Class-action suit shows privacy settings changed without Gmail user awareness. "Privacy advocates call [the opt-out settings] a dark pattern that violates meaningful consent principles," per techrepublic https://bryl.us/yg6q #privacy
IT Services for New England organizations, Since 1987
Class-action suit shows privacy settings changed without Gmail user awareness. "Privacy advocates call [the opt-out settings] a dark pattern that violates meaningful consent principles," per techrepublic https://bryl.us/yg6q #privacy
2025 in review: why we went big on AI defenses (you should, too), fastest-growth Mass cos, 11th MSP-501, Dr Julia Shaw advises 'be annoying,' AI-investor John Kim preaching at Harvard https://bryl.us/5ka7 #newenglandtech #newenglandit #worcesterit
The power of layers for business survival, automation = ROI?, 2025 highlights, UConn AI Symposium, up-time mindset & more in the new Up Times newsletter: https://bryl.us/cs5n #worcesterIT #newenglandtech #ITnewsletter
New Windows 11 AI agents speed up file searches. Microsoft's security docs warn of prompt injection risks that can expose data. Deploy with restricted access ... [10 min. read] https://bryl.us/kyyf #DataSecurity #SmallBusiness
Data theft can go unnoticed for months. Learn how criminals try and steal your files and what steps protect your business – encryption, access controls, monitoring tools ... [7 min read] https://bryl.us/eap4 #DataSecurity #CyberProtection
AI agents sound confident, making it easy to stop thinking critically. Like ELIZA's 1960s chatbot that fooled people with pattern-matching, today's AI doesn't truly understand. Yale prof explains ... [30 min] https://bryl.us/f7vp #ArtificialIntelligence #SmallBusiness
Clicked a suspect link? Follow your IT team's protocol first. General steps: exit browser fast, change passwords fast, contact bank if you shared financial info, disconnect from internet if you downloaded anything ... [5 min read] https://bryl.us/l02o #CyberSecurity #SmallBusiness
A browser's AI assistant can be tricked by invisible instructions on a webpage. An MIT-trained researcher uses fuzzing – a method to test many prompt variations – to find these security gaps ... [45 min; 4 min abstract] https://bryl.us/jahu #CyberSecurity #ArtificialIntelligence
AI lets attackers produce thousands of malware variants fast, designed to evade detection. But AI in cyber-defenses can recognize malware behaviors these variants share and so is not easily fooled by superficial file changes. https://bryl.us/jf73 #InfoSec #ThreatIntelligence
CMMC Phase One has begun (Nov 10), so military contracting officers may now include the requirement for compliance with CMMC Levels 1 and 2 in new contracts... [8-minute read/listen] https://bryl.us/rygr #CMMC #DefenseContracting
It takes AI to catch AI, AI in Layers, CMMC changes, fuzzing prompts for better chatbot security, Yale prof on AI evolution, MS's agent plans & more in the new Up Times newsletter at https://bryl.us/k00 #worcesterIT #newenglandtech #ITnewsletter
Cory Doctorow reminds us: better privacy protections are good no matter our politics: less data collected means less risk. Same principle as data governance: keeping only the data your co needs reduces liability ... #privacy #datasecurity https://bryl.us/lkz
The Louvre's crown-jewel thieves went for specific vulnerabilities using tactics found in cybercrime. What're your crown jewels? Client info? IP? Finances? Knowing what matters most is the first part of defense ... [10 m read/audio] https://bryl.us/101 #louvreheist #cybercrime
Download Bryley's report, The Cost of Outsourced IT, available with no obligation. Costs depend on your business size, industry, other factors. This guide can help you have a productive conversation with any provider … https://bryl.link/ozk #outsourcedit #newenglandit
We hear about large breaches. Smaller organizations get attacked too, but their troubles often go unreported. Learn 6 critical ways to make your organization not worth the trouble to cybercriminals. https://bryl.link/gyw #cybersecurity #smallbusiness
Read Up Times by Bryley newsletter November edition – Lessons from the Louvre, The Cost of Outsourced IT report and more New England tech security and network-related info ... https://bryl.link/ifk #newenglandtech #newenglandit
The AI behind M365 Copilot may be changing (OpenAI is working on independence from MS). Monitor your data handling: on whose servers does your data reside? Review your Copilot configuration, see that safeguards are in place ... [5 min] https://bryl.link/ogv #m365 #datagovernance
Meta’s updated User Agreement lets it target ads based on users’ interactions with its AI. The FTC has shown collected data is liberally shared with third parties – far beyond users’ understanding ... [3 min read] https://bryl.link/wj9 #privacy #dataprivacy
The goal is resilience, per MIT Sloan. Cybersecurity works best when an organization has whole company buy-in to evade the criminal activity that ends 60% of smaller businesses ... [7 min read] https://bryl.link/aic #cybersecurity #uptime
Cataloging your networked equipment like connected machinery, sensors and control systems is an important step in cyber-defenses and can help improve incident response for better uptime, per new CISA guidance ... https://bryl.link/lmj [3 min read] #cybersecurity