Obama Admin Releases Massive New HIPAA Rules

So, as if healthcare practitioners didn’t already have enough to focus on with Obamacare, HITECH and the Flu epidemic, the Obama administration through the Department of Health and Human Services, has released a massive pile of new regulations in a [...]

2013-01-18T21:52:02-08:00January 18th, 2013|

BYOD: Are You Bringing Your Own Disaster

With the incredible proliferation of mobile devices that allow anyone with network credentials to gain nearly unlimited access to internal network resources, we have opened the proverbial Pandora’s Box. The ironic thing in this fast growing story is those with [...]

2013-01-11T19:45:10-08:00January 11th, 2013|

Alvaka Proves Again We Are Thought Leaders in IT Services

I just love it when stuff like this happens.  I was reading a white paper on cloud computing security by Hewlett Packard. The document is titled Securing Your Business in the Cloud; HP Converged Cloud Security. The document (Click [...]

2023-08-10T22:44:11-07:00January 8th, 2013|

Who Is Guilty In A Hack? The Perpetrator Or The Victim?

This article is interesting not because the hacker is convicted, but because of the reader comments at the end. The first post defends the hacker and blames AT&T for their system not being secure enough and allowing a breach. The next poster says that is akin to blaming a bank if they are robbed because their doors are not secure enough. Another poster points out that both are to blame.

2026-04-15T04:37:13-07:00November 22nd, 2012|

Opinion Piece By CompTIA Member And Alvaka Networks EVP Kevin McDonald

I’ve noticed a lot of gratuitous talk by our legislators about being all for small business and protecting the individual. They bandy about rhetoric about the Constitution and consistently are finding rights that are not spelled out or even vaguely contained in its language. Then they blatantly violate a key provision that is in fact clearly spelled out.

2017-09-18T01:00:14-07:00October 18th, 2012|

The Dangers Of Posting Your Photos Online

Be careful when posting photos on-line. Almost all new smart phones record where and when you took a photo. Many of the new high-end dedicated cameras do the same thing. Beyond the photo that you see and innocently post is a wealth of data you may not want to publish. That data is called EXIF, for Exchangeable Image Format.

2026-04-15T04:44:37-07:00August 4th, 2012|