Most IT consultants and providers want to believe they have disaster recovery and business continuity all figured out. They set up back-ups and assume that no matter how terrible the disaster, they’ll be able to bounce back immediately. However, the cybersecurity veterans at Brainlink International, are urging CFOs and COOs to redefine their concept of […]
Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals
Month: April 2017
Cybercriminals target businesses using sophisticated and convincing email account takeover strategy
Award-winning New York IT security expert from Brainlink warns CEOs, CFOs and COOs about the dangers of email account takeover scams. Manhattan’s Brainlink International is urging business leaders to be aware of the latest trend in cybercrime: email account takeovers. Cybercrime in any form can have devastating implications for businesses, but taking over the email […]
Raj will be presenting at NY State Cybersec
June 8th – Raj will be presenting at NY State Cybersec. Visit Here For Details
FINRA wants to help you keep your financial firm secure.
Financial Industry Regulatory Authority (FINRA) released a checklist last year — based on the National Institute of Standards and Technology’s (NIST) cybersecurity framework, and the SRO’s Report on Cybersecurity Practices — which is made up of five key questions to help your firm analyze its security: Do you store, use or transmit personally identifiable information […]
Everything you need to know about the latest SEC OCIE Guidance Updates
The Security and Exchange Commission has released its first Investment Management Guidance Update in nearly two years, noting that “because funds are varied in their operations, they should tailor their compliance programs based on the nature and scope of their businesses”. A key factor in the update is that specified registrants are now required to use […]
The 5 Keys to an Effective Cyber Attack Response
Imagine this… A staff member returning from a business trip calls you frantically from the airport – they left their company-issued laptop at the hotel, but the hotel staff hasn’t been able to find it. The worst part – that device has access to sensitive company systems and data. WHAT DO YOU DO? IT emergencies […]
NY State Cybersec 2017
See Raj at the 2017 New York State Cyber Security Conference Given the ever-evolving range of cybercrime dangers that threaten businesses like yours every day, it has quickly become evident that cybersecurity can’t be ignored. Where at one time any kind of cybersecurity protection might have been sufficient, only the best is going to be […]
Feedback From Dr. Gerald M. Goldhaber
“The advice that Raj offered in his CNBC interview on the importance of using a two-factor ID system for email is spot-on! I use this strategy regularly and also use it for my iCloud login. Raj is also dead-on when he discusses the national banking system’s callous response to identity theft. If anything, banks more […]
The Comprehensive Strategy Home Computer and Device Security
Given the ever-evolving range of cybercrime dangers that threaten your firm on a daily basis, it has quickly become evident that cybersecurity can’t be ignored. Where at one time any cybersecurity protection might have been sufficient, only the best is going to be effective in the modern digital world. In 2015, law enforcement officials reported […]