Bryley Systems

@bryley
0 Followers
1 Following
74 Posts
IT Services for New England organizations, Since 1987
It takes AI to catch AI, AI in Layers, CMMC changes, fuzzing prompts for better chatbot security, Yale prof on AI evolution, MS's agent plans & more in the new Up Times newsletter at https://bryl.us/k00 #worcesterIT #newenglandtech #ITnewsletter
Cory Doctorow reminds us: better privacy protections are good no matter our politics: less data collected means less risk. Same principle as data governance: keeping only the data your co needs reduces liability ... #privacy #datasecurity https://bryl.us/lkz
The Louvre's crown-jewel thieves went for specific vulnerabilities using tactics found in cybercrime. What're your crown jewels? Client info? IP? Finances? Knowing what matters most is the first part of defense ... [10 m read/audio] https://bryl.us/101 #louvreheist #cybercrime
Download Bryley's report, The Cost of Outsourced IT, available with no obligation. Costs depend on your business size, industry, other factors. This guide can help you have a productive conversation with any provider … https://bryl.link/ozk #outsourcedit #newenglandit
We hear about large breaches. Smaller organizations get attacked too, but their troubles often go unreported. Learn 6 critical ways to make your organization not worth the trouble to cybercriminals. https://bryl.link/gyw #cybersecurity #smallbusiness
Read Up Times by Bryley newsletter November edition – Lessons from the Louvre, The Cost of Outsourced IT report and more New England tech security and network-related info ... https://bryl.link/ifk #newenglandtech #newenglandit
The AI behind M365 Copilot may be changing (OpenAI is working on independence from MS). Monitor your data handling: on whose servers does your data reside? Review your Copilot configuration, see that safeguards are in place ... [5 min] https://bryl.link/ogv #m365 #datagovernance
Meta’s updated User Agreement lets it target ads based on users’ interactions with its AI. The FTC has shown collected data is liberally shared with third parties – far beyond users’ understanding ... [3 min read] https://bryl.link/wj9 #privacy #dataprivacy
The goal is resilience, per MIT Sloan. Cybersecurity works best when an organization has whole company buy-in to evade the criminal activity that ends 60% of smaller businesses ... [7 min read] https://bryl.link/aic #cybersecurity #uptime
Cataloging your networked equipment like connected machinery, sensors and control systems is an important step in cyber-defenses and can help improve incident response for better uptime, per new CISA guidance ... https://bryl.link/lmj [3 min read] #cybersecurity