Alvaka's Blog

Stay Informed And Up To Date On The Latest In Cyber Security

Alvaka Blog2026-03-11T18:09:45-07:00
1507, 2014

Electronic health records ripe for theft

By |July 15th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on Electronic health records ripe for theft

The only difference in healthcare is that the large breaches have not gotten the sensational, but appropriate coverage credit card breaches have gotten.

Three other interesting quotes:

1.      As health data becomes increasingly digital and the use of electronic health records booms, thieves see patient records in a vulnerable health care system as attractive bait, according to experts interviewed by POLITICO. On the black market, a full identity profile contained in a single record can bring as much as $500.

2.      “Criminal elements will go where the money is,” said Wah, who was the first 

807, 2014

HIPAA consulting and the channel’s ethical responsibility

By |July 8th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on HIPAA consulting and the channel’s ethical responsibility

Kevin is a featured writer for TechTarget.  Here is is latest column: _________________________________________________________ A few months ago, I wrote an article about the practice of non-attorneys consulting on HIPAA business associate agreements. After talking with [...]

3006, 2014

HIPAA business associate agreement consultations could be unlawful

By |June 30th, 2014|Healthcare, IT Management, IT Planning, Security|Comments Off on HIPAA business associate agreement consultations could be unlawful

Here is a controversial article written recently by Kevin McDonald for TechTarget. ------------------------------------------------------------------------------------------------------------------------------------- Under federal law, the Health Information Portability and Accountability Act (HIPAA) Privacy Rule extends to a class of business entities (i.e., health [...]

605, 2014

Is Antivirus Software Really Dead?

By |May 6th, 2014|IT Management, IT Planning, Security|Comments Off on Is Antivirus Software Really Dead?

I am curious what Dye’s definition is for "cyber-attack?" One this is for sure, the motivation of hackers and malware has changed dramatically over the years. The threats are new and different today. Going back in history most malware was related to someone wanting cyber fame, making a political statement or just plain mischievousness. Now with the advent of ransomware, spam mailing bots and

2904, 2014

Some Good Questions and Answers on Backup and Disaster Recovery

By |April 29th, 2014|IT Management, IT Planning, Security|Comments Off on Some Good Questions and Answers on Backup and Disaster Recovery

1. Where should small businesses start with disaster recovery, whether or not they already have a DR plan in place? What is the first question the small business owner needs to ask?

I recommend starting with determining RTO and RPO.  If the small business owner starts here he or she will be off to a good start with the DR plan.  What are RTO and RPO?

         RTO – Recovery Time Objective, the time between the disaster and when the system has been made operational again.  Why is this important?  Different businesses have different costs associated with

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Hello