AlphaKOR Group

Experience true IT performance.

AlphaKOR can increase revenue with digital marketing, decrease expense with IT services, and increase efficiency with custom software and platforms.

AlphaKOR Academy

AlphaKOR Group / AlphaKOR Academy (Page 2)

  This week, we welcome Guest Blogger Bill Hess, Founder of Pixel Privacy. Every company retrieves sensitive information from new employees to identify them, running checks, and payment.  Companies keep this information in physical files or on computer databases. It’s essential to the individual employee and your reputation as a business owner to keep this information safe and secure.  If you are not following the proper procedures for storing and disposing of employee data you are leaving yourself open to fraud, identity theft,...

  We welcome Atif Malik, Client Services, AlphaKOR Group on the subject of Organizational Transformation. There comes a time for every organization when they must stop and reflect on where they are and where they want to be. This retrospection provides leaders with much insight into areas of a company that can be improved. This improvement can be with Technology, People, and Processes. However, it's not just up to the leaders of an organization to reflect on how to improve their current...

  What are you doing to combat Cybersecurity?  At AlphaKOR, our Team works with you to educate everyone on some preventative measures to do and some things not to do.  This is a good article by Rick Miller: In the history of our democracy, we have never had a more open, free, and unregulated system of information and communication than the internet. The industrial revolution pales in comparison to the global impact of technology on an unexpecting world. Like all world-changing advances, the...

  Plugins are necessary for enhanced functionality of each WP site but the more plugins we add the higher the risk to potential threats. How can we limit this risk and what can we do to prevent in general these kinds of attacks (through the installed plugins)? This is a great question. According to survey results we published last year, vulnerable plugins are the top way that attackers gain access to WordPress sites. Reducing your plugin security risk is one of the most important...

  Cryptocurrency Miners Exploiting WordPress Sites This entry was posted in Research, WordPress Security on October 26, 2017 by Brad Haas During the last month, the information security media has paid a lot of attention to cryptocurrency mining malware. The Wordfence team has been monitoring the situation, and we are now starting to see attacks attempting to upload mining malware, and site cleaning customers that are already infected. In this post, you’ll learn what cryptocurrency mining is, what’s in it for the attackers, how to check if you...

  This is a must-read for protecting your business from these attacks.  Discovered by Mathy Vanhoef of imec-DistriNet, KU Leuven (go to www.krackattacks.com for the full article). We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit...

  Last Friday we held our monthly Executek peer group.   Lead by our very own, Atif Malik, it was another good discussion including these topics. Great Firewall of China Transmit plans by Audio if possible Speak with Government Officials for workaround or exception Find out about leasing lines to access the international internet Possibly partner with other vendors  Project Management Microsoft Project too in-depth and time consuming for basic IT use MS Project too expensive What is the threshold too transition from task based management to full out project management? ...

  AlphaKOR has created a peer group, called Executek IT Round Table which meets monthly to bring together the Region' IT experts to discuss timely topics.   The Ransomware event was an extension of our round table and WEtech' inaugural Tech Talk event. Our very own, Atif Malik, co-founded Executek IT Round Table and lead the Ransomware discussion with valuable information.   One of the main keys is to educate all employees of what to do and what not to do to...

  Here is the blog from Wordfence regarding a new campaign targeting fresh WordPress installs. At Wordfence, we track millions of attacks from a wide variety of sources every day. From this data we create a list of the worst-of-the-worst attackers and add those to our IP blacklist to protect our Premium customers. We also carefully monitor the activity that those known bad IP addresses engage in. In May and June, we saw our worst-of-the-worst IPs start using a new kind of attack targeting...

  What We Know A new ransomware variant is spreading quickly across the globe at the time of this writing. There is no consensus yet in the security research community, so the following information is provisional in nature: The ransomware has been dubbed “Petya.” It likely spreads by using two separate exploits. You don’t need to click on anything or take any action. This can spread into your system through the network. That is why it is having such a wide impact and...