Blog

image2-300x150

Jimmy Kimmel and Social Engineering

This video is an EXCELLENT example of social engineering – and this is the stuff we (or our colleagues) fall for. It is a good thing to add to the SECURITY AWARENESS training. Click on the following link: https://www.youtube.com/watch?v=opRMrEfAIiI

image1-300x171

Lessons Learned from CENTCOM, Crayola and ISIS Hackers

A few weeks ago, pro-ISIS hackers broke into the YouTube and Twitter accounts for US CENTCOM and sent embarrassing tweets and videos. During the same weekend, another group of criminals hijacked the Crayola Facebook account and sent lewd/adult photos to embarrass Crayola. You can watch my interview with WPIX11 here https://www.brainlink.com/pro-isis-hackers-take-control-us-central-command-twitter-account/ So what lessons you […]

BRAINLINK-2015-FEB-BrainSTORM_COLOR_3d

The Lighter Side

Monkey in a bar A man walks into a bar and orders a beer. He takes a sip and sets it down. While he is looking around, a monkey swings down and steals the beer. He asks the barman, “who owns the monkey?” The barman says it’s the piano player. The man walks over to […]

2015-01-28-09-50-42

Protecting You: Disco, 8-Track, and Tape Backups

A construction firm asked me to test their backup system because they were unable to restore critical files after a cryptowall breakout and their IT provider had stopped returning their call. Here’s what I found: The firm had been paying for backups for the past 5 years. The backup software was 5 years old. The […]

BRAINLINK-2015-FEB-BrainSTORM_COLOR_1d

Dating Site Members Beware

I am excited to share this with you that I spoke on a weekly program recently called “Coffee Break With Sabra” about an issue of great importance affecting you and the information that is online about you. During my interview you will learn: About the danger of dating sites (and it’s not what you think) […]

sop

Did Your IT Provider Give You Your Runbook?

A key principle at Brainlink is that we are NOT the owner’s of our client’s information–we are it’s custodian. As a result, we have invested extensive resources in building Client Runbooks. What is a RUNBOOK? It is the operations bible for that client. How we do things. Who the critical vendors are. Known issues, known […]

lightersidejan2015

The Lighter Side

Signs Of Our Times At a Santa Fe gas station: “We will sell gasoline to anyone in a glass container.” In a New York restaurant: “Customers who consider our waitresses uncivil ought to see the manager.” On a Baltimore estate: “Trespassers will be prosecuted to the full extent of the law. — Sisters of Mercy” […]

snooze-300x231

Protecting You – Is Your Security Snoozing On the Job?

Recently, at the invitation of a partner, we conducted a security audit for a mid-size law firm and frankly, what I saw shocked me. The firm has been paying a well-known IT firm to manage their network and security for years. And yet, The firm had no documentation of backups being tested The IT provider […]

book

Secret To Brainlink’s Success—PROCESS and SOPs

Raj shared the secrets of his success recently in an interview with Owen McGab Enaohwo, co-founder ofwww.SweetProcess.com. In this Episode You will Discover: How Raj was able to create systems for his business despite the fact that the work his employees do for his clients changes frequently! How Raj overcame communication challenges with his employees […]

securityscreen

Hackers Set Up Live Streaming Website For Over 100 NYC Private Webcams

NEW YORK (PIX11) – A Russian hacking group is suspected of breaking into thousands of surveillance cameras around the world and posting live feeds online. The cameras range from those in private homes to businesses, all tapped without the owners’ approval. A side panel on the Insecam homepage gives a breakdown of where each camera […]