Brainlink founder Raj Goel appeared on the Evolved Radio podcast to talk about his Standard Operating Procedure (SOP) Culture. Hosted by Todd Kane, the podcast features interviews with successful members of the business community to share best practices, insight, and strategy. Todd invited Raj on the show to talk through his development and implementation of […]
Brainlink’s Raj Goel talks SOPCULTURE on Evolved Radio
Category: Blog
Brainlink International Redefines Disaster Recovery and Business Continuity for Professionals
Most IT consultants and providers want to believe they have disaster recovery and business continuity all figured out. They set up back-ups and assume that no matter how terrible the disaster, they’ll be able to bounce back immediately. However, the cybersecurity veterans at Brainlink International, are urging CFOs and COOs to redefine their concept of […]
Cybercriminals target businesses using sophisticated and convincing email account takeover strategy
Award-winning New York IT security expert from Brainlink warns CEOs, CFOs and COOs about the dangers of email account takeover scams. Manhattan’s Brainlink International is urging business leaders to be aware of the latest trend in cybercrime: email account takeovers. Cybercrime in any form can have devastating implications for businesses, but taking over the email […]
FINRA wants to help you keep your financial firm secure.
Financial Industry Regulatory Authority (FINRA) released a checklist last year — based on the National Institute of Standards and Technology’s (NIST) cybersecurity framework, and the SRO’s Report on Cybersecurity Practices — which is made up of five key questions to help your firm analyze its security: Do you store, use or transmit personally identifiable information […]
Everything you need to know about the latest SEC OCIE Guidance Updates
The Security and Exchange Commission has released its first Investment Management Guidance Update in nearly two years, noting that “because funds are varied in their operations, they should tailor their compliance programs based on the nature and scope of their businesses”. A key factor in the update is that specified registrants are now required to use […]
The 5 Keys to an Effective Cyber Attack Response
Imagine this… A staff member returning from a business trip calls you frantically from the airport – they left their company-issued laptop at the hotel, but the hotel staff hasn’t been able to find it. The worst part – that device has access to sensitive company systems and data. WHAT DO YOU DO? IT emergencies […]
Feedback From Dr. Gerald M. Goldhaber
“The advice that Raj offered in his CNBC interview on the importance of using a two-factor ID system for email is spot-on! I use this strategy regularly and also use it for my iCloud login. Raj is also dead-on when he discusses the national banking system’s callous response to identity theft. If anything, banks more […]
The Comprehensive Strategy Home Computer and Device Security
Given the ever-evolving range of cybercrime dangers that threaten your firm on a daily basis, it has quickly become evident that cybersecurity can’t be ignored. Where at one time any cybersecurity protection might have been sufficient, only the best is going to be effective in the modern digital world. In 2015, law enforcement officials reported […]
WHO SHOULD YOU TRUST FOR THE BEST IT EXPERTISE FOR YOUR NYC HEDGE FUND?
Equip your New York hedge fund with IT expertise that’s actionable, process-oriented and informed by reliable experience and knowledge. Are you tired of… Having your IT support and vendors point the finger at each other? Trying to get a greater organizational ROI at your firm but keep being held back by your technology? Getting screwed […]
Cybercriminals target businesses using sophisticated and convincing email account takeover strategy
Award-winning New York IT security expert from Brainlink warns CEOs, CFOs and COOs about the dangers of email account takeover scams. Manhattan’s Brainlink International is urging business leaders to be aware of the latest trend in cybercrime: email account takeovers. Cybercrime in any form can have devastating implications for businesses, but taking over the email […]