When is the driverless car arriving for you?

All electric and self-driving car technology fascinates me. As a race car driver, I can see that we are not too far away from the time where the computers and software will lap the car faster and better [...]

When is the driverless car arriving for you?2021-10-05T01:12:54-07:00

We got your picture even without a microwave

his is a picture laden blog. There might even be a picture of you. We had our Open House on March 9th and I can’t be more proud. Kristian, Sara, Bernice and Teresa did a fantastic job promoting and organizing the event. The office looks great. We beat our attendance target. What surprised me the most was the energy at the event and how long people stayed to network, chat and learn about new stuff.

Here are some fun pictures. Some are a bit sentimental for me.

A sentimental photo, here we have Juan Lopez (a 20+ year veteran of Alvaka Networks), Yvonne Clemens (a 20+ year client of Alvaka Networks), and Rex Frank our first service manager and now an industry icon in what else… service management.

We got your picture even without a microwave2020-04-08T23:06:37-07:00

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as [...]

CRN’s story on the CIA Wikileaks leak2020-04-08T23:06:51-07:00

The latest trends in government contracting

Los Angeles, CA - 2017 is going to be highlighted as a banner year for some DoD related contractors, and a sad downturn for others. Why? DFARS 252.204-7012 is going to define new winners and losers in defense contracting. Within [...]

The latest trends in government contracting2019-12-13T12:51:08-08:00

What is CEO fraud? c/o KnowBe4.com

Irvine, CA - CEO fraud is a phishing scam in which cybercriminals spoof company email accounts

and impersonate executives to try and fool an employee in accounting or HR into executing unauthorized wire transfers, or sending out confidential tax information.

The FBI calls this type of scam "Business Email Compromise" and defines BEC as “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.”

In the time period from January 2015 to June 2016, the FBI reported a 1300% rise in lossesfrom this type of fraud. Most victims are in the US (all 50 states), but companies in 100 other countries have also reported incidents. While the fraudulent transfers have been sent to 79 countries, most end up in China and Hong Kong. Unless the fraud is spotted within 24 hours, the chances of recovery are small.

Four Attack Methods

Understanding the different attack vectors for this type of crime is key when it comes to prevention. This is how the bad guys do it:

What is CEO fraud? c/o KnowBe4.com2019-11-19T21:29:11-08:00

DFARS 252.204-7012 is going to define new winners and losers in defense contracting

Kevin McDonald has just published his latest article of DFARS (Defense Federal Acquisition Regulations Supplement) at SearchCompliance.TechTarget.com. If you fall into this category, a recently implemented rule from the Department of Defense called the Defense Federal Acquisition Regulation Supplement (DFARS) [...]

DFARS 252.204-7012 is going to define new winners and losers in defense contracting2020-04-08T23:08:28-07:00

Aligning IT and compliance procedures increasingly a business priority

Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority. He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" [...]

Aligning IT and compliance procedures increasingly a business priority2020-04-08T23:10:49-07:00

DFARS pre-assessment questionnaire

Los Angeles, CA - Tonight I am reviewing our new DFARS Pre-Assessment Questionnaire that has just been updated for 2017. It is a very compact 30 questions in a four page document. It of course is not a full DFARS assessment, but it is step one of your process you must do before anything else on your DFARS compliance journey.

DFARS is the Defense Federal Acquisition Regulation Supplement. It is a supplement to the FAR that provides DoD-specific acquisition regulations that DoD government acquisition officials – and those contractors doing business with DoD – must follow in the procurement process for goods and services.

If you are an aerospace company, Department of Defense contractor or another type of organization that falls under....

DFARS pre-assessment questionnaire2023-02-07T08:01:16-08:00

IT solution providers speak out on the Silicon Valley/Trump Summit meeting

Irvine, CA - IT solution providers have never been a shy bunch. In this article by CRN - Solution Providers Cheer Trump Tech Summit, Hoping It Will Help Channel Partners Create More Jobs, many share their thoughts on where our president-elect [...]

IT solution providers speak out on the Silicon Valley/Trump Summit meeting2020-04-08T23:12:30-07:00

Here is a list of available ransomware decryption tools

If you have just gotten ransomware, check out this new webpage with a list of new ransomware Decryption Tools. Not all ransomware can be decrypted, but if you find you have:

1.       WildFire Decryptor

2.       Chimera Decryptor

3.       Teslacrypt Decryptor

4.       Shade Decryptor

5.       CoinVault Decryptor

6.       Rannoh Decryptor

7.       Rakhni Decryptor

Here is a list of available ransomware decryption tools2019-12-13T12:54:50-08:00