Robin Powers Joins Bryley Systems!

Robin Powers is the newest member to join Bryley Systems’ Business Development team.  In her role as Sales Support, Robin will assist with proposals, presentations, and general business development functions.  She will work closely within the team to further enhance client support and relationships.

Prior to Bryley Systems, Robin was employed at Stratus Technologies for 25 years as an Administrative Professional in their IT Department.  Bryley Systems welcomes Robin as she brings years of expertise in the technology field.  Ms. Powers has a BS from UMass Amherst.

Bryley’s Prestigious Channel Partners 360° Award Travels the U.S.

After Being honored as one of 25 recipients worldwide, our prestigious award is traveling the U.S. in celebration – being one of the most sought-after in the industry of technology solutions.

About Red Canyon.  From the Native Americans who traveled the canyons, to people like J.W. Humphry who constructed the tunnels, Red Canyon on the Dixie National Forest has fascinated people for centuries. Unique vermilion-colored rock formation and stands of Ponderosa pines make the canyon exceptionally scenic.

 

 

“Bryley Systems works toward continuous improvement; we strive to manage, optimize, and secure our client’s information technology, which brings substantial business benefit and value to their organizations. Our team-focused, best-practices-oriented approach, coupled with high-value/low-risk service options, enables us to provide our clients with Dependable IT at a Predictable Cost™. We thank Channel Partners for this prestigious Channel Partners 360° award!”

– Gavin and Cathy Livingstone, Co-Owners, Bryley Systems, Hudson, MA

Case Study: WRTA Turns to Bryley to Help Coordinate Move to New Facility and Deploy New Computer Infrastructure

The Company: Worcester Regional Transit Authority

The Worcester Regional Transit Authority (WRTA) services the City of Worcester and 36 surrounding towns with a bus fleet that includes all-electric buses and many diesel-electric hybrid buses. As the second-largest regional transit authority in Massachusetts, WRTA features a real-time bus arrival information system that includes the latest advancements in communication technologies—with automatic vehicle announcement, locator and monitoring systems as well as dynamic message signs. The organization is operated by Central Mass Transit Management.

The Challenge: Find an IT Partner Who Also Understands the Big Picture

As the buildings that house the buses, the garage, and the computer data center began to age and experience environmental issues, the WRTA planned a major move into a new facility. The servers and the network were also reaching end-of-life status, so the organization decided to upgrade the computer infrastructure at the same time.

Given the scope of the two projects, the WRTA had to coordinate planning across several third parties. When it came to the new server and network infrastructure, the organization thus needed an IT partner with high-level technology design skills who could also work well with the building construction crew as well as the telecommunications provider and the company that provides the technology to operate the buses.

“With all the moving parts and players, we needed an IT partner who would help us make sure the entire project kept moving forward,” says Donna Novelli, Director of Risk Management and Administration for Central Mass Transit Management, the private entity that manages operations for the WRTA. “It was important to work with someone who would focus on the big picture and not just be concerned with their role.”

The Solution: Bryley Systems—A Long-Time Trusted IT Partner

From the start of planning the project, which began several months before the move deadline, Novelli knew who the IT partner would be. She never considered anyone else.

“Bryley Systems has been our outsourced IT partner since 2011,” Novelli explains. “They have done a superb job keeping our computer network running at peak levels on a daily basis while also advising us when the time is right to deploy new technologies. Bryley has the technical and the logistical project management expertise as well as the resources to help organizations like ours successfully complete a major move and a technology upgrade at the same time.”

Knowing in advance that the move to the new facility would occur, Bryley advised WRTA to hold off on upgrading the computer network until the move and then helped the organization ensure the previous network infrastructure would continue to meet its IT needs. For the move to the new facility, Bryley designed a new computer infrastructure that includes 28 virtual server instances running on five physical Hewlett Packard servers, 16 Cisco network switches, and a Cisco Wi-Fi network.

The infrastructure is protected by four firewalls and system backups that replicate data and applications to an offsite data center managed by Bryley. Bryley also disconnected approximately 60 workstations in the old facility and then reconnected them in the new facility.

The Deployment: Changing Timeline Requires Nimble Flexibility

To help keep the project moving forward, Bryley Systems met with Novelli and the other partners on a weekly basis to synchronize their tasks. As Bryley configured and burned in the servers, switches and the Wi-Fi gear in advance of the implementation, the five-person team expected to have a six-week window in which all the devices could be deployed. But as the construction timeline changed, and as other partners needed more time to prepare their installations, the window shrunk to about two weeks.

“Bryley remained flexible the entire time, and they coordinated all their resources to make sure their portion of the project was still completed on schedule—despite the much shorter timeline,” Novelli says.

Bryley’s efforts included implementations during weekends and very early in the morning. With buses running until about midnight and starting up as early as 5:00 a.m. the next day, the downtime window was very small.

“We kept to our committed bus schedules even during the final cut-over weekend when we closed down the old building and made the final move into the new facility,” Novelli points out. “That was a big accomplishment, and Bryley played a major role in our success by adapting to the changing needs of the situation.”

Benefits: Improved Network Performance and Peace-of-Mind

With the new IT infrastructure, WRTA now has a complete virtual local-area-network along with a wireless network that both utilize the latest technologies. This includes advanced solid-state flash storage from Hewlett Packard that speeds up file save and access processes for end users such as vehicle tracking, location prediction and record keeping as well as real-time communication between drivers and dispatchers. The new network also ensures better application performance.

Looking back at the success of the project, Novelli says the major benefit that she and the organization receives from Bryley Systems is peace-of-mind knowing that IT systems will function as required: “Whether it’s handling a major move like this one, or making sure our computer network remains up-and-running, we trust Bryley to get the job done. They proactively make sure all the details are taken care of so that we can avoid surprises that hamper daily operations.”

The partnership with Bryley also continues to allow Novelli to maintain a minimal internal IT staff. “It’s just me and one other person—otherwise we rely on Bryley for everything from help desk support to long-term technology planning,” Novelli says. “We continue to partner with Bryley for their expertise and the value they bring to our organization. They provide a full range of staff that can assist at the consultant level for servers and design along with the technicians that help our end users. They are always responsive to anything new we need—even if we need it right away.”

Side Bar

Major Benefits—IT Infrastructure Deployed in New Data Center by Bryley Systems:

  • Implemented during off-hours to avoid network downtime during operational hours.
  • Coordinated the deployment to sync with construction activities and actions of other vendors.
  • Met timeline requirements even as the window for deployment shrunk from six to two weeks.
  • Provided peace-of-mind that computer network would continue to function after the cut-over.
  • Delivered new technologies that enhance application performance for end users.
  • Enabled internal IT team to maintain minimal-size staff.

Why old technology is scarier than SCI-FI thrillers

As we’ve seen from the latest cyberattacks, old technology can be far more scary (and harmful) than the scariest Sci-Fi movies.  “We have the sci-fi depictions of sentient networks that will turn against us, but the problem is, we’ve already built something way too complex for us to be able to manage as a society,” according to Wendy Nather, principal security strategist at Duo Security. “This is a very shaky foundation that we have to clean out and redo.”1

The majority of cyberattacks occur as the result of exploiting a weak spot in legacy software running on legacy machines. “The problem with these outdated systems is that they are (predominantly) no longer supported by the company that created them. You are on your own. If a new vulnerability is discovered by cyber criminals, there will be no security updates released to patch the issue. It’s also unlikely you will be informed of this vulnerability, meaning you are blindly running a system prone to constant attack.”2

These attacks aren’t just perpetrated against small companies. In 2015 and 2016, Russian hackers brought down Ukraine’s power grid, plunging 103 cities and towns into darkness.3

Hospitals are another high-value target for cybercriminals. Medical facilities focus primarily on patient care. Technology if often a secondary concern. The WannaCry attack, for example, struck UK hospitals, forcing many to turn patients away. Security expert, Janie Larson, recounted an incident in which malware had infected EEG machines that were connected to children – disconnecting them to update the software would have proved detrimental to the patients.1 How would you choose between paying the ransom demanded by the hackers and preventing harm to high-risk patients?

So, what can be done to prevent a cyberattack like this?

  • Regularly check for updates and patches on all software and devices in your environment.
  • Be mindful of end of life. Know when your technology will no longer be supported and have a plan in place for when that happens.

If you’re ready to protect your organization, it pays to work with a Managed IT Services/Managed Cloud Services company, like Bryley Systems, to ensure that you’re taking the right steps. Bryley will recommend solutions to eliminate weak links in your security chain, and help you develop an organization-wide policy to help prevent potentially catastrophic data loss and system downtime.

Please contact us at 978.562.6077 or by email at ITExperts@Bryley.com.

We’re here for you.

 

1 Larson, Selena. CNN Tech.Why old tech is scarier than Hollywood AI.” 30 June 2017.

2 Jones, Ed. CloudTech.The hidden dangers of legacy technology – and how to resolve them.” 10 October 2016.

3 Perez, Evan. CNN Politics. “U.S. official blames Russia for power grid attack in Ukraine.” 11 Feb 2016.

Bryley Basics: How to get the most life out of your computer

Have you noticed that you have been able to squeeze more life out of your technology devices than ever before? According to Intel’s CEO, Brian Krzanich, the cycle has expanded 20% from four years to five or six1. In our experience, upgrading an operating system on a Windows PC can often cost more than replacing the PC with a PC that has a newer OS. This is often because OS upgrades are not always reliable, particularly with legacy applications, or drivers that are no longer available for older hardware. For business users, we typically wipe the drive clean and then reinstall a new OS rather than upgrade.

Another way to extend the life of your device is to take care of the battery. Having the battery constantly plugged in actually does more harm than good and decreases the overall lifespan of the device. For long term battery life, it is recommended that you regularly allow your battery to drain.

You can further extend the life of your machine by completing incremental upgrades such as adding more memory, upgrading graphics cards, and replacing older hard drives with SSDs.

These tips are aimed at helping you extend the life of your devices and are not meant to keep them on “life support.” There will come a time when you have diminishing returns and will need to replace the devices.

Remember, we are here to help; please reach out to us at 978.562.6077 or email ITExperts@Bryley.com.

 

  1. Computer World. 1 June 2016. “The PC upgrade cycle slows to every five or six years, Intel’s CEO says.”

Office 365 Changes

Office 365 recently announced some updates to the platform.  Below is a list of changes taken from their Message Center:

 

Sept. 18th
Updated feature: Office 365 login screen
How does this affect me?
Any user logging into Office 365, from anywhere in the EU, will see a cookie disclosure banner. This banner will show the first time the user loads the page and will not show again for a few months, or until cookies are cleared on the browser. There is no action the user has to take on this banner and there is no change in workflow. This change is intended to meet EU regulatory requirements.   This process should be completed by the end of September.

Sept. 19th
Updated feature: Office 365 multi-factor authentication screens

How does this affect me?
If you have multi-factor authentication (MFA) turned on, users in your organization will see an updated experience for MFA screens that matches the new sign-in experience. This will only show when users opt-in to see the new sign-in experience, by clicking “try it now”. If users do not opt-in, they will continue to see MFA screens in the current experience. This change will start rolling out in the next few days.

What do I need to do to prepare for this change?
There is nothing needed on your end, but you may consider user training.

Sept, 20th

Known Issue: Email access in iOS 11
If you are using the native mail app on your iPhone or iPad, and upgrade to iOS 11, you may encounter issues.

How does this affect me?
Due to an incompatibility in the new release of iOS, users of the built-in Apple Mail app in iOS 11 may be unable to sync their Office 365 mailbox or login to their accounts. iOS 9 or 10 users are not affected.

What do I need to do to fix this?
Microsoft and Apple are working to resolve this issue.  In the meantime, it is suggested that you download the free Outlook for iOS client, available in the App Store.

Bryley Basics: How to Clean your computer to ensure optimal efficiency

Technology was designed to make our lives easier and more efficient, but it can only do that if it’s maintained. As the winter months approach, it’s a perfect time to ensure your computer is running efficiently.

What needs to be cleaned?

  • Keyboard. Do you eat on or near your computer? If so, crumbs may have inadvertently fallen underneath them and could be impeding their function. Once a month, turn the keyboard upside down and gently shake it to remove the bigger crumbs. If the keys are still sticking, use a can of compressed air to gently remove the dust and other debris that is out of reach. Don’t forget to disinfect the keys! This can be performed using a Q-Tip, or other cotton swab, and some rubbing alcohol. Make sure you do not saturate the Q-Tip as you only want the alcohol to go on the keyboard surface, not inside!1
  • Defrag your computer. If you notice a drop in speed, and you have a SETA drive (one that spins, not an SSD drive) it may be time to defrag your computer. Fragmentation occurs when there is not enough contiguous space to hold the complete file. An algorithm is then used to break that data so that it fits into the available space.2 The slowness is caused upon retrieval; the computer must search the entire hard drive to find all the pieces of the data or file. “When you defrag your computer you not only increase the speed of the computer but you also keep your hard drive healthy and extend its lifespan. The wear and tear of fragmentation will eventually shorten its life but with proper maintenance you keep it running smooth and steady.”3 The general rule of thumb is to defrag when your disk is more than 10% fragmented.4 The frequency of running a defrag depends upon the usage of the computer. If the machine’s main duties are for general use (web browsing, email, games, etc.), completing a defrag every month is recommended. If you use it more often (8 hours per day), it should be performed roughly every two weeks. It is important to know that a defrag may take a few hours to complete so it is best to perform this overnight. Just make sure energy-saving features such as a screen saver are temporarily turned off as this may cause the defragmentor to stop and restart the process.5 Make it easy and set up an automatic defrag schedule.
  • Cleanup your folders. Take regular stock of what is housed on your computer. If you have files that you haven’t touched in months or even years and are not necessary to keep, delete them from your computer. Having too many files will slow your machine as it needs to sort through them all when conducting a search.
  • Delete Programs you no longer use. Similar to files that you haven’t opened in a long time, go through your programs and delete ones that you have not used. Maybe this will give you the added push to learn that software you downloaded months ago, but never pursued.
  • Cleanup your desktop. While keeping files on the desktop can make files easier to find, but can quickly become overwhelming and inefficient. The last thing you want to do is to be rifling through icons looking for that one document. Instead, place them in subfolders within “My Documents.” By creating a file system, it will be easier to find the folders and will take up less space on your hard drive. Additionally, files on the desktop are not as protected as those in “My Documents” or “My Pictures. “For instance, if you use System Restore to return Windows to its state as of last Wednesday, the feature will remove any files added to the desktop since that date. The files in My Documents will be left untouched.”6
  • Cleanup your browser. Similar to cleaning your desktop, it is recommended that you regularly check your browswer applications to see if there’s any that can be removed. This will streamline your browser and lower the demands on the hard drive.
  • Install Updates. Just because your system appears to be running well, doesn’t mean you should ignore system updates. “Staying current on updates will not only keep your computer running well today, it will fend off unforeseen problems tomorrow.”7

By performing these tasks regularly, you will be able to extend the life of your hard drive, and be more efficient. There’s nothing worse than replacing a device far sooner than you expected because preventative care measures weren’t taken.

1 http://www.popsci.com/clean-your-keyboard-without-breaking-it#page-5. Maldarelli, Claire. Popular Science. 10 March 2017.

2 https://www.techopedia.com/definition/14331/defragmentation

3 http://www.toptenreviews.com/software/articles/defragmentation-keeping-your-hard-drive-happy/

4 https://www.lifewire.com/how-often-should-you-defrag-3976922

5 https://www.bullguard.com/blog/2017/04/pc-spring-cleaning-9-easy-steps-to-make-your-old-pc-run-like-new-again?lang=en-IN

6 http://www.pcworld.com/article/2110003/the-pros-and-cons-mostly-cons-of-saving-files-to-the-desktop.html

7 http://time.com/3841939/computer-clean/

Image: http://mashable.com/2017/07/25/messy-computer-desktops/#zMJGuxOn_gq2

No Power? No Problem. Just Plan Ahead…

Natural disasters, severe weather and even cars that knock over electric poles, can all wipe out power sources and cause businesses to lose the ability to communicate through cellphones, landlines and email.  If you are a business owner, being forced to inconveniently and unproductively “wait it out” is usually not an option.  And, power outages can be much more than inconvenient; they can be costly.

A study by the University of Lincoln has concluded that “power cuts will become more regular around the globe as electrical supply becomes increasingly vulnerable and demand for technology continues to grow at an unprecedented rate.”1    And, The Washington Post reports that “the U.S. grid is aging and stretched to capacity. More often the victim of decrepitude than the forces of nature, it is beginning to falter.   Experts fear failures that caused blackouts in New York, Boston and San Diego may become more common as the voracious demand for power continues to grow. They say it will take a multibillion-dollar investment to avoid them.”2

Organizations need to be prepared for a power outage, regardless of the cause. That preparation should be focused on preserving data both inside the office as well as data located on servers stored in an offsite data center.  All of your digital assets, including software, are vulnerable to being wiped out during a power failure.  To protect your business and eliminate that vulnerability, you need to do some prep work to back up your data and implement basic hardware security measures.

Many business owners prefer not to think about this, but safeguarding your assets will allow your organization to at least partially function during an event vs. being at the mercy of the power grid.  The amount of time and money it takes to prepare for a potential power failure is fractional compared to the amount of time and money it would take you to rebuild your empire of digital assets from scratch.  Digital assets get wiped out all the time during power failures.

Back up your data and get your employees on board with performing regular backups of their work. This is the most basic of all requirements for being ready for a power outage, but many people don’t do it, either because they don’t know how or it can seem overwhelming. Not backing up your files is taking a huge risk that everything could be gone in the blink of an eye.

Organizations with larger networks should have backup servers that can continue to distribute data during, or, after an emergency.  Off-site data backup is recommended, and, data may also be saved to the cloud.

Even if you have multiple backup locations for your files and don’t have to worry about losing your digital assets, you still need to be aware of the potential for losing your physical devices like computer hard drives, power sources, and motherboards. It should be noted that solid state drives are not immune to being fried by a power surge.

It is not the power outage that causes damage to your hardware, it’s the power surge that does the damage. A surge protector is one way to prevent damage to computer hardware, but it’s not a guarantee – sometimes they work, sometimes they don’t. How well it works will depend on how much power your particular unit is designed to withstand and if you’ve replaced it.

If your equipment is damaged, the most efficient and cost-effective fix is to replace the unit.  While the hardware may not be expensive, the labor costs alone will often outweigh the price of a new machine.

If you’ve got your data backed up, you probably don’t need to worry much about the cost of replacing your hard drive; most hard drives are fairly inexpensive. Even so, it’s a hassle to replace, so you should protect your hardware as much as possible.

The first line of defense against power outage issues that impact business continuity is on-site power protection. This is a proactive measure that requires planning and implementation before the power outage occurs. To protect data and servers, organizations should have uninterruptible power supplies, or UPS’s, and ideally, an on-site backup power supply, such as a generator. This can ensure that your business suffers no loss of data in the short term, while your continuity plan is being implemented.

In addition to backup power solutions, load-capping software and power distribution units should be considered. For short-term outages, battery backup may be sufficient for communications and VoIP systems. Planning should include identifying and outlining battery specifications and status as well as battery-replacement policies. Emergency battery-powered lighting should be available in multiple areas around your building if you do not have a backup-lighting system.

The cost of providing on-site power for a long period of time can be high, so for outages that last longer than an hour, organizations should have alternative options, such as an off-site location for protecting data and ensuring access.

Securing off-site data backup and disaster recovery solutions, such as Bryley’s Business Continuity, is something every business should have in place before a power outage occurs, and most organizations should take that a step further and move all critical IT infrastructure into the cloud. Data centers provide improved resiliency, reduced power and cooling expenses, and easier infrastructure management, in addition to ensuring continuity during power outages.

A few more tips…

  • Always plug computers and laptops into surge protectors instead of directly into the wall.
  • When your laptop or other digital device is done charging, unplug the charger immediately. This saves your battery from losing charge capacity, and it also makes sure your device won’t get fried if there’s a power surge.
  • Have an uninterruptible power supply (UPS) at every desk and make sure your employees know what to do after a power surge. The UPS may only give them enough power to properly shut their machine down, so they’ll need to act fast.
  • Always unplug your electrical devices during a storm, especially a lightning storm. There is no surge protector in the world that will protect your computer from a lightning strike.
  • Not every organization requires a dedicated generator for backup power because most businesses can tolerate the downtime of a short-term power outage.  Many office buildings have standby generators that companies can rely on.  Be sure to know if you are equipped with a standby generator if your organization requires one.

Remember, having a plan and being prepared is your first line of defense.  If you are concerned about the emergency power outage strategies your business has or some other network issue, please contact us at 844.449.8770 or by email at ITExperts@Bryley.com.

We would be glad to help you assess and mitigate your risks.

References:

  1. https://www.sciencedaily.com
  2. https://www.washingtonpost.com/local/trafficandcommuting/aging-power-grid-on-overload-as-us-demands-more-electricity/2012/08/01/gJQAB5LDQX_story.html?utm_term=.0119ff3e554b

Google Announces Ad Blocker for Chrome

Google is a fantastic tool to conduct research but as we scan web sites to gain access about the topic of interest, oftentimes pop-up ads and videos appear out of nowhere.  The result is that we turn away from a web site due to these interferences.  Google is aware of this and has come up with a solution that’s set to launch early next year.

What is it?  Ad blocker from Chrome works like an ad filter – it won’t block all the ads from a web site, only the ones that are determined to be too intrusive, like pop-overs and auto playing audio and video. They’ll be filtered because they’re considered to be bad ads, according to the Coalition for Better Adds.  “But who’s part of the Coalition for Better Ads? Google, for one, as well as Facebook. Those two companies accounted for 99 percent of all digital ad revenue growth in the United States last year, and 77 percent of gross ad spending.”1

Sridhar Ramaswamy, Senior VP of Ads and Commerce, said Google wanted to “build a better web for everyone” by eradicating intrusive ads online without removing all ads entirely, since so many sites rely on ads as their source of revenue. “The vast majority of online content creators fund their work with advertising. That means they want the ads that run on their sites to be compelling, useful and engaging–ones that people actually want to see and interact with. But the reality is, it’s far too common that people encounter annoying, intrusive ads on the web–like the kind that blare music unexpectedly, or force you to wait 10 seconds before you can see the content on the page. These frustrating experiences can lead some people to block all ads–taking a big toll on the content creators, journalists, web developers and videographers who depend on ads to fund their content creation.” 2

From a consumer’s end, you won’t have to do anything except for updating your Chrome browser. For publishers, Google will provide a tool that you can run to find out if your site’s ads are violating the guidelines. The blocker will apply to both desktop and mobile experiences.

Bad ads slow the web down and make it annoying to browse.  This is why many consumers install ad blockers to remove all advertising.  If this continues to be the norm, publishers are going to face more obstacles since nearly all web sites rely on ads to thrive.

With Chrome’s ad blocker, wholesale ad blocking can be controlled such that it pleases both the consumer and publisher.  Users get a better browsing experience and publishers can continue to make profits through online ad sales.

“If successful, the move from Google could slow the adoption rate of ad blockers that flat out block all advertising. However, it has drawn criticism from some because of the power it gives Google, which is itself an ad company and now wants to set standards for the entire industry.  Furthermore, Google has also announced ‘Funding Choices’, a new feature currently in beta that allows publishers to show a customised message to visitors using an ad blocker, inviting them to either enable ads on their site, or pay for a pass that removes all ads on that site through the new Google Contributor.”3

Despite some expected criticism, Chrome’s ad blocker will likely result in a better web browsing experience.

If you have any questions about the web or any Managed IT topic, please contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here to help.

 

References and Sources:
1 https://theintercept.com/
2 https://www.blog.google/topics/journalism-news/building-better-web-everyone/
3 https://www.marketingweek.com