Companies risk being held ‘hostage’ by IT without proper IT process documentation
Written by Kevin McDonald, Alvaka Networks. Originally published April 2016 on TechTarget. Kevin discusses the crucial role of IT Process Documentation. It seems that not a day passes without news of another high-profile hack, embezzlement of [...]
HIPAA Security: Don’t Neglect Physical Workstation Security Safeguards
With all the recent headlines regarding cyber security breaches, it is easy for companies to forget about the physical security controls they must put into place. This crucial element of the HIPAA Security Rule will [...]
Three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches
By Oli Thordarson, CEO of Alvaka Networks I was recently asked to write a short column on “What three things healthcare organizations can do to help protect their organizations from cyber risk and security breaches?” [...]
The Questions to Ask When Hiring an IT Security Consultant
by Jessica Thiefels, VP of Community Management for PolySwarm. Learn what questions to ask when hiring an IT security consultant, including insight from Alvaka Networks CEO, Oli Thordarson. If you can’t afford an in-house IT security [...]
Legal quicksand: Shrink-wrap and click-wrap agreements – Part 2
Typical Shrink-Wrap Terms and Conditions While the type of terms and conditions found in shrink-wrap agreements vary greatly from vendor to vendor, there are a number of common themes. In general, shrink-wrap agreements include [...]
Legal quicksand: Shrink-wrap and click-wrap agreements – Part 1
Shrink-wrap and click-wrap agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or [...]
I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Hello






