Blog - Velox Systems

Why is Healthcare a Prime Target in Cyber Attacks

Why is Healthcare a prime target in cyber-attacks? Imagine an attack that halts emergency rooms, delays surgeries, or exposes private health data for extortion. This is the reality as cybercriminals target healthcare systems, exploiting the people who rely on them. Since 20121, healthcare has accounts for 17.8% of all breaches and 18.2% of ransomware attacks, […]

Real Time Proactive PAM Strategies are Vital

Real-time proactive PAM strategies are vital. Privileged accounts are frequent targets for attackers, yet many organizations focus on managing access rather than securing the accounts and users themselves. This gap often arises from the complexities of Privileged Access Management (PAM) deployments. As threats evolve, organizations must shift priorities to secure privileged access, preventing trust from […]

Velox Systems Cybersecurity Workshop Insights

On Tuesday, November 12th, Velox Systems and TDS teamed up to host an interactive Cybersecurity/Resiliency Workshop at 10 Barrel Eastside. The event drew attendees from various industries and positions from across Central Oregon. The workshop offered a valuable hands-on learning about cybersecurity. We now provide some Velox Systems Cybersecurity workshop insights.   Cybersecurity Workshop Format […]

AI is transforming the landscape of Identity Access Management

AI is transforming the landscape of Identity Access Management (IAM). This is fundamentally changing how organizations manage digital identities and control access to data, systems, and resources. At its core, IAM ensures that access is granted only to those who need it—on a strictly need-to-know basis. AI leverages its advanced analytical capabilities to monitor access […]

Stolen session tokens can wreak havoc on your data

Stolen session tokens can wreak havoc on your data. The Chinese-linked threat actor Evasive Panda is targeting government entities and a religious organization in Taiwan using a previously undocumented toolset called CloudScout.   What is CloudScout? According to ESET security researcher Anh Ho, CloudScout does this through the leveraging of stolen web session cookies to […]

The Urgency of Phishing-Resistant MFA

There is an urgency in phishing-resistant MFA. This year, ransomware payments skyrocketed, with the average payment jumping by an astonishing 500%. According to Sophos’ State of Ransomware 2024, the average ransom surged from $400,000 to $2 million, underscoring the urgent need for stronger security practices. A major vulnerability is outdated multifactor authentication (MFA), which fails […]

It’s Paramount to Take a Proactive Approach to Passwords

  It’s paramount to take a proactive approach to passwords. Passwords are meant to protect your organization’s data, but with so many required, users often take shortcuts. Instead of creating strong, unique passwords, many use easy-to-remember ones or, worse, reuse passwords across multiple accounts. Studies show 65% of users reuse their passwords, and 64% of […]

Fake Trading Apps Target Victims Globally via Apple and Google Stores

  Fake trading apps target victims globally. Recently, a large-scale fraud campaign was leveraging fake trading apps through Apple App and Google Play Store. This campaign takes advantage of a scheme known as pig butchering.  Pig butchering is where prospective victims are lured into making investments often in cryptocurrency after they put trust in a […]

Expiring Passwords are an Organizational Frustration

Expiring passwords are an organizational frustration. The time to reset multiple passwords is often tedious, and then one has to remember new passwords. However, not resetting your passwords can lead to cybersecurity nightmares. Read on to learn the rationale behind password expires.   Why do we have password expiries? The 90-day password reset rule was […]