Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2026-03-11T18:09:45-07:00
801, 2013

Alvaka Proves Again We Are Thought Leaders in IT Services

By |January 8th, 2013|IT Management, IT Planning, Security|Comments Off on Alvaka Proves Again We Are Thought Leaders in IT Services

I just love it when stuff like this happens.  I was reading a white paper on cloud computing security by Hewlett Packard. The document is titled Securing Your Business in the Cloud; HP Converged [...]

2711, 2012

Fast Fun At The Race Track – Alvaka Networks Client Appreciation Day

By |November 27th, 2012|Healthcare, IT Management, IT Planning, Security|Comments Off on Fast Fun At The Race Track – Alvaka Networks Client Appreciation Day

We had another successful day at Auto Club Speedway for our second annual client appreciation day at Auto Club Speedway in Fontana. In attendance were 40 drivers getting driving instruction and taking fast laps around the road course.

 
2211, 2012

Who Is Guilty In A Hack? The Perpetrator Or The Victim?

By |November 22nd, 2012|IT Management, IT Planning, Security|Comments Off on Who Is Guilty In A Hack? The Perpetrator Or The Victim?

This article is interesting not because the hacker is convicted, but because of the reader comments at the end. The first post defends the hacker and blames AT&T for their system not being secure enough and allowing a breach. The next poster says that is akin to blaming a bank if they are robbed because their doors are not secure enough. Another poster points out that both are to blame.

1810, 2012

Opinion Piece By CompTIA Member And Alvaka Networks EVP Kevin McDonald

By |October 18th, 2012|IT Management, IT Planning, Security|Comments Off on Opinion Piece By CompTIA Member And Alvaka Networks EVP Kevin McDonald

I’ve noticed a lot of gratuitous talk by our legislators about being all for small business and protecting the individual. They bandy about rhetoric about the Constitution and consistently are finding rights that are not spelled out or even vaguely contained in its language. Then they blatantly violate a key provision that is in fact clearly spelled out.

408, 2012

The Dangers Of Posting Your Photos Online

By |August 4th, 2012|IT Management, IT Planning, Security|Comments Off on The Dangers Of Posting Your Photos Online

Be careful when posting photos on-line. Almost all new smart phones record where and when you took a photo. Many of the new high-end dedicated cameras do the same thing. Beyond the photo that you see and innocently post is a wealth of data you may not want to publish. That data is called EXIF, for Exchangeable Image Format.

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Hello