Bryley Systems

IT Services for New England organizations, Since 1987

Bryley Systemsbryley
2026-02-09

Class-action suit shows privacy settings changed without Gmail user awareness. "Privacy advocates call [the opt-out settings] a dark pattern that violates meaningful consent principles," per techrepublic bryl.us/yg6q

Bryley Systemsbryley
2026-01-30

2025 in review: why we went big on AI defenses (you should, too), fastest-growth Mass cos, 11th MSP-501, Dr Julia Shaw advises 'be annoying,' AI-investor John Kim preaching at Harvard bryl.us/5ka7

Bryley Systemsbryley
2026-01-29

The power of layers for business survival, automation = ROI?, 2025 highlights, UConn AI Symposium, up-time mindset & more in the new Up Times newsletter: bryl.us/cs5n

Bryley Systemsbryley
2026-01-12

New Windows 11 AI agents speed up file searches. Microsoft's security docs warn of prompt injection risks that can expose data. Deploy with restricted access ... [10 min. read] bryl.us/kyyf

Bryley Systemsbryley
2026-01-09

Data theft can go unnoticed for months. Learn how criminals try and steal your files and what steps protect your business – encryption, access controls, monitoring tools ... [7 min read] bryl.us/eap4

Bryley Systemsbryley
2026-01-07

AI agents sound confident, making it easy to stop thinking critically. Like ELIZA's 1960s chatbot that fooled people with pattern-matching, today's AI doesn't truly understand. Yale prof explains ... [30 min] bryl.us/f7vp

Bryley Systemsbryley
2026-01-05

Clicked a suspect link? Follow your IT team's protocol first. General steps: exit browser fast, change passwords fast, contact bank if you shared financial info, disconnect from internet if you downloaded anything ... [5 min read] bryl.us/l02o

Bryley Systemsbryley
2026-01-02

A browser's AI assistant can be tricked by invisible instructions on a webpage. An MIT-trained researcher uses fuzzing – a method to test many prompt variations – to find these security gaps ... [45 min; 4 min abstract] bryl.us/jahu

Bryley Systemsbryley
2025-12-31

AI lets attackers produce thousands of malware variants fast, designed to evade detection. But AI in cyber-defenses can recognize malware behaviors these variants share and so is not easily fooled by superficial file changes. bryl.us/jf73

Bryley Systemsbryley
2025-12-29

CMMC Phase One has begun (Nov 10), so military contracting officers may now include the requirement for compliance with CMMC Levels 1 and 2 in new contracts... [8-minute read/listen] bryl.us/rygr

Bryley Systemsbryley
2025-12-23

It takes AI to catch AI, AI in Layers, CMMC changes, fuzzing prompts for better chatbot security, Yale prof on AI evolution, MS's agent plans & more in the new Up Times newsletter at bryl.us/k00

Bryley Systemsbryley
2025-12-22

Cory Doctorow reminds us: better privacy protections are good no matter our politics: less data collected means less risk. Same principle as data governance: keeping only the data your co needs reduces liability ... bryl.us/lkz

Bryley Systemsbryley
2025-12-05

The Louvre's crown-jewel thieves went for specific vulnerabilities using tactics found in cybercrime. What're your crown jewels? Client info? IP? Finances? Knowing what matters most is the first part of defense ... [10 m read/audio] bryl.us/101

Bryley Systemsbryley
2025-12-02

Download Bryley's report, The Cost of Outsourced IT, available with no obligation. Costs depend on your business size, industry, other factors. This guide can help you have a productive conversation with any provider … bryl.link/ozk

Bryley Systemsbryley
2025-11-26

We hear about large breaches. Smaller organizations get attacked too, but their troubles often go unreported. Learn 6 critical ways to make your organization not worth the trouble to cybercriminals. bryl.link/gyw

Bryley Systemsbryley
2025-11-21

Read Up Times by Bryley newsletter November edition – Lessons from the Louvre, The Cost of Outsourced IT report and more New England tech security and network-related info ... bryl.link/ifk

Bryley Systemsbryley
2025-11-20

The AI behind M365 Copilot may be changing (OpenAI is working on independence from MS). Monitor your data handling: on whose servers does your data reside? Review your Copilot configuration, see that safeguards are in place ... [5 min] bryl.link/ogv

Bryley Systemsbryley
2025-11-18

Meta’s updated User Agreement lets it target ads based on users’ interactions with its AI. The FTC has shown collected data is liberally shared with third parties – far beyond users’ understanding ... [3 min read] bryl.link/wj9

Bryley Systemsbryley
2025-11-14

The goal is resilience, per MIT Sloan. Cybersecurity works best when an organization has whole company buy-in to evade the criminal activity that ends 60% of smaller businesses ... [7 min read] bryl.link/aic

Bryley Systemsbryley
2025-11-12

Cataloging your networked equipment like connected machinery, sensors and control systems is an important step in cyber-defenses and can help improve incident response for better uptime, per new CISA guidance ... bryl.link/lmj [3 min read]

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst