About Oli Thordarson

This author has not yet filled in any details.
So far Oli Thordarson has created 29 blog entries.

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards

With all the recent headlines regarding cyber security breaches, it is easy for companies to forget about the physical security controls they must put into place. This crucial element of the HIPAA Security Rule will vary in implementation depending on [...]

HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards 2018-06-13T12:06:57+00:00

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches

By Oli Thordarson, CEO of Alvaka Networks I was recently asked to write a short column on “What three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches?” for the ABL Organization. It [...]

Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches 2018-05-31T11:40:31+00:00

The Questions to Ask When Hiring an IT Security Consultant

by Jessica Thiefels, VP of Community Management for PolySwarm If you can’t afford an in-house IT security team, you have to look outside to find the support you need. However, if you lack IT security skills or knowledge, it can be [...]

The Questions to Ask When Hiring an IT Security Consultant 2018-06-13T12:49:05+00:00

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 2

Typical Shrink-Wrap Terms and Conditions While the type of terms and conditions found in shrink-wrap agreements vary greatly from vendor to vendor, there are a number of common themes. In general, shrink-wrap agreements include the following potentially problematic terms: [...]

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 2 2018-05-14T15:41:36+00:00

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 1

Shrink-wrap and click-wrap agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or as part of the installation [...]

Legal quicksand: Shrink-wrap and click-wrap agreements – Part 1 2018-05-14T15:39:16+00:00

DFARS 252.204-7012: Terms to know

DFARS 252.204-7012 requires that, as a DoD contractor, your organization and your subcontractors must obtain certification of compliance. The deadline has now passed to meet DFARS compliance rules that put cybersecurity safeguards on what the U.S. government calls 'controlled unclassified [...]

DFARS 252.204-7012: Terms to know 2018-05-17T10:08:51+00:00

8 early warning signs of IT disaster

I am flattered to have provided input for a story by an author whose work I have read for years. His name is Dan Tynan, and he wrote “8 early warning signs of IT disaster” for CIO Magazine. Here is [...]

8 early warning signs of IT disaster 2018-05-31T16:11:18+00:00

Beware the ‘thought police:’ The dangers of human and AI integration

By Kevin McDonald Humans have always strived to become smarter, faster and more creative through the use of tools. Starting with the basic calculator and advancing to the amazing computing devices we use today, our use of technology as a [...]

Beware the ‘thought police:’ The dangers of human and AI integration 2018-04-10T22:13:45+00:00

Imran Awan case shows lax security controls for Congressional IT staff

By Kevin McDonald Investigations into the conduct of the IT staff of the House of Representatives raised alarms. Kevin McDonald explains what we can learn from the case of Imran Awan. Those who operate with high-level system access, [...]

Imran Awan case shows lax security controls for Congressional IT staff 2018-04-08T21:08:54+00:00

Imran Awan case shows lax security controls for Congressional IT staff

By Kevin McDonald Investigations into the conduct of the IT staff of the House of Representatives raised alarms. Kevin McDonald explains what we can learn from the case of Imran Awan. Those who operate with high-level system access, [...]

Imran Awan case shows lax security controls for Congressional IT staff 2018-04-08T21:10:15+00:00
Load More Posts