6 common IT practices that should be eliminated

Here is a good mrc Cup of Joe Blog about time wasting tasks in IT. I was asked to submit a suggestion for the article.  It is a quick read on six things you can do to stop wasting time [...]

2023-08-10T23:36:16-07:00October 29th, 2013|

Alvaka Networks Third Annual Fast Friday Speed and Feed

We are into the final preparations for Alvaka Networks third annual track day.   The date is getting close on Friday November 8th, 2013.

This is a client appreciation day.  We invite clients, prospects and numerous associated businesses out to Auto Club Speedway for a private IT expo, lunch, fast driving on the track and other fun activities. 

2013-10-23T00:41:06-07:00October 23rd, 2013|

Beware of New Android Malware that Steals Phone, SMS and Audio

The new malware uses SMTP to send the data it steals to the perpetrators.  It appears the origin of this malware has its roots in China.  It first appeared in August.It collects phone numbers, sent and received SMS messages and [...]

2013-09-11T18:28:01-07:00September 11th, 2013|

Schnuck’s Might Be in Big Security and Insurance Trouble, Can the Same Be in Store for Your Firm?

Is it better to insure than secure?  Maybe not.  You better dust off those old insurance policies that most of us look at all too infrequently.  Schnucks has been notified by their insurance carrier that they don’t plan to cover them for the lawsuits.

The problem that likely exists with your current insurance policy is that they were designed and sold in a pre-Internet era.  Data is not considered....

2023-08-10T23:36:44-07:00August 23rd, 2013|

Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

2023-08-10T23:39:28-07:00August 16th, 2013|

Do You Need A Food Printer?

You may have heard of the revolution coming in the form of the personal 3D printer; a device that can print physical representation of almost any object you can imagine.  Here is a link to more on 3D printers, http://en.wikipedia.org/wiki/3D_printing [...]

2013-06-12T01:16:27-07:00June 12th, 2013|

Who Is Stealing Your Company Assets?

Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives.  In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]

2013-05-24T17:07:18-07:00May 24th, 2013|