Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2026-03-11T18:09:45-07:00
2608, 2015

Oli Thordarson and The VAR Guy on “Cyberthreats: Worse Than Anyone Thinks”

By |August 26th, 2015|Alvaka Blog, Articles|Comments Off on Oli Thordarson and The VAR Guy on “Cyberthreats: Worse Than Anyone Thinks”

The potential for a cyberattack is top of mind for not just IT professionals and CIOs but also among the general population. Experts—from government agencies to technology experts—have been warning that this year will see [...]

2608, 2015

Will the Lowly Battery Finally Get a Moore’s Law Upgrade?

By |August 26th, 2015|IT Planning|Comments Off on Will the Lowly Battery Finally Get a Moore’s Law Upgrade?

Battery technology has not kept up with computing power, storage densities and communication speed increases that all follow something similar to Moore’s Law that states computing power will double every 18 months.  The sad truth is that batteries have not really come very far in 50 plus years.  Alternatives are needed whether it is your iPhone or a Tesla.

707, 2015

Eight Reasons You Feel Like a Hostage to IT

By |July 7th, 2015|IT Management, IT Planning, Vulnerability|Comments Off on Eight Reasons You Feel Like a Hostage to IT

Over the years we have seen many new clients come to Alvaka Networks feeling like they are hostages to Information Technology.  IT Hostages feel this way for many different reasons.  Most often the person feeling this way is the CFO, Controller, CEO, COO, IT manager or an IT technician for the most part in that order in terms of frequency.

Why do you feel that way?

2406, 2015

Do You Accept Credit Cards? If Yes, Read This….

By |June 24th, 2015|IT Management, Security, Vulnerability|Comments Off on Do You Accept Credit Cards? If Yes, Read This….

VISA just released this Security Alert.  It affects everyone who uses a Point-of-Sale (POS) terminal to accept credit card payments.  If you use that small device by your register to slide cards in order to accept payment you may be at risk.

VISA has identified malicious code that can allow hackers to gain access to the credit card information you are receiving through these POS terminals.  Some of the service providers who maintain these devices are not following good security practices and

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Hello