Up Times
Up Times · February 2022
In a choir you’re taught to listen to your neighbor so you all stay in sync. At the same time you have your own part, sometimes specific to your voice alone, that you must bring. Isn’t that like any collaborative work we do?
Harmony – When Paul McCartney released We All Stand Together (aka The Frog Chorus) in 1984, critics dismissed it as uncool. Maybe so, but he had a point. Like it or not, we’re all connected.
Unfortunately it’s easiest to see how interconnected the world is when things go wrong. Researcher Jonathan Lusthaus has tracked one of these chains: Russia invaded Ukraine, leading to Western economic sanctions, leading to highly educated but underemployed Russian tech professionals – protected by the state – turning to ransomware attacks on U.S. businesses.
But being connected is not only a source of risk. We do it because it lets organizations support and empower their employees, their partners and their communities.
Bryley Systems was founded on that idea. Before the web even existed, Gavin Livingstone recognized the power of connected technology to help people collaborate, share ideas and fulfill their potential. Organizations that prioritize collaboration recognize this, too. They understand they are part of a network of relationships, expertise and unexpected synergies (these have historically been the foundation for much innovation and sustained growth).
Being in this together is not just Paul-McCartneyesque comfort – it’s where opportunities begin.
Reach out and let’s talk about how Bryley can help your organization succeed through secure, computer-enabled connections.

COO Anna Darlagiannis-Livingstone
To Strengthen Operations Anna Darlagiannis-Livingstone Named Chief Operating Officer
Anna Darlagiannis-Livingstone’s role has evolved from Vice President of Client Services to Chief Operating Officer. This title change reflects Anna’s focus on keeping day-to-day operations on track and making sure teams have the tools and support they need. By improving processes, supporting staff and streamlining workflows, Anna will help create a more efficient and well-functioning environment so Bryley can stay focused on serving clients.
Having spent the past nine years helping shape Bryley Client Services, Anna brings a deep understanding of client needs and how to collaborate with the tech team to address them. Her experience as the link between clients and the tech team positions her well to guide the company’s operational strategy moving forward … [6 min. read] Continue Reading >

A person in the appropriate clothes lowers our defenses, so we think we understand who they are and their intentions. This is what’s happening with Business Email Compromise – targeted emails trick employees into trusting cybercriminals.
Why you should care about Business Email Compromise
… within a week of my business partner and me taking over the retail space, we were visited by a firefighter in a firefighting suit who said that because the business had changed hands he needed to inspect the location for safety violations. He walked around and pointed out problems with extension cords, wiring, circuits, fixtures and junction boxes and left us with a notice saying that if we did not have his substantial violations corrected within 30-days the doors would be padlocked. We panicked.
But it turns out the firefighter’s uniform, a sign of trust, had been exploited to intimidate us. This mirrors what happens with Business Email Compromise (BEC). Like the firefighter used a symbol of trust to gain access, BEC attackers use trusted email communication to infiltrate your organization and steal funds … [6 min. read] Continue Reading >

Like Brownies from Camelot
We here at Bryley are so grateful for the delicious brownies, Kate Ussailis and Camelot Energy brought us.
A lot of Bryley work involves looking at computer screens. So, imagine what a nice surprise it was to have a ring at our bell and find Kate with baked goods – personally delivered here in thanks to the crew that supports Camelot with IT services … [2 min. read] Continue Reading >

Among DeepSeek’s issues, it can be jailbroken easily (compared to other LLMs [e.g. ChatGPT]) – it lacks guardrails that might hinder someone from using it to generate new malware, cyberweapons (like Advanced Persistent Threats) and more.
Boston’s Enkrypt AI released a report about the Chinese DeepSeek-R1 AI chatbot and, maybe not too surprisingly, found the software lacking in security.
Our findings reveal that DeepSeek-R1’s security vulnerabilities could be turned into a dangerous tool – one that cyber criminals, disinformation networks and even those with biochemical warfare ambitions could exploit, [Sahil Agarwal Enkrypt AI’s CEO] said. These risks demand immediate attention … [6 min. read] computerweekly.com

Throughout my own university education, I didn’t have a single lecture on it … given that cybercrime is the single most common form of crime, this omission is unacceptable, Dr Julia Shaw
Dehuman
Psychological scientist Dr Julia Shaw begins to illuminate the differences between real-life crime and cyber crime: [To deter crime, you need to have] capable guardians … in cyberspace, authority is minimal and there is a perception that nobody is in charge. Because nobody is.
Cybercrime is [also] made easier because we can more readily dehumanise people online, Shaw explains, And when we stop seeing people as human beings, we may feel free to do more terrible things to them. To be online is to experience a disembodiment of ideas. The internet frees us from our physical selves, for better or for worse. And this leads to a flat experience, leaving behind the normal multi-sensory interaction we have with people in real life that reminds us that they are fleshy, vulnerable and sensitive … [9 min. read] wired.com

And the sheep will scatter
Bryley partner Huntress has released its 2025 Cyber Threat Report.
As far as Bryley clients are concerned, probably the most salient change observed by the threat-hunting organization comes in the wake of the FBI’s 2023 disruption of Qakbot ransomware. The group behind the main ransomware delivery mechanism was dismantled through US law enforcement efforts. But the net result has not been a long-term drop in ransomware attacks, but a number of newly created variants designed to evade detection.
Because of this Bryley advocates an Endpoint Detection and Response (EDR) security layer that complements traditional anti-malware by monitoring for suspicious activity on desktops and laptops, enabling automatic shutdown and removal of attackers … [1 hr. read] huntress.com

Dr Anna Lembke:I think people are unhappier than they’d like to be, and can’t figure out why.
Using
Psychiatrist Anna Lembke is an addiction specialist. For years she treated drug and alcohol addiction and then witnessed similar symptoms in the patterns people displayed in their tech use.
Essentially what’s happened is we’re spending more and more of our energy and creativity investing in this online world, which means that we are actually leaching our real-life existence of our energy and creativity. So when we try to re-enter the real world, it actually is more boring, because there’s less going on, because there’s nobody there … [18 min. read] nytimes.com [paywall]

Andrea Davis tells parents to teach kids: you have a choice … [you] don’t have to adopt every new technology that comes along
Andrea Davis of Better Screen Time is an advocate for raising kids to have a healthy relationship to technology as much as possible. In this AI-focused Facebook Reel, Davis advises that parents take responsibility to guide children to interact wisely with AI.
Though AI is presented in a friendly way, Davis says, its content is other people’s work and you need to do your own work. Also that AI makes mistakes and tells untruths, so you need to be critical of how it answers.
Davis says to encourage children to be suspicious of images online because of the presence of deepfakes. And re images, kids need to be taught the ethics of image sharing and the harm they can cause others.
Last, Davis makes clear that AI is a tool, not a friend. Though it is good at mimicking human relationships, it is no substitute. (I originally learned about Davis in the Wall Street Journal) [2 min. watch] facebook.com
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, useful tech news by New Englanders in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
-
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
Fill in our quick form. We’ll schedule an introductory phone call. We’ll take the time to listen and plan the next steps.

Central MA Office
200 Union Street Clinton, MA 01510

Existing Customers

Sales Inquiries

© Copyright 2025 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy | Accessibility Statement
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features |
Basic |
Pro* |
Response to network-critical issues |
Within four hours. |
Within four hours. |
Response to non-critical issues |
Within eight hours. |
Within eight hours. |
Performance optimization |
Included |
Included |
Security optimization |
Included |
Included |
Monitoring and alerts |
Included |
Included |
File and patch updates |
Included |
Included |
Reporting |
Included |
Included |
Administration |
Included |
Included |
Reliability optimization |
Partial |
Included |
Software issues |
Partial |
Included |
Hardware issues |
Partial |
Included |
Network issues |
Partial |
Included |
PC imaging |
Included |
|
On-site response |
Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).