How information technology advisory groups can benefit organizations

By Kevin McDonald In today's cyber environment, many public safety organizations struggle to advance their technology and maintain security. Many departments would love to seek out efficiencies through advanced, cost-saving technology. They know they must improve their cybersecurity and operating efficiency. [...]

How information technology advisory groups can benefit organizations2020-05-27T17:04:15-07:00

Despite the warnings, corporate cyber defenses remain inadequate

Following WannaCry, how should businesses protect themselves from cyberattacks? If anything, 2017 will be remembered as the year of the cyber-attack. No business is safe. No industry is exempt. The ease with which cyber-attacks can be launched and virally propagated [...]

Despite the warnings, corporate cyber defenses remain inadequate2024-03-14T00:10:24-07:00

What is DevOps and why is it important?

I was just reading a critical assessment today of Alvaka Networks’ website, and how we position our company in our messaging. There is considerable talk in the assessment about the application economy and DevOps, and how Alvaka is not messaging [...]

What is DevOps and why is it important?2020-05-27T17:10:59-07:00

New password guidelines from the US federal government via NIST

The National Institute of Standards and Technology (NIST) has issued new guidelines regarding secure passwords. Who is NIST? NIST is a non-regulatory federal agency whose purpose is to promote U.S. innovation and industrial competitiveness by [...]

New password guidelines from the US federal government via NIST2023-02-07T07:44:11-08:00

When is the driverless car arriving for you?

All electric and self-driving car technology fascinates me. As a race car driver, I can see that we are not too far away from the time where the computers and software will lap the car faster and better [...]

When is the driverless car arriving for you?2021-10-05T01:12:54-07:00

We got your picture even without a microwave

his is a picture laden blog. There might even be a picture of you. We had our Open House on March 9th and I can’t be more proud. Kristian, Sara, Bernice and Teresa did a fantastic job promoting and organizing the event. The office looks great. We beat our attendance target. What surprised me the most was the energy at the event and how long people stayed to network, chat and learn about new stuff.

Here are some fun pictures. Some are a bit sentimental for me.

A sentimental photo, here we have Juan Lopez (a 20+ year veteran of Alvaka Networks), Yvonne Clemens (a 20+ year client of Alvaka Networks), and Rex Frank our first service manager and now an industry icon in what else… service management.

We got your picture even without a microwave2020-04-08T23:06:37-07:00

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as [...]

CRN’s story on the CIA Wikileaks leak2020-04-08T23:06:51-07:00

The latest trends in government contracting

Los Angeles, CA - 2017 is going to be highlighted as a banner year for some DoD related contractors, and a sad downturn for others. Why? DFARS 252.204-7012 is going to define new winners and losers in defense contracting. Within [...]

The latest trends in government contracting2019-12-13T12:51:08-08:00

What is CEO fraud? c/o KnowBe4.com

Irvine, CA - CEO fraud is a phishing scam in which cybercriminals spoof company email accounts

and impersonate executives to try and fool an employee in accounting or HR into executing unauthorized wire transfers, or sending out confidential tax information.

The FBI calls this type of scam "Business Email Compromise" and defines BEC as “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.”

In the time period from January 2015 to June 2016, the FBI reported a 1300% rise in lossesfrom this type of fraud. Most victims are in the US (all 50 states), but companies in 100 other countries have also reported incidents. While the fraudulent transfers have been sent to 79 countries, most end up in China and Hong Kong. Unless the fraud is spotted within 24 hours, the chances of recovery are small.

Four Attack Methods

Understanding the different attack vectors for this type of crime is key when it comes to prevention. This is how the bad guys do it:

What is CEO fraud? c/o KnowBe4.com2019-11-19T21:29:11-08:00