Steps for an Effective Cybersecurity Incident Response Plan

Written by Kevin McDonald, COO and CISO of Alvaka Networks. Originally published January 2016 on TechTarget. Kevin discusses steps to help you prepare a cybersecurity incident response. When your system is compromised, you generally have one chance to get the response [...]

Steps for an Effective Cybersecurity Incident Response Plan2021-06-23T12:37:20-07:00

How Does GDPR Affect Companies Doing Business in California?

Most people received updated privacy notices from several websites they frequently visit over the last several weeks, but very few know why they received them. Most of it was prompted by the General Data Protection Regulation (GDPR), that was approved [...]

How Does GDPR Affect Companies Doing Business in California?2024-03-14T00:09:52-07:00

Six of the Most Dreaded IT Projects

Written by Dan Tynan (Writer, Editor, and Consultant). Originally posted on CIO.com on June 25, 2018. Alvaka Networks CEO, Oli Thordarson, and CTO, Unnar Gardarsson, contribute to this discussion on what projects IT professionals dread the most. The projects that most IT [...]

Six of the Most Dreaded IT Projects2024-03-14T00:11:19-07:00

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards

With all the recent headlines regarding cyber security breaches, it is easy for companies to forget about the physical security controls they must put into place. This crucial element of the HIPAA Security Rule will vary in implementation depending on [...]

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards2021-01-28T15:39:38-08:00

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches

By Oli Thordarson, CEO of Alvaka Networks I was recently asked to write a short column on “What three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches?” for the ABL Organization. It [...]

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches2020-05-18T14:31:37-07:00

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 2

Typical Shrink-Wrap Terms and Conditions While the type of terms and conditions found in shrink-wrap agreements vary greatly from vendor to vendor, there are a number of common themes. In general, shrink-wrap agreements include the following potentially problematic terms: [...]

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 22020-05-18T14:47:38-07:00

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 1

Shrink-wrap and click-wrap agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or as part of the installation [...]

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 12020-05-18T14:54:06-07:00

DFARS 252.204-7012: Terms to know

DFARS 252.204-7012 requires that, as a DoD contractor, your organization and your subcontractors must obtain certification of compliance. The deadline has now passed to meet DFARS compliance rules that put cybersecurity safeguards on what the U.S. government calls 'controlled unclassified [...]

DFARS 252.204-7012: Terms to know2020-07-14T22:41:27-07:00

8 early warning signs of IT disaster

I am flattered to have provided input for a story by an author whose work I have read for years. His name is Dan Tynan, and he wrote “8 early warning signs of IT disasters” for CIO Magazine. Here is [...]

8 early warning signs of IT disaster2024-03-13T23:59:42-07:00