll schedule an introductory phone call.
- We’ll take the time to listen and plan the next steps.
Central MA Office
200 Union Street Clinton, MA 01510
Existing Customers
Sales Inquiries
© Copyright 2024 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features | Basic | Pro* |
Response to network-critical issues | Within four hours. | Within four hours. |
Response to non-critical issues | Within eight hours. | Within eight hours. |
Performance optimization | Included | Included |
Security optimization | Included | Included |
Monitoring and alerts | Included | Included |
File and patch updates | Included | Included |
Reporting | Included | Included |
Administration | Included | Included |
Reliability optimization | Partial | Included |
Software issues | Partial | Included |
Hardware issues | Partial | Included |
Network issues | Partial | Included |
PC imaging | Included | |
On-site response | Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).
POSTPONED: Exhibiting at Realtor Summit June 14
/in Blog Post /by Garin LivingstoneHope to see you there! Bryley will exhibit at the Realtor Assoc. of Central Mass’s Success Summit 1.0 Tuesday, June 14 at the AC Hotel, 125 Front St, Worcester, Ma, 8:30 – 4:30 … [1 min. read]
Mounting a Defense Against Ransomware
/in Blog Post /by Garin LivingstoneThe jaw-dropper from the recently released annual Verizon Data Breach Investigations Report is the thirteen percent rise in the incidence of ransomware. This represents a single-year increase equal to the rates of the past five years combined … [4 min. read]
P.U.D.R. – Some of the Worst Backup Practices
/in Blog Post /by Garin LivingstoneYou are backing up, right? Because there’s file corruption, drive failure, natural disasters, employee errors, employee anger, theft, ransomware … But are you backing up right? Because, as an example, “organizations that paid [ransomware criminals] got back only sixty-one percent of their data … only four percent of those that paid the ransom got ALL their data back.” So be sure you’re doing things well to realize a successful recovery from your backup.
Over the course of Bryley’s years our engineers and techs have witnessed some bad set-ups when it comes to backing up. Here are some examples and tips about how to do it better … [5 min. read]
365, 365, 365 or 365?
/in Blog Post /by Garin LivingstoneIf Windows’ journey has been toward ease-of-use uniformity across people’s devices, Microsoft’s business suite offerings continue to require some thoughtful investigation. In 2020 Microsoft announced ending the Office 365 name for small- to medium-sized businesses (SMBs [Microsoft defines these as businesses with 300 or fewer employees]) in order to try to lessen confusion by taking the focus off the product name and putting it on the service it provides. It was a welcome intention. Only thing is many of the offerings contain the same products – and the differentiators are not easy to summarize in a name. So we offer this guide … [4 min. read]
Corridor 9/495 Business Expo
/in Blog Post /by Garin LivingstoneHow good was it to be back to feeling a bit of normalcy April 6? That was the day of the Corridor 9/495 Chamber’s Open for Business Expo at the Doubletree Conference Center in Westboro, Mass … [2 min. read]
Is Windows 11 Done Yet?
/in Blog Post /by Garin LivingstoneMaintaining your business operations without disruptions is Bryley’s reason-to-be. That’s why Bryley recommends that managers not be swayed by inducements to free upgrades and any pressure to use the latest tech. Because while this period of a free OS may be appealing, Windows 11’s main reason-to-be, in the words of Microsoft CEO Sataya Nadella, is as a single,”open platform” that behaves consistently, no matter the device. It integrates styling and an interface-approach from the iPhone and Android.
But that means things are different and moved around and not necessarily in the interest of productivity … [4 min. read]
A Hundred Thousand Pounds Sixty Hours a Week
/in Blog Post /by Garin LivingstoneHow many van lines write on the backs of their trailers something like, ‘our employees are our biggest asset’? Could be true. Trucking is hard and lonely. The hours are long; the accountants under government restrictions calculate drivers’ time to maximize profit in a competitive field. And the hours are mostly passed in monotony. And somehow they’ve got to stay alert. Lives in the tiny cars around them depend on it. They’re responsible for tens of thousands of dollars of machinery and maybe more in cargo. They’ve got to continuously skillfully navigate a forty x ten foot wall at sixty-five miles an hour.
While you may not have a life-and-death-in-the-hands-of-your-employees sort of business like a tractor-trailer line, your employees still protect a lot when your organizations’ data is in their hands … [5 min. read]
The Elements of Client Services
/in Blog Post /by Anna Darlagiannis“Eliminates dangerous, repetitive, boring tasks” -Elon Musk on his new robot
The purpose of technology is to meet people’s needs.
I received a degree in English from the University of Connecticut. I wanted to be a journalist, so I pursued a master’s degree and during that time I got a job in a library. The problem was, even as I was in that world of books and newspapers, I was watching that world completely change … [5 min. read]
Why an Inspection?
/in Blog Post, Security /by Garin LivingstoneTechnology assessments are a smart place to start to make sure your organization’s infrastructure continues to run smoothly.
And just like there are emissions and mechanical inspections for your car, different kinds of assessments reveal different types of gaps … [4 min. read]
Email Compromise Is Insidious and Costly
/in Blog Post, Security /by Garin Livingstone1 Request, 2 Follow-up, 3 Urgent, 4 Important
These are the top Email Subject lines in Business Email Compromise attacks, the costliest cyberattacks. There were 19,369 reported incidents at a loss of $1.8 billion in 2020, the most recent published data from the FBI.
A typical Business Email Compromise attack is the result of a credential breach. With stolen email credentials a crook poses as an established vendor, and uses this trusted position to ply company data or funds from you or a colleague. … [4 min. read]
Elves at Work
/in Blog Post, Security, Tips /by Garin LivingstoneWishing that all your days are happy … [1 min. read]
Hacked for the Holidays (ain’t no ho ho ho)
/in Blog Post /by Garin LivingstoneIn an ongoing effort to elude this year’s frustrating shipping delays, more consumers are turning to the web for what they may see as easy answers to the holiday hassle. Vasu Jakkal VP Microsoft Security said that with “headlines about supply chain issues, worker shortages and costs rising … it’s no surprise that … at least sixty-three percent of holiday shopping will be done online.”
If Not Now, When?
/in Assessment, Blog Post, Cloud, Data-Backup, Managed IT, Security /by Garin Livingstone“Cybersecurity and Infrastructure Security Agency Director Jen Easterly told industry leaders in a phone briefing Monday that a vulnerability in a widely-used logging library ‘is one of the most serious I’ve seen in my entire career, if not the most serious.’
“‘We expect the vulnerability to be widely exploited by sophisticated actors and we have limited time to take necessary steps in order to reduce the likelihood of damage,’ she said of the Apache Log4j flaw. The issue is an unauthenticated remote execution vulnerability that could allow an intruder to take over an affected device.
“Hundreds of millions of devices are likely to be affected, said Jay Gazlay of CISA’s vulnerability management office in the [same] call” –as reported by Tim Starks, cyberscoop.com, Dec. 13, 2021
Because of how widespread this vulnerability is, affecting everyone from Microsoft to Apple to Amazon to Google (in fact it affects millions of pieces of software, it is time to make sure your business is as protected as possible. You may not hear bullets, but that doesn’t mean we not are in a war … [5 min. read]
Thunder and Botheration!
/in Blog Post, Managed IT, Security /by Garin Livingstone“If there’s 2FA, enable it,” said Bryley’s Garin Livingstone when asked for his baseline recommendation for everybody for computer security.
2FA or MFA (two- or multi-factor authentication) is adding a second (or more) proof of your identity before being granted access to a machine or software.
2FA may also rank among the biggest pains in the neck … [4 min. read]
Tempted by Windows 11?
/in Blog Post /by Garin LivingstoneLike it did six years ago for Windows 10, Microsoft is wooing end-users via ads for a free Windows 11 upgrade. Who doesn’t want to take the latest tech out for a spin? And for free?!
But as far as business continuity is concerned (business continuity is the planning and process by which organizations maintain operation, not severely disrupted by a disaster or other unwanted incident) maybe this bargain is not yet a good deal … [5 min. read]
Assessing Risk Helps Ensure Business Continuity
/in Blog Post /by Garin LivingstoneNo construction company would undertake a building without first evaluating and then understanding how it will handle the project’s risks. But that is how a lot of Information Technology is executed. Does that make sense? Think for a moment how much of your employees’ livelihoods and the services and products your organization provides depend on networked computing. Isn’t that how you store and access your intellectual property, client information and business processes?
And do you keep building higher, putting more strain on the network? For instance does an Internet-of-Things machine need to be granted access to your network? Or does someone’s personal device need to log-into your system? … [5 min. read]
President Garin Livingstone on Cybersecurity
/in Blog Post /by Garin LivingstoneIn recognition of cybersecurity awareness month Bryley President Garin Livingstone was invited to speak with Hank Stoltz on the Worcester Chamber’s WCRN radio program Voice of Business … [3 min. read]
Why Don’t Businesses Do Network Assessments?
/in Blog Post /by Garin LivingstoneToo often network assessments wind up at the bottom of the to-do list as today’s urgencies move continually to the top of mind and focus … [5 min. read]
Bryley Systems Named to 2021 Channel Futures MSP 501
/in Blog Post /by Garin LivingstoneThe MSP 501 designation is an IT industry signifier that recognizes best-in-class operational efficiency and business models. The MSP 501 award is a sixty point, independent audit verifying that Bryley is a fit and stable operation from which to provide its clients dependable business continuity … [2 min. read]
Ethan Crushed It
/in Blog Post /by Garin LivingstoneEthan crushed it. Again. Thanks … [1 min. read]