5 Reasons Content Marketing on Social Media is Essential to Your Business’ Success

This week’s blog has been prepared by Russell Mangsen, Principal Consultant at Namra Consultion Group, LLC (NCG).  Founded in 2016, NCG understands the importance of maintaining a strong online presence through social media channels.  The organization seeks to create an online community for their clients and in turn develop long-term, trusting partnerships.

Social media marketing and SEO are two tightly interwoven strategies. Both are organic, inbound strategies that focus on building an appealing identity that naturally attracts visitors. Since social media relies on high-quality content and a visible, strong brand presence, the efforts you spend on SEO can doubly improve your social media reach, and as most search marketers will tell you, your social media presence can greatly increase your search rankings.” (DeMers).

Most business owners understand the concept of content marketing, since, at its core, it makes sense; posting interesting content online, which generates consumer interest allows you to develop a following of potential customers for your business. In theory, it makes sense. But, how often do you have to post to see results? How do you develop this “interesting content” and how do you keep it interesting? What social media platforms are most important for your business? And finally, the biggest question we hear on a regular basis: “This takes a lot of time… Is it really worth the effort?”

When we hear this question (and we hear it a lot), we completely understand. How could a social network, originally built for teenagers and college students to make party plans, become a marketing tool, so powerful that every business in existence needs it just to survive? Well, here’s how: Let’s take a look at the amount of monthly users some of the most popular social media platforms had in 2016 – a number which has only grown since, and will continue to grow in the future.

“Social platforms have become the new leaders in the digital media industry, evolving well past their beginnings as digital communication networks and becoming full-fledged media distribution channels and entertainment centers.” (Adler).

Not bad, right? Now, let’s dive deeper into the ways social media can truly be used as a marketing tool, and a powerful one at that. There are many benefits to developing a strong digital presence for your business on social media. We’ve narrowed it down to what we believe are the 5 most important impacts a strong social media presence can have on your business. Our hope is that some of you may be able to justify dedicating the time or other resources necessary to bring your business into the digital age. It’s true, content marketing on social media requires a large amount of time and effort. When done correctly, though, it can allow your business to:

  1. Increase qualified leads by creating content, which drives your audience through social media to your website. At its core, the simplest goal of social media is to generate consumer interest, which organically drives traffic to your website – or wherever the sale happens in your business – when your audience desires more information. By creating content your target audience is interested in, you are increasing the chances a potential customer will come across your business’ online presence. Once they do, they will express their interest in your product or service by “Liking” or “Following” your business’ social media pages. One of the most common mistakes a business owner can make in today’s digital age is underestimating the value of their social media pages. What you may see as a simple “Like” on Facebook is actually a real person essentially endorsing your business, showing their support, and looking forward to your future posts because they are interested in the services you offer – the very definition of a qualified lead. What more could you ask for as a business owner?
  2. Increase your search engine performance by forming a cohesive link between your social media presence and your website. Posting industry-relevant and valuable content on multiple social media platforms, while maintaining your website, can have astronomically positive effects on your search engine performance and overall inbound marketing efforts. Your search engine performance will organically perform better as you create more industry-relevant content. The more high-quality content you produce, the stronger your company’s digital presence will become. Posting related content across multiple platforms will create synergy between each of your digital platforms, which serves to enhance the performance of your entire digital presence when people search for your business in Google. Simply put, the more content you create and spread across a broad array of platforms, the stronger your business will perform online. The final result being, when a consumer searches for your something industry, not only will your website appear on Google, but your Facebook page will appear as well.
  3. Build a more personalized brand by creating original content. So you’ve got people searching for your services on Google. They see your website, and then check out your Facebook page. That’s great, but what do they see? Anything interesting? Thought provoking? Or, just another business posting about the exact services they have listed on their website? On social media, it’s important to find the perfect balance between showcasing your services and showing the world “who” your business is. This is a great opportunity for you to build trust with people who have never even met you. Social media, at its core, is about connecting people with other people. Generally speaking, most people like to do business with people they know and trust. Your consumers want to get to know your business’ personality, and social media allows you to fully customize the message you wish to communicate to them. It also gives you the ability to display the people who make up your business, which is what social media is all about.
  4. Increase the effectiveness of your marketing by focusing on engagement, not just your lump-sum total impressions. “The entire marketing world is obsessed with impressions. You might hear someone say “40,000 people saw this video.” But the truth is, they didn’t. They didn’t because as soon as the ad came up in video form, they clicked away to a new tab to look at something they actually wanted to see. But they count as an impression. They count as ‘seeing it.’ On TV, it’s the same problem. Nielsen sees how many people watch a TV show and they count those impressions against the ads that ran during the show. But as soon as commercials came up, people picked up their phones. They opened Facebook or Instagram. They aren’t engaged with the TV.” (Vaynerchuk).
    In today’s world, content is king. Social media gives any business the opportunity to shine bright and break away from the overcrowded marketplace in their industry by creating engaging content that actually appeals to your consumers. Rather than spamming them with your logo and tagline over and over again, you will generate a following of potential buyers who simply like what your business has to say. The idea here is that you are telling the story of your business and engaging with the community around you, rather than hitting people with a new advertisement every day. This increases the effectiveness of your efforts in the same way that meeting with a potential buyer in person works better than sending emails back and forth or talking on the phone. It’s about the personal connection.
  5. Maximize your budget by saving money and spending efficiently. No business has an unlimited marketing budget, and with so many options for traditional advertising – newspaper, radio, television, online advertising, etc. – it can be difficult to determine which marketing channels will show you the highest returns. In some cases, the most appealing aspect of content marketing on social media is that it requires little to no capital to get started. After all, creating a Facebook or Instagram account is free. However, there is some give and take involved here, because in order to see results, a large time commitment must be made to generate appealing content on a regular basis for your audience to interact with. Many businesses see this as time well-spent, because if one thing is for sure, it’s that people are spending more time on digital devices now than ever before, and the world is only going to become more digitally oriented as time goes on. For this reason, it is essential for your business to begin focusing on building a strong digital presence.

After taking a look at these 5 main impacts social media can have on your business, we have seen many skeptics start to understand the importance of content marketing on social media. The majority of these skeptics even begin rationalizing the time or monetary investment needed to produce high results using the content marketing technique.

In conclusion, if you get one thing out of this article, we hope it’s this: There’s a reason we put billboards on the side of the highway instead of in the middle of vacant fields. Your consumers are on social media. If you want to get in front of your consumers, you need to be there too.

Sources

Vaynerchuk, Gary. “When Will Marketers Talk About Attention, Not Impressions?”. Gary Vaynerchuk. N.p., 2015. Web. 9 Jan. 2017.

DeMers, Jason. “6 Social Media Practices That Boost SEO”. Forbes.com. N.p., 2017. Web. 9 Jan. 2017.

Adler, Emily. “Social Media Engagement: The Surprising Facts About How Much Time People Spend On The Major Social Networks”. Business Insider – Tech Insider. N.p., 2016. Web. 9 Jan. 2017.

A Cybersecurity Plan Is NOT Optional – No Matter What Size Your Organization Is!

In 2016, cybercrime was on the rise, and within the past 5 years, the main targets have become smaller organizations.

As organizations attempt to educate themselves on this evolving threat, computer hackers are hard at work looking for new vulnerabilities to exploit. IT professionals and business owners need to keep track of ongoing trends in cybercrime and cybersecurity. Although most data breaches that reach the headlines are large organizations, don’t be fooled – small and medium business (SMBs) face a high level of risk.

Mitigating your risk is an important strategy and now is the time to begin planning for the year ahead.

All equipment must require login with a complex password or pass-phrase. Ideally, each of your passwords would be at least 12 characters, and contain a combination of numbers, symbols, uppercase letters, lowercase letters, and spaces. The password would be free of repetition, dictionary words, usernames, pronouns, IDs, and any other predefined number or letter sequences.

All potential points-of-entry should be protected and have detection capabilities. Cyber criminals work digitally — through viruses, spyware, malware, etc. – to extract information without ever physically entering your office. Bryley Systems provides a multi-layer, multi-point of entry approach to protecting our customers’ data.  This approach provides multiple layers of both hardware (network and web access) and software (anti-virus and anti-spyware) protection which are constantly updated.

Security logs should be monitored to detect threats and achieve compliance. Organizations are under constant pressure to protect data and crucial IT equipment. Monitoring logs is a critical component of a security strategy and a requirement for regulations such as PCI DSS, GLBA, HIPAA, SOX and others.

When putting together a cybersecurity plan, it is important to use these guidelines:

Identify. You need to know exactly what you have that is worth protecting. This identification step should include transmitted and stored data, networks, all endpoint devices, machines, users, and systems. Once all assets have been identified, you should perform a security assessment to locate each potential weak link within the assets you have identified.

Security Assessment. A security assessment will give you a clear view of your current weaknesses, potential points of entry for hackers, and the strength of your current security measures.  Computer security is an ever-changing world. Utilizing a layered approach is the best defense against cybercrime. Every organization, regardless of size, should continually manage, evaluate, and update their security infrastructure to lessen the threat of a cyberattack.

Protect. Once you understand what you need to protect, you can take immediate steps to secure those items. Protection involves a variety of measures, including implementing authentication and applying patches and updates to all equipment and software. Some assets may require upgraded technology to achieve the necessary security standard.

Detect. After you have put security measures in place, the next step is to implement the technology to monitor your environment for threats, such as firewall intrusion, distributed denial of service (DDoS), and ransomware attacks.

Respond. There is a saying in the cybersecurity community: “It is not a matter of whether your organization will experience a cyberattack. It is a matter of when.” No matter how good your cybersecurity plan is, you may still experience a threat or a breach. Therefore, it is crucial for your organization, or a designated third party, to decide how to respond to each type of threat. For example, your security tools may handle a threat automatically in one instance, but require a technician’s response in a different type of situation.

Recover. If your organization does experience a breach, you will want to have a recovery plan in place. The plan should spell out what actions should be taken, what tools should be used, and which person or partner will be responsible for recovering data, systems, and applications.

If you would like to improve your 2017 cybersecurity plan, or to inquire about Bryley’s full array of our Managed Cloud Services and Managed IT Services, please contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.

Bryley Basics: HP, Inc. Battery Recall

HP, Inc. recently recalled some of its laptop batteries due to fire concerns. This recall affects less than 1% of the laptops purchased between March 2013 and October 2016.

The batteries being recalled were primarily sold online or in big-box stores (like BestBuy). They are black in color and were in these HP laptop models:

  • Compaq
  • Compaq Presario
  • Envy
  • HP
  • Pavilion
  • ProBook

Affected batteries, like the one pictured below, have barcodes that start with these characters:

  • 6BZLU
  • 6CGFK
  • 6CGFQ
  • 6CZMB
  • 6DEMA
  • 6DEMH
  • 6DGAL
  • 6EBVA

HP released this statement: “Consumers should immediately stop using the recalled batteries, remove them from their notebook computers and contact HP for a free replacement battery.”

For details, please visit the HP Notebook Computer Battery Safety Recall and Replacement Program.

If you would like assistance with a HP laptop purchased from Bryley Systems between October 2013 and August 2016, please call us at 978.562.6077 or email us at ITExperts@Bryley.com.

How and Why Is Cloud Computing Beneficial for Small and Medium Organizations?

Cloud computing is not just for large organizations. That’s a fact.

Many small businesses are migrating to the cloud and experiencing benefits that were never possible before.  Cloud computing allows people access to a wide range of applications via the Internet.  Prior to the advent of cloud computing, software had to be downloaded and installed on physical computers or servers in brick and mortar offices. Those days are gone.

The cloud is becoming more popular because:

  • Cloud-based applications and services can be accessed anytime from anywhere. All you need is a device with an Internet connection.
  • The time, effort and cost of managing your systems goes away
  • The cloud is effectively infinite in size; you need not worry about running out of capacity

Here are some top reasons why organizations are choosing the cloud…

Work from Anywhere. If you have an Internet connection, you can work. Most cloud services are accessible from any device. Organizations can now offer more flexible work schedules to their employees, thereby increasing productivity.

Disaster Recovery. Organizations of all sizes should be investing in robust disaster recovery. For smaller, budget-conscious organizations, cloud-based disaster recovery is ideal. It saves time and money by eliminating high, up-front costs, and internal IT teams are no longer tasked with the complexity of maintaining a best-in-class disaster recovery system.

No Hardware Costs. Cloud computing eliminates the high cost of hardware. You “pay as you go” using a subscription-based model that’s easier to budget.

Security. When your data is stored in the cloud, you can access it anytime from anywhere. You can even remotely wipe data from lost or stolen laptops so it doesn’t get into the wrong hands.

Automatic Software Updates. Servers are off-premise so you don’t have to worry about maintaining them. Software updates are performed as they’re released.

Flexibility. Cloud-based services are ideal for organizations with growing or fluctuating bandwidth demands. If your needs increase, it’s easy to scale up your cloud capacity. If you need to scale down, you can easily do that, too.

Collaboration. Employees can access, edit and share documents anytime from anywhere. Cloud-based file sharing apps are updated in real-time, giving everyone full visibility into current content. Prior to the cloud, workers had to send files back and forth as email attachments to be worked on by one user at a time. That method often led to conflicting document versions.

Greater visibility means improved collaboration, which ultimately translates into a better practices and a healthier bottom line. If you’re still relying on old methodologies, it’s time to move into the 21st century and explore new, reliable cloud-based options that will streamline the way you conduct your business.

For more information about cloud computing, or to inquire about Bryley’s full array of Managed IT Servicesand Managed Cloud Services, please contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.

Brief Review of Cloud Trends in 2016 and Beyond

Cloud trends include1:

  • Options – Switching Public Cloud platforms and Private Cloud compliance
  • Familiarity – Greater understanding leads to refinement in selections
  • Growth – Cloud tends to be the primary engine for IT growth
  • Benefits – Reduction in costs leads all other benefits

Options

Approximately 43% of companies using Public Cloud services that were surveyed in CompTIA’s Trends in Cloud Computing2 switched to a different Public Cloud platform (i.e.: from Google G Suite to Microsoft Office 365). Of these, 46% noted that this secondary migration was more difficult than the initial migration to the Cloud.

The top Public Cloud implementations – email, web presence, and business productivity suites – were used by 51%, 46%, and 45% of the survey respondents, respectively.

Familiarity

Most Cloud-using organizations have a one-to-five year history with Cloud services; they have been through the process before, which simplifies the selection and procurement of new options.

Cloud options, Public, Private, and Hybrid, also are better understood, leading to greater refinement in the cloud-selection process. However, Private Cloud is likely the least-understood option, often being used to refer to a hosted datacenter solution, which is becoming the norm.

Growth

The Gartner Group forecast Cloud revenues of $204B in 2016, a 16.5% growth over 2015.3 Gartner’s 2017 forecast is continued, double-digit growth of 17.3%.

Benefits

Of the CompTIA respondents, over 40% of all organization types – large, medium, and small – cite “Ability to cut costs” as the primary motivation in Cloud computing. Small and medium organizations were also likely to emphasize “Reduce capital expenditures” as a primary motivator.

1Please see ClikCloud Technology Trends for 2017.

2See CompTIA Trends in Cloud Computing from September 2016.

3Visit Gartner Group Gartner says Worldwide Public Cloud Services Market Forecast to reach $204B in 2016 from January 25, 2016.

Bryley Basics: Working with Webroot

Greg Livingstone (Engineer) and Gavin Livingstone (President), Bryley Systems Inc.

Webroot1 is a cybersecurity firm with “…leadership in developing next-generation approaches to prevent attacks, and a proven technology base that spans millions.”2

Webroot’s SecureAnywhere® Nex-Gen Endpoint Security (NGES) is a small-footprint (<1Mb) agent with Cloud-based threat intelligence designed to deliver advanced, next-generation, endpoint security. Webroot NGES offers these advantages:

  • Detection – Behavior-based, predictive/proactive detection
  • Management – Minimal impact with no signature updates
  • Protection – Collective protection among Secured EndPoints
  • Remediation – New threats are journaled to facilitate rollback
  • Threat Intelligence – Machine learning

With its innovative, predictive capabilities, it is becoming the standard end-point protection application of many IT-service providers, including Bryley Systems.

Webroot basics

When Webroot is deployed, this Webroot icon webroot-logo displays on the bottom-right taskbar. Right-clicking on the Webroot icon exposes these options:

  • Scan now – Perform a malware scan
  • Open – Open the SecureAnywhere console
  • Help and support – Show the online help site
  • About – Display the current Webroot version
  • Refresh configuration – Refresh Webroot version*
  • Save a Scan Log – Save scan results to a log file
  • Shutdown Protection – Disable Webroot

scan-now

 

*Refreshing the configuration uploads the current profile, resulting in this message:

secure-anywhere-prompt

Webroot SecureAnywhere console

Selecting Open displays the Webroot SecureAnywhere console, which may also appear in the bottom, right-hand corner during scans. The SecureAnywhere console displays current protection information.

secure-anywhere-icon

Webroot Browsing Security

Webroot SecureAnywhere includes BrightCloud® Threat Intelligence, an add-in for Chrome, Firefox, and Internet Explorer to warn against unsafe browsing.

When enabled, BrightCloud shows the following Reputation icons prefixed to web sites. Hovering over the icon will display a risk statement:

trustworthy Reputation: TRUSTWORTHY – When visiting this website there is a very low probability that you will be exposed to malicious links or payloads.

low-risk Reputation: LOW RISK – When visiting this website there is a low probability that you will be exposed to malicious links or payloads.

moderate Reputation: MODERATE RISK – When visiting this website there is some probability that you will be exposed to malicious links or payloads.

suspicious Reputation: SUSPICIOUS – When visiting this website there is higher than average probability that you will be exposed to malicious links/payloads.

high-risk Reputation: HIGH RISK – This website is a “Malware Site”; there is a high probability that you will be exposed to malicious links or payloads.

These icons are displayed on your Internet browser pages and define the risk associated with clicking on a particular site.

webpage-image

By default, HIGH RISK sites are blocked with the following pop-up.

high-risk-icon

REFERENCES

1Wikipedia history of Webroot.

2Please see the 2015 Frost and Sullivan review WebRoot Smarter CyberSecurity.

Case Study – Transportation Company Relies on Bryley Systems to Stabilize Technology

The Company: RTA Transit Services, Inc., a private company operating on behalf of the Worcester Regional Transit Authority

The Worcester Regional Transit Authority (WRTA) service area includes over half a million in population and is the second-largest regional transit authority in Massachusetts, serving 35 communities. WRTA maintains a fleet of 47 buses including four clean diesel-electric hybrid buses for 23 fixed routes in Worcester and 10 surrounding communities. WRTA also provides para-transit and special services for elderly and disabled passengers. The organization is a state-run agency, and as mandated by federal law, is operated by a private company—RTA Transit Services, Inc.

The Challenge: Build a Stable, Redundant and Scalable IT Infrastructure

To help manage WRTA daily operations, RTA Transit Services previously relied on a variety of software solutions that each functioned on separate hardware system in the data center—with each software vendor specifying its own needs. To address the issue, RTA and its previous IT solution provider deployed virtual machines to handle the application load. But the architecture did not account for future growth, and the two host virtual servers operated independently. A hardware failure on either one would have taken down half the operation.

“We wanted to transform our data center into a more robust platform that could scale easily and adapt to new technologies as our needs change over time,” said John Carney, RTA Transit Systems General Manager. “We also wanted to add a high level of redundancy since it’s critical that we maintain service to our customers in the event of a system failure or a power problem at one of our operation centers.”

At the time that RTA Transit Services considered these changes, the IT team also planned to deploy a new intelligent transit system from Clever Devices that helps manage bus maintenance and provides bus-schedule updates to customers via the Internet and digital signs at stations. In addition to ensuring Clever Devices would run properly, RTA also needed to migrate all of its operational software systems to the new platform.

This included CyberAudit by Videx for security; a PTM Brokerage Services system that interfaces with an SCM Elderbus system for handling transportation services for handicap passengers and requires virtual-private-network connections; and a HASTUS group-scheduling and planning solution from GIRO that helps with bus scheduling and operations.

“Finding a new technology partner with the expertise to help us build a platform that could handle all of these systems was critical since the level of service we received from our previous IT support vendor had reached its limit,” Carney said. “We also wanted to partner with a solutions provider that could work within our budget but still design and deploy an effective solution.”

The Solution: A Virtual Server Data Center Designed by Bryley Systems

RTA Transit Services appointed a committee to search for an IT solutions provider and considered multiple firms. Bryley Systems won the project based on its ability to offer a team with a wide breadth of experience across all the different technologies involved in the project. “Bryley also has the ability to provide remote support and fix problems behind the scenes, which is important for us going forward,” Carney said. “When we submit a request, Bryley assigns an appropriate-level resource with the right expertise to address the issue.”

Bryley first assessed the overall server infrastructure at WRTA and designed a new platform that could run all of the various software applications effectively and scale as needs emerge. Bryley also documented the components that required upgrades and provided a blueprint for how to add computing resources in the future.

“Bryley developed a comprehensive plan and recommended clear steps to advance to where we wanted to be,” Carney said. “They then broke it down for us into components to help us determine what we could reasonably do so within our budget.”

Because of the complexity, the WRTA hired a consultant to assist its internal resources with the project. The consultant’s recommendations confirmed the need to deploy the infrastructure that Bryley recommended. “The consultant’s viewpoint confirmed that Bryley had the expertise we would require over the long term and gave us confidence that the project would be handled effectively,” Carney said.

The Deployment: Project Moves Forward Even When Unplanned Roadblocks Occur

Based on the value of the Bryley assessment and design as well as the consultant’s recommendation, RTA then asked Bryley to deploy the new data center infrastructure. Bryley deployed a VMware-based virtual server environment with a P4500 series storage area network from HP. The design also included five HP DL360 servers running Microsoft Windows Server operating systems, and high-end Cisco firewall equipment. In addition, Bryley created a dual-location disaster recovery solution with completely-redundant systems and full failover capabilities between the WRTA operations and call-center locations.

As part of the project plan, Bryley assembled the virtual server rack and shipped it to Clever Devices in New York where Bryley experts worked side-by-side with the Clever Devices team to configure the servers. Clever Devices then installed their solution on the servers, which were then shipped back to WRTA.

When the rack arrived back at WRTA, it had sustained minor damage during the shipping process, and the ramps that allow the racks to be rolled into place were missing. But Bryley adjusted quickly and was able to move the rack into place without the ramps. Bryley also assessed the damage to help WRTA with the insurance claim.

“Bryley reacts to changes like this very well and can address project-schedule adjustments caused by circumstances outside of their control,” Carney said. “They helped keep the project moving forward and demonstrated solid project management skills in addition to their technical capabilities.”

Bryley also evaluated the connectivity circuits between the operations and call-center sites and established a virtual-private-network connection between the two buildings that can be accessed by key vendors such as Clever Devices and Elderbus. Bryley then updated the system security with a Cisco ASA appliance and set up 10 desktops from which RTA personnel manage the Clever Devices software.

The Benefits: New Infrastructure Platform Enables Improved Customer Service

WRTA now has 21 virtual Windows servers running on five physical servers at its Grove Street location and three physical servers at the Main Street location. The agency also now has a stable platform on which RTA can run the business as well as add on to in order to meet future needs. RTA will also continue to consult with Bryley when working with software vendors to ensure any new solutions are deployed correctly within the new infrastructure

“Bryley helped us greatly in organizing and stabilizing the environment,” Carney said. “They know how to utilize hardware effectively and prepare for the future by designing scalable systems. In addition to adding high-level redundancy, we also eliminated unnecessary hardware so that we have a data center that’s much easier to manage.”

The Clever Devices application, powered by the platform designed by Bryley, allows bus passengers to use smartphones to check on bus schedules. The software also processes next-stop announcements on buses and next-arrival announcements at stops. In addition, the application also counts passengers.

“With the new technology platform empowering Clever Devices, we are greatly enhancing the level of service we offer to our customers,” Carney said. “By using smartphones, the Web or viewing digital signs, passengers can now see the status of any bus at any moment. This not only helps customers avoid missing buses that are ahead of schedule but also eliminates the frustration of arriving too early for a bus that is running late.”

RTA also plans to rely on the Clever Devices solution to replace its radio system with a VoIP solution. The complexity of this project generated a lot of logistical challenges for which Bryley provided its expertise. “We were not sure if we should replace our radio system with a Verizon VoIP system,” Carney said. “But Bryley met with us and Verizon to help us understand how the solution works and confirm VoIP was the way to go.”

The server infrastructure that Bryley designed and deployed is now the backbone that keeps all IT systems running at WRTA. The overall system also helps improve services to disabled people since RTA has backup systems for monitoring customers that might need rides to medical care appointments. RTA can also move the phone system to a new location if it there’s a problem at the main phone center.

“Bryley has turned out to be the perfect IT partner for us,” Carney added. “They first helped us develop a plan for future technology investments that we can consider as our budget allows. They then built an IT infrastructure platform that supports technologies that allow us to improve the services we offer to customers and ensures we have sufficient redundancy in place should any of our systems experience a failure.”

Major Benefits—WRTA Technology Platform Designed and Deployed by Bryley: 

  • Stability: Enables applications that run the business to perform consistently
  • Sustainability: Supports future enhancements as business requirements change
  • Redundancy: If main location goes down, system automatically fails over to backup site
  • Improved Customer Service: Supports applications that enable efficient phone, texting and Web services to provide passengers with immediate access to bus information

 

For more information on how Bryley can assist your organization with IT goals, please contact us at 978.562.6077, or email us at ITExperts@Bryley.com.

Beware! Fake Update Request from Firefox Is a Virus!

By Michelle Denio, Technical Support Supervisor, Bryley Systems

Thanks to a vigilant Bryley Systems client, we can now alert you to a new malware threat.
A Bryley client submitted a service ticket about a Firefox update on his home computer. I was immediately suspicious because the supposed update had come through as a java script file type (.JS), instead of an executable (.exe). Luckily Outlook had blocked the attachment and our client, who was cautious, did exactly what he was supposed to do. He brought it to our attention!

While it appeared to come from Firefox, our research easily determined that this update request is fake and is in fact a virus.

Here are the two links I found on Mozilla:
https://support.mozilla.org/en-US/kb/i-found-fake-firefox-update
https://support.mozilla.org/en-US/questions/1137056

Below is what the fake request looks like. I’ve underlined and circled the source of the update request so you can see that it did not actually come from Firefox. Looking at the source is one of the first steps you should always take when you’re unsure about the validity of an email or a pop-up message. Had our client clicked on the Download, this hacker would have been able to install malware on our client’s computer.

Be Aware! How to Spot Phishing Emails

Phishing emails are malicious emails sent by criminals attempting to compromise your personal information. They often appear to be legitimate. So beware!

Most phishing emails are disguised as messages from an authoritative entity asking you to visit a website and enter personal information. These websites are set up to gather personal details, which they can then use to hack into your accounts and commit fraud. Some links and attachments in these emails contain malicious software, known as malware, which will install itself on your computer. Malware then collects data such as usernames and passwords.

If you recognize these emails, delete them immediately. Even technically savvy individuals can fall prey to such malicious activity. Being able to recognize these emails will lessen your chances of being compromised. Here are a few tips:

  1. Email Address. This is the first thing you should look at. Criminals use two tricks when crafting email addresses. First, they’ll put a real company’s name before the “@“sign to make it look credible. Second, they’ll use a web address similar to the genuine one. Scammers will craft phishing email addresses almost (but not exactly) identical to the real addresses. Check these emails carefully to make sure they are exactly the same as the real web address.
  2. Generic Greetings. Being cautious of emails with generic greetings such as “Dear Valued Customer” or “Dear Valued Employee”. Look for poor spelling, punctuation or grammar. Scammers will go to great lengths to make their phishing emails look authentic. They’ll use an actual company logo and even the names of people who are employed at the company.
  3. Links. If a link appears within the email, hover your cursor over the link to view the underlying address. Check to see where it would take you if you were to click on the link.
  4. Sense of Urgency. Phishing emails may use phrases such as “act quickly” to create a sense of urgency in order to lure their targets in. These scammers may make you feel as if you’re missing out on something. They want to pique your curiosity or exploit your fear to push you into an instant response.
  5. Name. Look to see whose name is at the end of the email. If it’s from a person, is their name in the email address and does the email address appear valid?

These types of emails are just generic emails which are sent out to large groups of people, knowing that it only takes a few people to click to make the effort worthwhile to the scammers.

Spear Phishing. Criminals who target specific individuals use what is called “spear phishing.” Spear Phishing emails are even more sophisticated than your run-of-the-mill phishing emails, often using personal information obtained from social media pages to make the emails appear credible. These cyber criminals might use your name or tailor the email to reflect your hobbies, interests, where you live or events that are happening locally. They may even make the email look as if it came from the organization you work for. People are sometimes targeted because of their position within the company or because they have access to sensitive data.

We all face the grueling task of trying to manage our email. While email is a very convenient mode of communication and most of it is genuine, knowing the signs of phishing emails will prevent you from unleashing a disaster.

When in doubt, don’t click! Contact your IT administrator. And remember, legitimate organizations will never ask you to disclose personal data via email.

For more information, please see “Recommended Practices – Part 4: Email Use” in the November 2014 edition of Bryley Information and Tips (BITs).

Bryley Systems specializes in protecting you from malware. Contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.

Read this case study about a particularly vicious attack that Bryley remediated.

Cybersecurity – How to Avoid Being the Next Headline

Understanding cybersecurity is not simple. When we read about a security breach it’s typically caused by an action, or failed security practice of an employee within an organization. No matter the size of the breach, it’s bad press. Data breaches surface daily and these incidents are growing in frequency, size and cost.

It is often more difficult for smaller organizations to maintain security themselves due to lack of resources or even lack of awareness. Small businesses have increasingly become easy targets. In fact, most cyber-attacks occur at companies with fewer than 100 employees. The best way to prevent such breaches is to become better educated and to follow best practices.

  1. Understand the risks. Having a basic understanding of the most common threats is key; everything from phishing, malware, spoofing, systems hacking, social engineering. It’s all bad, and it’s all a threat.
  2. Have a security policy in place that employees understand. Employees are the gatekeepers of your organizations information, so they should be the first layer of defense. Educate all employees about safe practices. Be sure everyone uses complex passwords and make sure personal and confidential information is not easily exposed. Keeping such documentation under virtual lock and key can go a long way to protect confidential information from getting in the hands of the wrong person.
  3. Keep your anti-virus/anti-spam software or other security applications up-to-date. This will help guard against the latest threats and secure your infrastructure.
  4. Verify! Verifying financial requests and confirming details via phone is more secure than email. This practice should be applied to your vendors, clients, and employees.
  5. Practice an incident response plan. Having employees who know what to do in the event of a security breach is the best protection and preparedness you can have. Hackers are often one step ahead of you, but collective accountability is critical.

Having a baseline understanding of your current environment and vulnerabilities is the first step toward building a wall of defense to reduce risk.

Please see the June 2015 edition of Bryley Information and Tips (BITs) for our IT security cheat-sheet.

For more information about ways to defend your company against a cyber-attack, or to inquire about Bryley’s full array of Managed IT Services, please contact us at 978.562.6077 or by email at ITExperts@Bryley.com. We’re here for you.