Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals

Month: April 2017

Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals

Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals Business Continuity in NYC

Most IT consultants and providers want to believe they have disaster recovery and business continuity all figured out. They set up back-ups and assume that no matter how terrible the disaster, they’ll be able to bounce back immediately. However, the cybersecurity veterans at Brainlink International, are urging CFOs and COOs to redefine their concept of […]

Cybercriminals target businesses using sophisticated and convincing email account takeover strategy

Award-winning New York IT security expert from Brainlink warns CEOs, CFOs and COOs about the dangers of email account takeover scams. Manhattan’s Brainlink International is urging business leaders to be aware of the latest trend in cybercrime: email account takeovers. Cybercrime in any form can have devastating implications for businesses, but taking over the email […]

FINRA wants to help you keep your financial firm secure.

FINRA wants to help you keep your financial firm secure. Securities Commission

Financial Industry Regulatory Authority (FINRA) released a checklist last year — based on the National Institute of Standards and Technology’s (NIST) cybersecurity framework, and the SRO’s Report on Cybersecurity Practices — which is made up of five key questions to help your firm analyze its security: Do you store, use or transmit personally identifiable information […]

Everything you need to know about the latest SEC OCIE Guidance Updates

The Security and Exchange Commission has released its first Investment Management Guidance Update in nearly two years, noting that “because funds are varied in their operations, they should tailor their compliance programs based on the nature and scope of their businesses”. A key factor in the update is that specified registrants are now required to use […]

The 5 Keys to an Effective Cyber Attack Response

The 5 Keys to an Effective Cyber Attack Response Cyber Attack Response

Imagine this… A staff member returning from a business trip calls you frantically from the airport – they left their company-issued laptop at the hotel, but the hotel staff hasn’t been able to find it. The worst part – that device has access to sensitive company systems and data. WHAT DO YOU DO? IT emergencies […]

NY State Cybersec 2017

See Raj at the 2017 New York State Cyber Security Conference Given the ever-evolving range of cybercrime dangers that threaten businesses like yours every day, it has quickly become evident that cybersecurity can’t be ignored. Where at one time any kind of cybersecurity protection might have been sufficient, only the best is going to be […]

Feedback From Dr. Gerald M. Goldhaber

Feedback From Dr. Gerald M. Goldhaber Dr. Gerald M. Goldhaber

“The advice that Raj offered in his CNBC interview on the importance of using a two-factor ID system for email is spot-on! I use this strategy regularly and also use it for my iCloud login. Raj is also dead-on when he discusses the national banking system’s callous response to identity theft.  If anything, banks more […]

The Comprehensive Strategy Home Computer and Device Security

The Comprehensive Strategy Home Computer and Device Security Home Security

Given the ever-evolving range of cybercrime dangers that threaten your firm on a daily basis, it has quickly become evident that cybersecurity can’t be ignored. Where at one time any cybersecurity protection might have been sufficient, only the best is going to be effective in the modern digital world. In 2015, law enforcement officials reported […]