Ethan

Ethan Crushed It

Ethan crushed it. Again. Thanks … [1 min. read]

Circuit tree

The Strengths of an Inter-Generational Tech Team

Founded in 1987 Bryley has a diverse group of talent serving its customers – from some for whom this is their first job out of college – like Ethan Brush – to those that (as Lear’s magazine used to say) weren’t born yesterday … [2 min. read]

keys

Responding to Cloud-Based Email Server Attacks

“Just awful” –the opinion on the state of a Fortune 500 company’s security by the hacker who stole fifty million credentials

Lately organizations have been choosing to migrate their email networks to cloud-based email providers like Microsoft 365. These cloud-based systems are appealing with their low cost per user monthly billing, ease of management and built-in security. But what are the risks these businesses can expect on a cloud-based email platform? … [5 min. read]

Scott Gold

Scott Gold Recognized for Twenty Years of Service

Senior Network Engineer Scott Gold has been recognized for his twenty years of service at Bryley Systems. Scott has designed and built many Bryley clients’ servers and and networks. Because of his experience in computer environment design Scott is a great problem-solving resource. Scott’s manager Kristin Pryor called Scott, “a skilled contributor and a mentor to other techs … [3 min. read]

Survey comment

Imagine using an MSP that isn’t Bryley …

Tech Service Team Member Ethan Brush’s good work won some comments from a Bryley client [1 min. read]

MFA

Why Don’t Businesses Use MFA?

The US Cybersecurity and Infrastructure Security Agency recommends that small- to medium-sized organizations implement MFA (multi-factor authentication). Multi-factor authentication refers to when you use two or more of the following factors … [6 min. read]

Kaseya VSA logo

Update on Attack Against Kaseya VSA

Kaseya VSA, a remote monitoring and management tool, was the victim of a cyberattack. Bryley uses Kaseya VSA. However Bryley was among a group of VSA users who were able to be warned by Kaseya of the unfolding attack. Because of the warning Bryley immediately shut down Bryley’s instance of the VSA server … [2 min. read]

Assessment

Risk Assessment Helps Identify the Security Holes in Hybrid

Although most organizations relied on a remote work model in the first year of the pandemic, the vaccine rollout has led to an increase in hybrid work environments that have elements of both on-site work and the remote work model … [5 min. read]

9 Ways to a Breach

Nine Ways Employees Can Leave Your Business Vulnerable

Employees’ work credentials can end up scattered across the web when employees use them on sites external to your company … [2 min. read]

Up all night

No Recess

“Just knowing my company was using a phishing simulator stopped me from opening emails I had doubts about,” said an employee of a business using Bryley’s Phishing Simulator. “Why risk it? I don’t want to end up an example at the next meeting” … [5 min. read]

PC Cyborg

Ransomware – What it Was, Is and What to Do About it

Ransomware claimed its first victims when Joseph Popp distributed 20,000 floppy disks with ransomware to AIDS researchers who had attended the World Health Organization’s 1989 AIDS conference in Stockholm … [6 min. read]

Myk Dinis

Zen Puzzle-Master

“Teaching improved my ability to diagnose all kinds of problems because interacting with the students I got to see problems from so many different angles. And that’s made my role at Bryley a lot easier,” Myk Dinis said in discussing his recent promotion to senior engineer … [3 min. read]

Bryley's front door

Bryley and the May-to-June COVID Situation

In light of Mass Governor Charlie Baker’s reopening plan, Bryley’s management team met and concluded that Bryley would continue the safety of using COVID protocols … [3 min. read]

Phishing click

Just a Click Away

An email with an intriguing subject line shows up in your inbox. You click on it because you’re curious and the sender seems trustworthy. This is how most cyberattacks begin … [7 min. read]

Clouds

Lost in the Clouds

The functioning, intellectual property and reputation of your organization – and so its survival – depend on your ability to bounce back from an incident with the help of backed-up data. This is why you need a comprehensive business continuity and disaster recovery solution that does not neglect backing-up your cloud-based data [5 min. read]

ARA Seminar

ARA Mass Trains Its Member Organizations

The American Rental Association of Massachusetts (ARA) set their member organizations on the path to cybersecurity awareness this month. ARA received six hour-and-fifteen-minute-long custom seminars that introduced the concepts of Security Awareness Training – tailored to their industry.

Bryley VP Roy Pacitto facilitated the online, interactive sessions that provided an introduction to Security Awareness Training (SAT) for ARA member organizations. The aim was to provide each participant with the basics that if the concepts presented were adhered-to the organizations would be less likely to experience a security breach. It was explained at the outset that one-time training sessions have only limited benefit. But couple initial training with ongoing Security Awareness Training and the results are historically impressive in minimizing cybersecurity risks … [six min. read]

Springs

BCDR: Get Back to Where You Once Belonged

Business Continuity and Data Recovery (BCDR) is a set of processes and products that enable an organization to recover from a cyber-incident and continue routine business functions … [9 min. read]

Risk

Cyber Liability Insurance

Bryley is sometimes asked by its clients about the need for liability insurance for data compromise and other risks associated with our digital lives. For these kinds of questions Bryley turns to Murphy Insurance … [2 min. read]

Decision

Thinking In-House IT? Consider Bryley IT

Small- to medium-sized businesses don’t usually have an on-site tech overseeing the systems in use – these tasks tend to fall to the owners or employees with the most tech aptitude/interest. But if you’ve had it with frustrating downtime scenarios, you may be thinking of hiring an IT tech or contracting with a Managed Service Provider (MSP) like Bryley. [5 min. read]

Survey

Survey Response: “Thank You to Ethan”

“Thank you to Ethan: you explained the steps you were taking to efficiently identify and resolve the issue. This was greatly appreciated!” [1 min. read]