Are you violating The SEC’s Recently Proposed Anti-Fraud Rule?

Month: May 2018

Are you violating The SEC’s Recently Proposed Anti-Fraud Rule?

Are you violating The SEC’s Recently Proposed Anti-Fraud Rule?

Disruptions to your business come in a range of shapes and sizes. Whether it’s an unprecedented onsite emergency or an unusually delayed response from a key vendor or business contact, both can throw off your business’ continuity. Without thorough and effective business continuity planning, a disruption of any size can affect your business’ productivity, bottom […]

Do You Know What’s Going On In Your Network?

Do You Know What’s Going On In Your Network?

Making the right decisions for your business depends entirely on what information you have available to you at any given time. If you don’t really know what’s happening in your business, how well it’s performing, and where it may be failing, how can you effectively lead it? This is especially true of your business technology. […]

What is Managed Security And Why Do You Need it ?

What is managed security? A lot of companies, thought leaders and vendors are talking about MANAGED SECURITY and MANAGED SECURITY SERVICES PROVIDERs (MSSPs) – but what are they? Simply put, MSSPs keep an eye on your security systems (firewalls, routers, log collectors, SIEMs, Antivirus and Antimalware dashboards) and either alert your in-house team to take […]

Learn to Spot Email Spoofing, or Face the FTC

Forget about ransomware and trojans – have you heard about email spoofing yet? Email spoofing is a method in which the cybercriminal makes an email appear as though it was sent from somewhere it wasn’t, such as a client’s, vendor’s, or even superior’s email address. For example: A hacker sends a spoofed email to the […]

Top Techniques to Secure Firm-Wide Buy-In for Cyber Security & Compliance

David Edwards, President, Heron Wealth started the discussion by sharing his journey. David started his career in systems at Morgan Stanley, so he knew how to use and manage IT well. Two years ago, he realized that he could no longer manage the IT and compliance issues for his firm by himself, so he engaged […]

Providing Unnamed Hedgefund with Effective Service with High ROI

When an Unnamed Hedgefund required support to cope with their extensive IT demands, they chose Brainlink International. Brainlink provided an intensive and honest assessment of their systems and as a result, delivered vastly effective and beneficial solutions.   Brainlink delivered vastly effective beneficial solutions to Unnamed Hedgefund. It is imperative that their IT systems are […]

Written Information Security Plan (WISP) Service & Audits

Written Information Security Plan (WISP) Service & Audits

Why you need to consider a WISP   The Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) has listed cybersecurity as a key focus area in its 2015 risk-based assessments. The addition of cybersecurity as a 2015 OCIE priority comes on the heels of the April 2014 release of sample cybersecurity […]

Cybersecurity is the Biggest Risk Facing the Financial System

Inadequate security technology and a pervasive culture of trust have left the worldwide financial industry open to a non-stop stream of cyber-attacks. The good news is that you don’t have to handle all of this alone; Brainlink can help. SWIFT bank attacks show the world how vulnerable the financial system really is; will you learn […]

Does your construction firm have a cybersecurity expert on speed dial?

The Federal Trade Commission (FTC) plays an undeniably important role in the modern cybersecurity landscape. Each decision the FTC makes helps to redefine the status quo of the nation’s security and privacy culture, which is why it’s so important to pay attention! Whereas many IT and cybersecurity professionals are only just now beginning to follow […]


HOW FAST COULD YOUR COMPANY BE BACK UP WORKING ? You hear it all the time from “back up your data”, keep your virus protection current, and install and maintain a firewall to protect yourself from hackers and other online threats. However, while these precautions will certainly help you avoid problems, they CAN’T do anything […]