Up Times
Up Times • March 2025
You are here: Home / Resources / Newsletter, Subscribe to Up Times by Bryley / Up Times • March 2025
Up Times · February 2022
Most start out working on their own, but business growth often means looking to the expertise and support of others.
With respect for the kitchen table – In order to grow a business, as projects become more complex and challenging, bringing weightier responsibilities, comes the desire for support and collaboration. Sometimes this comes in the form of wanting a team with a variety of perspectives to bounce things off of, so you can make better decisions: it’s your own band of professional confidantes.
Since 1987 Bryley has fulfilled that role in IT support for many New England businesses. Why? It’s expected Bryley should know technology. But Bryley sees itself accompanying organizations through increasingly complex technology possibilities, so that the tech may promote your growth and not be a hindrance.
In this spirit, recently we introduced deeper-dive, educationally-aimed Special Reports. These are designed to empower your team with the knowledge to face technology-based challenges and make informed decisions.
It was Timothee Chalamet’s depiction that brought the following to light: for years it was thought of as a scandal when Bob Dylan went electric at Newport. He was thought to be throwing off the folk music label and constraints – an act of rebellion against expectations. But Newport – it now looks – was likely more about Dylan being tired of his own aloneness. He was the focal point. All the pressure was on him.
Bob Dylan wanted to look around and have bandmates – people he connected with – to help shoulder the performance. And then of course, the more skilled players, the bigger and more diverse sound possible.
You, too, don’t have to go it alone. Bryley may be the right fit to support the IT needs of your organization. So reach out to learn how Bryley might be a good band-member in helping your organization fulfill its unfolding mission.

With Cybersecurity Certification, Director of Client Services Tom Barnes has become better prepared to support clients’ security needs.
Tom Barnes Achieves Cybersecurity Certification
A Better Advocate for Client Security
In his role as Director of Client Services, Tom Barnes had been helping clients navigate CMMC and other compliance regulations. To bolster Bryley’s compliance expertise, COO Anna Darlagiannis-Livingstone supported Tom in strengthening his knowledge of the security protocols that underlie CMMC and other standards.
And so, after his studying and testing, Bryley is excited to announce that Tom Barnes has become Certified in Cybersecurity through ISC2 … [5 min. read] Continue Reading >

Compared to going directly, it’s easier for cyber-attackers to go through a small business to get at a larger mark. Does your organization represent access to a larger target?
How a Small Business Becomes a Liability
A plastics supplier sells parts to a major appliance manufacturer. The small business, focused on production, meeting deadlines and tight budgets, hasn’t prioritized cybersecurity. The small business relies on outdated equipment and software, has weak or default passwords on machinery and networked devices, and lacks properly configured firewalls. Employees are allowed to use personal devices on the company network. There is no formal security training program. These qualify the small business as a springboard for a cybercriminal operation seeking access to the larger, more moneyed appliance manufacture … [5 min. read] Continue Reading >

Why give away more info than is necessary? This tool can be used with a chatbot or on message boards if you want to ask a question.
Anonymizer: We don’t log data
As it says on the site: With this online tool, you can protect secret information by redacting certain patterns or phrases of the given text. Several popular use cases of this tool include concealing personal information such as names and surnames, addresses, and phone numbers, as well as blacking out other confidential data that you don’t want others to see …
All conversions and calculations are done in your browser using JavaScript. We don’t send a single bit about your input data to our servers. There is no server-side processing at all … [2 min. read; free version available] onlinetexttools.com

Who owns the resources that AI’s process? Who should decide if these resources become weaponized?
US and UK governments withdraw from committing to regulating AI
Last year both nations signed the Seoul Declaration for the safe use of AI.
But with the White House resident change, US (and UK) policy has changed about trying to put controls on AI. These LLMs (like OpenAI’s ChatGPT, Google’s Gemini and Elon Musk’s Grok) are powerful tools.
Do you think it’s right to put their potential in the hands of tech titans, when the tech was built on devouring what you and I and millions of others have posted on the internet? A few months ago Microsoft detailed its concerns about the anticipated misuse of AI. Last month Google dropped its policy that its AI could not be used for weapons development … [6 min. read] computerweekly.com

We can get to Worcester, Boston, Cambridge or Allston, but that doesn’t mean we’re actually free to explore. We go where the infrastructure directs.
Choice ain’t freedom
The vast choices presented to us by technology feel like they ought to be freeing. But are they? Historian Dr Sophia Rosenfeld lays out the paradox between the appearance of abundance and the limitations of plenty.
Think of … trying to buy a mundane household item on amazon.com, Rosenfeld offers, … making selections in such circumstances has never felt to me like a pleasant form of freedom or even freedom at all. And it turned out there is a whole literature by psychologists and other social scientists about how bad we actually are at picking according to our desires, how stressed the whole business makes us, and even how it produces pernicious and largely unacknowledged social effects, such as failures to think about the collective good … [4 min. read] linkedin.com

XDR (Extended Detection and Response) is a defensive AI that observes your organization’s network activity and can contain and, if needed, escalate unusual activity to the attention of 24x7x365 security personnel.
Manufacturer protected from the severity of a ransomware attack by layered security
Bryley partner Barracuda reported that they successfully blocked an unusual attack vector: a manufacturer no longer had a relationship with a vendor, but did not remove the inactive account and/or access. The so-called ghost account was compromised. Barracuda says that access might have been cut off by turning on multifactor authentication. But that was not deployed on the account and the manufacturer apparently had an unpatched vulnerability in its firewall that the criminals exploited.
But XDR (Extended Detection and Response) observed and flagged unusual behavior that was contained by the threat hunters at the SOC (Security Operations Center).
The story goes to show the value of multi-layered security approach and of the tools and people that actually finally stopped the spread of ransomware: XDR and the SOC analysts … [8 min. read] barracuda.com

Shipping out of Boston: a ransomware scare
Down by the banks of the river Charles
Boston’s well-known muggers and thieves have come up with a new wrinkle on ransomware-related attacks – through the USPS.
“Time Sensitive Read Immediately,” the envelopes say. Letters had been mailed to business managers and the contents – for believability – are usually customized to show a breached email/password combination and allege that the recipient’s organization fell victim to a cyberattack in which thousands of sensitive data files were stolen.
The FBI reports that the mailpiece is lying and just hoping to scare the businesspeople into sending money … [5 min. read] securityweek.com
Note: The section directly above is Bryley’s curated list of external stories. Bryley does not take credit for the content of these stories, nor does it endorse or imply an affiliation with the authors or publications in which they appear.
Get Up Times, useful tech news by New Englanders in Your In-Box
- Subscribe to Up Times, the monthly New England-centric technology newsletter.
- Up Times covers:
-
- Trends in New England tech
- Security tips you can implement now
- Updates on regional and national laws and compliancies
- IT-related developments
- Networking and cybersecurity challenges New England business managers are facing
- In continuous publication since 2000, Up Times arrives monthly in your email box.
Sign up for Up Times to have tech news and tips delivered monthly via email
DON’T SETTLE FOR LESS
Get More from Your IT Partner
Call our business managed IT services department directly at (978) 547-7221 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
What Happens Next?
Fill in our quick form. We’ll schedule an introductory phone call. We’ll take the time to listen and plan the next steps.

Central MA Office
200 Union Street Clinton, MA 01510

Existing Customers

Sales Inquiries

© Copyright 2025 BRYLEY. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy | Accessibility Statement
Bryley CSP Basic and Pro for Network Infrastructure
Features Comparison Chart
Per-device features |
Basic |
Pro* |
Response to network-critical issues |
Within four hours. |
Within four hours. |
Response to non-critical issues |
Within eight hours. |
Within eight hours. |
Performance optimization |
Included |
Included |
Security optimization |
Included |
Included |
Monitoring and alerts |
Included |
Included |
File and patch updates |
Included |
Included |
Reporting |
Included |
Included |
Administration |
Included |
Included |
Reliability optimization |
Partial |
Included |
Software issues |
Partial |
Included |
Hardware issues |
Partial |
Included |
Network issues |
Partial |
Included |
PC imaging |
Included |
|
On-site response |
Included |
- CSP User, our highest-level offering, covers the User’s tech issues, as well as their specified-for-coverage devices capable of running Bryley’s secure monitoring and security software (most Windows and Mac endpoints are eligible).