Private sector’s national cybersecurity strategy contributions lacking

By Kevin McDonald The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity laws. Private companies should be responsible for [...]

Private sector’s national cybersecurity strategy contributions lacking2020-05-27T16:41:09-07:00

How information technology advisory groups can benefit organizations

By Kevin McDonald In today's cyber environment, many public safety organizations struggle to advance their technology and maintain security. Many departments would love to seek out efficiencies through advanced, cost-saving technology. They know they must improve their cybersecurity and operating efficiency. [...]

How information technology advisory groups can benefit organizations2020-05-27T17:04:15-07:00

Beware of CryptoLocker v4.0

It appears this new ransomware, rather than exploiting through e-mail attachments, is exploiting users by redirecting them to infected websites.It then delivers its payload through an installer.  This makes the case we are always trumpeting at Alvaka, your users should [...]

Beware of CryptoLocker v4.02015-12-03T21:15:17-08:00

BlueCross BlueShield Announces August 5th Data Breach Discovery

Tustin, CA - The most interesting part of this BlueCross BlueShield announcement is not that they found the breach on August 5th.  What is interesting when you read further into the announcement is that they say “Our investigation further revealed [...]

BlueCross BlueShield Announces August 5th Data Breach Discovery2017-09-18T00:38:04-07:00

Oli’s Top Five Computing Threats for the Second Half of 2015

I was recently asked to be part of a webinar moderated by Elliott Markowitz, The VAR Guy.  Elliott wanted me to share my thoughts on the top threats facing small to mid-size businesses.  My answer is not scientifically derived, but based upon what I am seeing most often in the past two years of IT and security management in my world.  I am seeing the top threats from these five areas:

1.    Ransomware – Organized crime groups that encrypt all your important files and hold your data hostage until you pay....

Oli’s Top Five Computing Threats for the Second Half of 20152023-08-11T01:19:23-07:00