Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2021-01-26T12:20:56-08:00
1603, 2017

We got your picture even without a microwave

March 16th, 2017|Categories: Alvaka Blog|Comments Off on We got your picture even without a microwave

his is a picture laden blog. There might even be a picture of you. We had our Open House on March 9th and I can’t be more proud. Kristian, Sara, Bernice and Teresa did a fantastic job promoting and organizing the event. The office looks great. We beat our attendance target. What surprised me the most was the energy at the event and how long people stayed to network, chat and learn about new stuff.

Here are some fun pictures. Some are a bit sentimental for me.

A sentimental photo, here we have Juan Lopez (a 20+ year veteran of Alvaka Networks), Yvonne Clemens (a 20+ year client of Alvaka Networks), and Rex Frank our first service manager and now an industry icon in what else… service management.

803, 2017

CRN’s story on the CIA Wikileaks leak

March 8th, 2017|Categories: Alvaka Blog, Articles|Comments Off on CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as [...]

2702, 2017

The latest trends in government contracting

February 27th, 2017|Categories: Alvaka Blog|Comments Off on The latest trends in government contracting

Los Angeles, CA - 2017 is going to be highlighted as a banner year for some DoD related contractors, and a sad downturn for others. Why? DFARS 252.204-7012 is going to define new winners and losers in defense contracting. Within [...]

3101, 2017

What is CEO fraud? c/o KnowBe4.com

January 31st, 2017|Categories: Alvaka Blog|Comments Off on What is CEO fraud? c/o KnowBe4.com

Irvine, CA - CEO fraud is a phishing scam in which cybercriminals spoof company email accounts

and impersonate executives to try and fool an employee in accounting or HR into executing unauthorized wire transfers, or sending out confidential tax information.

The FBI calls this type of scam "Business Email Compromise" and defines BEC as “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.”

In the time period from January 2015 to June 2016, the FBI reported a 1300% rise in lossesfrom this type of fraud. Most victims are in the US (all 50 states), but companies in 100 other countries have also reported incidents. While the fraudulent transfers have been sent to 79 countries, most end up in China and Hong Kong. Unless the fraud is spotted within 24 hours, the chances of recovery are small.

Four Attack Methods

Understanding the different attack vectors for this type of crime is key when it comes to prevention. This is how the bad guys do it:

2101, 2017

DFARS 252.204-7012 is going to define new winners and losers in defense contracting

January 21st, 2017|Categories: Alvaka Blog, Articles|Comments Off on DFARS 252.204-7012 is going to define new winners and losers in defense contracting

Kevin McDonald has just published his latest article of DFARS (Defense Federal Acquisition Regulations Supplement) at SearchCompliance.TechTarget.com. If you fall into this category, a recently implemented rule from the Department of Defense called the Defense Federal Acquisition Regulation Supplement (DFARS) [...]

1901, 2017

Aligning IT and compliance procedures increasingly a business priority

January 19th, 2017|Categories: Alvaka Blog, Articles|Comments Off on Aligning IT and compliance procedures increasingly a business priority

Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority. He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" [...]