Not the business continuity pyramid, but a macaron pyramid

A Business Continuity Dictionary Vol. 3

From Compliance to Comprehensive Support Program

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too … [8 min. read]

The Joint Is Pumpkin

On October 22 Bryley gave employees mini pumpkins and some markers to decorate them with. The decorated pumpkins were put behind a number on a table in the central common area of the Bryley building … [2 min. read]

Pyramid sighting

A Business Continuity Dictionary Vol. 2

From Compliance to Comprehensive Support Program

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too … [8 min. read]

What Bryley Did on Our Summer Outing

Friday, September 13, Bryley employees had a catered lunch at the office. And that’s where four bowling teams were chosen by a random drawing.

Then the Bryley bunch went down to Apex Entertainment in Marlborough … [2 min. read]

A moving target

Hitting A Particular Target

Bryley Partner Huntress Releases its 2024 Threat Report

Its main findings involve ransomware changes and the abuse of remote access software

Last year the FBI announced a major, international disruption to a ransomware-delivering botnet (botnets are networked, task-executing computers). While to be celebrated, from the new data it doesn’t look like ransomware criminals have given up – they have found other ways of stealing and causing havoc.

According to Huntress’ researchers ransomware continues to be a significant and growing threat that affects businesses of all sizes. Over the past year cybercriminals have ramped up their efforts to exfiltrate sensitive data so they can extort large sums of money. And in 2023 until now Huntress’ data scientists have seen a shift in adversarial tactics, with threat actors using trusted tools – like remote access software – to exploit vulnerabilities … [5 min. read]

business continuity pyramid

A Business Continuity Dictionary

Volume 1 From Anti-Malware to Backup and Data Recovery

The cybersecurity terms defined here are based on Bryley’s business continuity pyramid. These terms and concepts range from foundational tools to advanced approaches. The pyramid itself was created as a visual reference to achieving a strong defense: the lower the term appears on the pyramid the more foundational it is, the converse is true, too.

Because cyberthreats affect all of us, it’s good for everyone to have a basic understanding of the terminology and principles that underpin cybersecurity.

So by familiarizing yourself with these terms, you will be better prepared to engage in discussions, make informed decisions and implement helpful security measures in your organization … [7 min. read]

Ice cream in cups at event

Heller Search Wins Best Client of July

And, yes, this sudden award has something to do with Heller Search sending Bryley ice cream!

To thank the Bryley team for its responsiveness – Heller Search sent Bryley a Cold Stone Creamery ice cream party. It was delicious and fun… [2 min. read]

Dominos being carefully placed

Risks in the Software Supply Chain

XDR (Extended Detection and Response) Can Help

Part of a Layered Security Approach

We all use software that is built on a foundation of strangers’ work. Even if you hire a developer to write a custom application, software calls trigger functions that were previously programmed by someone else. This means code weaknesses — put there either accidentally (like from mistyping) or maliciously by a criminal — end up in many different kinds of software. And these weaknesses can be exploited by criminals … [6 min. read]