Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2026-03-11T18:09:45-07:00
2310, 2013

Alvaka Networks Third Annual Fast Friday Speed and Feed

By |October 23rd, 2013|IT Management, IT Planning, Security|Comments Off on Alvaka Networks Third Annual Fast Friday Speed and Feed

We are into the final preparations for Alvaka Networks third annual track day.   The date is getting close on Friday November 8th, 2013.

This is a client appreciation day.  We invite clients, prospects and numerous associated businesses out to Auto Club Speedway for a private IT expo, lunch, fast driving on the track and other fun activities. 

1109, 2013

Beware of New Android Malware that Steals Phone, SMS and Audio

By |September 11th, 2013|IT Management, IT Planning, Security|Comments Off on Beware of New Android Malware that Steals Phone, SMS and Audio

The new malware uses SMTP to send the data it steals to the perpetrators.  It appears the origin of this malware has its roots in China.  It first appeared in August.It collects phone numbers, sent [...]

2308, 2013

Schnuck’s Might Be in Big Security and Insurance Trouble, Can the Same Be in Store for Your Firm?

By |August 23rd, 2013|IT Management, IT Planning, Security|Comments Off on Schnuck’s Might Be in Big Security and Insurance Trouble, Can the Same Be in Store for Your Firm?

Is it better to insure than secure?  Maybe not.  You better dust off those old insurance policies that most of us look at all too infrequently.  Schnucks has been notified by their insurance carrier that they don’t plan to cover them for the lawsuits.

The problem that likely exists with your current insurance policy is that they were designed and sold in a pre-Internet era.  Data is not considered....

1608, 2013

Internet Security Threat Report 2013

By |August 16th, 2013|Healthcare, IT Management, IT Planning, Security|Comments Off on Internet Security Threat Report 2013

Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.

907, 2013

Organizations Lacking IT Management Succession Plans Are a Symptom of a Greater Problem

By |July 9th, 2013|IT Management, IT Planning, Security|Comments Off on Organizations Lacking IT Management Succession Plans Are a Symptom of a Greater Problem

Whether or not you have an IT succession plan has more to do with the ethics and professional confidence of your IT management than anything else.  It is true that some IT organizations are just [...]

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Hello