I am excited to share this with you that I spoke on a weekly program recently called “Coffee Break With Sabra” about an issue of great importance affecting you and the information that is online about you. During my interview you will learn: About the danger of dating sites (and it’s not what you think) […]
Dating Site Members Beware
Category: Blog
Did Your IT Provider Give You Your Runbook?
A key principle at Brainlink is that we are NOT the owner’s of our client’s information–we are it’s custodian. As a result, we have invested extensive resources in building Client Runbooks. What is a RUNBOOK? It is the operations bible for that client. How we do things. Who the critical vendors are. Known issues, known […]
The Lighter Side
Signs Of Our Times At a Santa Fe gas station: “We will sell gasoline to anyone in a glass container.” In a New York restaurant: “Customers who consider our waitresses uncivil ought to see the manager.” On a Baltimore estate: “Trespassers will be prosecuted to the full extent of the law. — Sisters of Mercy” […]
Protecting You – Is Your Security Snoozing On the Job?
Recently, at the invitation of a partner, we conducted a security audit for a mid-size law firm and frankly, what I saw shocked me. The firm has been paying a well-known IT firm to manage their network and security for years. And yet, The firm had no documentation of backups being tested The IT provider […]
Secret To Brainlink’s Success—PROCESS and SOPs
Raj shared the secrets of his success recently in an interview with Owen McGab Enaohwo, co-founder ofwww.SweetProcess.com. In this Episode You will Discover: How Raj was able to create systems for his business despite the fact that the work his employees do for his clients changes frequently! How Raj overcame communication challenges with his employees […]
Hackers Set Up Live Streaming Website For Over 100 NYC Private Webcams
NEW YORK (PIX11) – A Russian hacking group is suspected of breaking into thousands of surveillance cameras around the world and posting live feeds online. The cameras range from those in private homes to businesses, all tapped without the owners’ approval. A side panel on the Insecam homepage gives a breakdown of where each camera […]
The Lighter Side
December is known around the world as a family time of celebration honoring cultures, religions and tradi-tions that have been with humanity for hundreds of years. See below for a mix of the weird and wonderful facts about this magical month! An almanac prediction states that if snow falls on Christmas Day, Easter will be […]
Protecting You: Is There A Trojan Horse Hiding In Your Business?
Last Wednesday morning, our security system detected that a new hire had downloaded a pirated version of Adobe software. The software came with a “cracker” to use the software for free. The cracker was a trojan horse carrying 15 different banking viruses. By 10 am, I was on the phone with the CFO and the […]
Raj Goel’s Holiday Greetings End-User License Agreement
Going forward, as we surf the edge of chaos and embrace disruptive technologies while relishing the management of paradox and ambiguity in our adaptive enterprises, my intention is to wish you a Merry Christmas and/or Happy Chanukah and/or Happy Kwanzaa. You may not know that Christmas and/or Channukah and/or Kwanzaa are approaching, so I wanted […]
Are You Prepared for the End of Service for Windows Server 2003?
Windows Server 2003 expires on July 14, 2015. Failure to upgrade your operating system dramatically increases any company’s cyber-security risks. With server migrations taking on average 200 days from planning to completion (industry average), if you still have a server running this software active on your network, now is the time to start planning. End […]