Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2021-01-26T12:20:56-08:00
1207, 2016

An experienced cyber insurance broker’s reply to my blog

July 12th, 2016|Categories: Alvaka Blog, IT Planning, Security|Tags: , , , , , , |Comments Off on An experienced cyber insurance broker’s reply to my blog

This reply to my blog, Should I buy cyber insurance? is written by David McNeil, principal, of EPIC Insurance Brokers & Agents. He brings 20+ years of professional industry experience to the topic on cyber insurance. Some of Alvaka Networks' clients have been utilizing Dave's services for many years.

---------------------------------------------------------------------------------------------

Hi Oli,

Always enjoy your insights and thoughts on Tech-related subjects.   Lately, the plethora of headlines regarding cyber-related issues has meant the interest in cyber-insurance has reached a new level. This is a huge topic and this comment can only scratch the surface.

That said, a bit of an insider-view may be helpful…

Currently, cyber-insurance coverage forms are NOT standard (ISO) forms.  As a result, insurance carriers forms differ greatly.  Many parts, definitions, limits and coverage triggers are negotiable.

Definition negotiations are critical.  It is important to know what to look for and how to modify a particular carriers form to best suit the needs of a specific client/insured.

EXAMPLE:  Trigger for Notification of a Breach - (A hypothetical…. Sort of)....

2106, 2016

Don’t go on a phishing trip!

June 21st, 2016|Categories: Alvaka Blog, Articles|Tags: , , , , , |Comments Off on Don’t go on a phishing trip!

Kevin McDonald guest writes a blog for Dave Berkus' Berkonomics TUESDAY, June 21st, 2016 By Kevin McDonald Phishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively impacting individuals and [...]

205, 2016

Without IT process documentation, companies risk being held ‘hostage’ by IT

May 2nd, 2016|Categories: Alvaka Blog, Articles|Comments Off on Without IT process documentation, companies risk being held ‘hostage’ by IT

As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice. It seems that not a day passes without news of another high-profile hack, [...]

2204, 2016

Orange County Register Opinion Column on “Ransomware: Pay now or pay later”

April 22nd, 2016|Categories: Alvaka Blog, Articles|Comments Off on Orange County Register Opinion Column on “Ransomware: Pay now or pay later”

Ian makes several very important points including, “Whether it is your home computer or a large organization’s network, ransomware does not care. It will block access to the computer, encrypt your data and if that computer has access rights to the network, then it will lock down the entire network and hold it all hostage.” Additional he says “The threat of ransomware will continue to grow because cybercriminals recognize it as a profitable business model and the online payment methods afford anonymity.”

If you want to read more about ransomware and how to protect you and your company, check out these links:

 1)    Attend free our live lunch and learn on How to Protect You and Your Company from Ransomware. Whether you have already gotten ransomware or have yet to be infected, this is a must attend event. In 90 minutes you will come away with a rich set of action items to be better prepared. Ransomware Lunch & Learn

2)  Here is the Ransomware defense framework for P-D-R, Protect, Detect and Recover.

2303, 2016

Here’s the ransomware cybercrime scenario that has many business owners worried

March 23rd, 2016|Categories: Alvaka Blog, Articles|Tags: , , , , |Comments Off on Here’s the ransomware cybercrime scenario that has many business owners worried

Here is a news column featuring Alvaka/Noloki EVP and security expert, Kevin McDonald. It’s a business owner’s worst nightmare. You arrive for work, sit down at your computer and find that you can’t access any of your files because cyber [...]

103, 2016

This New OpenSSL v2 Protocol Flaw Merits Watching

March 1st, 2016|Categories: Alvaka Blog, Articles|Comments Off on This New OpenSSL v2 Protocol Flaw Merits Watching

Fortunately OpenSSL is publishing a fix on Tuesday - OpenSSL versions 1.0.2g, 1.0.1s - to deal with the protocol flaw. Many systems are vulnerable to an attack that may be comparable with Heartbleed. “This flaw is more than a product [...]