What are the Impacts of Generative AI on Cloud Security?

What is Generative AI? Generative AI is a form of artificial intelligence capable of producing fresh content, including text, images, audio, and video. It accomplishes this by learning the patterns and structure from existing data and then using this [...]

What are the Impacts of Generative AI on Cloud Security?2024-01-26T13:13:57-08:00

What can my cloud provider do with my data?

Take a moment from your day and pull out the last three or four cloud services agreements your company has entered into. Now, highlight the provisions in those agreements that specifically define how the vendor may use your data. You [...]

What can my cloud provider do with my data?2024-03-14T00:14:56-07:00

BlueCross BlueShield Announces August 5th Data Breach Discovery

Tustin, CA - The most interesting part of this BlueCross BlueShield announcement is not that they found the breach on August 5th.  What is interesting when you read further into the announcement is that they say “Our investigation further revealed [...]

BlueCross BlueShield Announces August 5th Data Breach Discovery2017-09-18T00:38:04-07:00

Some Good Q&A on Backup and Disaster Recovery

1. Where should small businesses start with disaster recovery, whether or not they already have a DR plan in place? What is the first question the small business owner needs to ask?

I recommend starting with determining RTO and RPO.  If the small business owner starts here he or she will be off to a good start with the DR plan.  What are RTO and RPO?

•         RTO – Recovery Time Objective, the time between the disaster and when the system has been made operational again.  Why is this important?  Different businesses have different costs associated with...

Some Good Q&A on Backup and Disaster Recovery2015-03-02T15:43:00-08:00

What Should You Do About IT and Network Security in 2015?

So what should you do at your company?

1.       Identify your most valuable IT systems within your company.  What is the most important data that resides there?  Determine your obligations to protect that data and how important is it that those systems are up-and-running.

2.       Do you have a current network/information security policy in place?  Once you determine which systems and data are most important to protect, developing your policy becomes much easier.

3.       Discover where you are most at risk.  A quick and easy solution is to have someone perform a vulnerability assessment on your system.  Alvaka Networks can help you with this.  Vulnerability assessments are our most common security service we provide.  It makes your work easy.  We will help you match the protection needs of your most important IT assets with the vulnerabilities identified in the vulnerability assessment.  From there you can easily create a roadmap for what you should do to protect you, your company and your IT assets from cyber-attack.

What Should You Do About IT and Network Security in 2015?2014-12-03T21:00:00-08:00

HIPAA business associate agreement consultations could be unlawful

Here is a controversial article written recently by Kevin McDonald for TechTarget. ------------------------------------------------------------------------------------------------------------------------------------- Under federal law, the Health Information Portability and Accountability Act (HIPAA) Privacy Rule extends to a class of business entities (i.e., health plans, health care clearinghouses and [...]

HIPAA business associate agreement consultations could be unlawful2020-04-29T22:44:01-07:00

HIPAA-compliant cloud storage services: Due diligence is key to survival

Many VARs are looking to profit from health care-related cloud storage services. But with profit comes responsibility. Whether you build your own or offer another’s service, the U.S. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for [...]

HIPAA-compliant cloud storage services: Due diligence is key to survival2020-04-29T22:38:59-07:00

It’s time for a real accreditation process for cloud storage services

Many cloud storage providers are hiding behind smoke and mirrors to intentionally misrepresent their offerings, which only confuses customers. Why are they doing this? To increase profits, of course. Alvaka Networks is available to for IT consulting and support services [...]

It’s time for a real accreditation process for cloud storage services2020-04-29T22:41:00-07:00

Selling to the LOB manager: Reseller, beware

At many businesses, line-of-business managers and staff are making decisions to move mission-critical and often sensitive data to the cloud, and they're performing local installs without the knowledge of the IT department. Read more: http://searchitchannel.techtarget.com/opinion/Selling-to-the-LOB-manager-Reseller-beware Alvaka Networks is available to [...]

Selling to the LOB manager: Reseller, beware2018-05-07T09:15:53-07:00