Ransomware v2.0 Recovery – Now, encrypted or deleted backups!

Warning!!! We have entered a new, even more malicious, era for ransomware that is hitting mid-market companies particularly hard, with deleted or encrypted backups. The two stories I share below are chilling… For the last five years or so, ransomware [...]

Ransomware v2.0 Recovery – Now, encrypted or deleted backups!2021-01-28T17:48:31-08:00

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards

With all the recent headlines regarding cyber security breaches, it is easy for companies to forget about the physical security controls they must put into place. This crucial element of the HIPAA Security Rule will vary in implementation depending on [...]

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards2021-01-28T15:39:38-08:00

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches

By Oli Thordarson, CEO of Alvaka Networks I was recently asked to write a short column on “What three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches?” for the ABL Organization. It [...]

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches2020-05-18T14:31:37-07:00

The Questions to Ask When Hiring an IT Security Consultant

by Jessica Thiefels, VP of Community Management for PolySwarm. Learn what questions to ask when hiring an IT security consultant, including insight from Alvaka Networks CEO, Oli Thordarson. If you can’t afford an in-house IT security team, you have to look [...]

The Questions to Ask When Hiring an IT Security Consultant2018-06-29T15:22:40-07:00

Average Ransomware Attack Infects 16 Workstations, 5 Servers and 22 Users

Midmarket firms are getting hit hardest by ransomware. Data from 2017 shows that 29% of the companies with 1,000 to 5,000 employees are getting struck by ransomware. If companies that size—who presumably have the resources to guard against this scourge—are [...]

Average Ransomware Attack Infects 16 Workstations, 5 Servers and 22 Users2021-01-27T21:47:04-08:00

Alvaka Networks is growing and moving into larger new Irvine offices

Irvine, CA - We are not going too far. We are only moving about two miles. We are now adjacent to the overflow/long-term parking for the John Wayne/SNA Airport. We are at the corner of Main Street and Redhill at 2 Executive Circle in Irvine.

Everyone at Alvaka is really excited to be moving into our new larger headquarters. Here are a few pictures of the new space after demolition and before the new construction starts. These photos show some of the painting that just started.

T minus 7 days to moving-in.  Click Here for the Pictures

Alvaka Networks is growing and moving into new Irvine offices - T minus 6 days

Alvaka Networks is growing and moving into new Irvine offices - T minus 5 days

Alvaka Networks is growing and moving into new Irvine offices - T minus 4 days

Alvaka Networks is growing - T minus 3 days to moving-in

Alvaka Networks is growing - T minus 2 days

https://www.alvaka.net/blog/t-minus-1

Alvaka Networks is growing and moving into larger new Irvine offices2019-09-05T21:52:15-07:00

I Am a Non-Technical Executive: What Seven Things Should I Be Asking My IT Guys About IT Security?

Irvine, CA - Overseeing IT and security is a daunting task, even if you are an IT professional. If you are an executive to whom IT reports, then the task becomes near impossible. The list of following questions is designed to empower you to have a meaningful discussion with your IT team so you can be an informed and responsible manager pursuing your due diligence role in protecting the assets of your firm. If you are an IT professional, these are questions you should be prepared to answer.

1.       Q. When did we last do a risk assessment? Please share that document with me. I would particularly like to see the Risk Assessment Table.

A.      Make sure your IT team is periodically assessing the risks to your IT systems.  They should be recommending upgrades and new solutions for you from time-to-time, and you should be listening.  They need to be able to express the threat in operational and economic terms in order to justify the expenditure.  If your team can’t give you a clear and coherent answer on when and how they last did this, send them off with a task and a deadline.

2.       Q. When did we last do a Vulnerability Scan? What were the results of that scan? I would like to see the report.  Who did the remediation? When is our next scan planned?...

I Am a Non-Technical Executive: What Seven Things Should I Be Asking My IT Guys About IT Security?2021-01-28T18:23:01-08:00