Perpetual Motion

If Not Now, When?

“Cybersecurity and Infrastructure Security Agency Director Jen Easterly told industry leaders in a phone briefing Monday that a vulnerability in a widely-used logging library ‘is one of the most serious I’ve seen in my entire career, if not the most serious.’

“‘We expect the vulnerability to be widely exploited by sophisticated actors and we have limited time to take necessary steps in order to reduce the likelihood of damage,’ she said of the Apache Log4j flaw. The issue is an unauthenticated remote execution vulnerability that could allow an intruder to take over an affected device.

“Hundreds of millions of devices are likely to be affected, said Jay Gazlay of CISA’s vulnerability management office in the [same] call” –as reported by Tim Starks, cyberscoop.com, Dec. 13, 2021

Because of how widespread this vulnerability is, affecting everyone from Microsoft to Apple to Amazon to Google (in fact it affects millions of pieces of software, it is time to make sure your business is as protected as possible. You may not hear bullets, but that doesn’t mean we not are in a war … [5 min. read]

2FA!@$%

Thunder and Botheration!

“If there’s 2FA, enable it,” said Bryley’s Garin Livingstone when asked for his baseline recommendation for everybody for computer security.

2FA or MFA (two- or multi-factor authentication) is adding a second (or more) proof of your identity before being granted access to a machine or software.

2FA may also rank among the biggest pains in the neck … [4 min. read]

Win11

Tempted by Windows 11?

Like it did six years ago for Windows 10, Microsoft is wooing end-users via ads for a free Windows 11 upgrade. Who doesn’t want to take the latest tech out for a spin? And for free?!

But as far as business continuity is concerned (business continuity is the planning and process by which organizations maintain operation, not severely disrupted by a disaster or other unwanted incident) maybe this bargain is not yet a good deal … [5 min. read]

Building wireframe

Assessing Risk Helps Ensure Business Continuity

No construction company would undertake a building without first evaluating and then understanding how it will handle the project’s risks. But that is how a lot of Information Technology is executed. Does that make sense? Think for a moment how much of your employees’ livelihoods and the services and products your organization provides depend on networked computing. Isn’t that how you store and access your intellectual property, client information and business processes?

And do you keep building higher, putting more strain on the network? For instance does an Internet-of-Things machine need to be granted access to your network? Or does someone’s personal device need to log-into your system? … [5 min. read]

Garin

President Garin Livingstone on Cybersecurity

In recognition of cybersecurity awareness month Bryley President Garin Livingstone was invited to speak with Hank Stoltz on the Worcester Chamber’s WCRN radio program Voice of Business … [3 min. read]

Microscope

Why Don’t Businesses Do Network Assessments?

Too often network assessments wind up at the bottom of the to-do list as today’s urgencies move continually to the top of mind and focus … [5 min. read]

MSP 501 2021

Bryley Systems Named to 2021 Channel Futures MSP 501

The MSP 501 designation is an IT industry signifier that recognizes best-in-class operational efficiency and business models. The MSP 501 award is a sixty point, independent audit verifying that Bryley is a fit and stable operation from which to provide its clients dependable business continuity … [2 min. read]

Ethan

Ethan Crushed It

Ethan crushed it. Again. Thanks … [1 min. read]

Circuit tree

The Strengths of an Inter-Generational Tech Team

Founded in 1987 Bryley has a diverse group of talent serving its customers – from some for whom this is their first job out of college – like Ethan Brush – to those that (as Lear’s magazine used to say) weren’t born yesterday … [2 min. read]

keys

Responding to Cloud-Based Email Server Attacks

“Just awful” –the opinion on the state of a Fortune 500 company’s security by the hacker who stole fifty million credentials

Lately organizations have been choosing to migrate their email networks to cloud-based email providers like Microsoft 365. These cloud-based systems are appealing with their low cost per user monthly billing, ease of management and built-in security. But what are the risks these businesses can expect on a cloud-based email platform? … [5 min. read]