BBC has an interesting article about a 16 year old who is pleading guilty to hacking into Apple’s network. This kid “boasted about his activities” and broke into their network because “he was a huge fan and dreamed of working there.” There is something that happens when you’re behind a computer (it’s called The Online […]
Blog
Y2K – Real or Myth?
Interesting article from BBC discussing if Y2K was a myth… conclusion: no, it wasn’t, the only reason it was a HUGE problem, was because of IT folks who spent countless hours preparing for it. Basically it would have been a big deal, but they realized that before it happened. “The prudent sees danger and hides […]
Data Breaches: What’s Actually Reported
Are you still shredding your bills and blacking out your address on envelopes. I hope not. In this day and age your much more likely to lose you information from a data breach than from someone dumpster diving… and c’mom, I can just google your address to find out who lives there. Check out this […]
How Quickly Cyber Criminals Can Take Over
In a recent BBC article, they explain how easy it is for cyber criminals to take over a vulnerable server. And don’t think they aren’t targeting little guys, because they are using automated tools, you’re just as vulnerable as a Fortune 100 company for many attacks. A test was done by a company that does […]
How Much Bandwidth Do I Need?
How do you decide what bandwidth you need for your office? The answer to this question can cost you hundreds of dollars in lost productivity for your people, or in additional costs paying for internet you don’t need. Let’s Figure it Out Together Bandwidth Usage Here is a list of typical bandwidth suckers and then we’ll […]
Ransomeware Still a Big Problem
In a recent article from the BBC, they discuss the fact that ransomware is still a huge problem, accounting for 40% of successful breaches. Not only that, but the criminals are targeting small firms too! [See Article Link Below] So, what can you do about? Make sure your employees are well trained in how to […]
2018 Cyber Crime Update
2017 was a crazy year for cyber crime and cyber security. WannaCry hit every continent and most modern countries (See image below), reminding us that bad guys were out there and were just an IP ping away. So, what should we expect from 2018? Less ransomware, more IoT attacks, and more memory and chip attacks. […]
BitCoin Mining: Warning to the miners
If you are mining Bitcoins, you may want to reconsider. A new study from RWTH Aachen University shows that the ledger used to verify transactions includes illegal content, such as child abuse imagery. The ledger is stored locally on the miner’s computer, and because that content is on your computer, you are liable for it…. […]
Why You Need to Clean Up your Computer
The Norton Community recently posted a good blog on why you should clean up your computers [See Blog Here]. Here’s a brief summary on what you need to do and why it matters: Why you need to: Outdated and unused software can be a vulnerability to cyber criminals Have a clear backup system will help […]
New Team Members at Velox
We’ve Grown! We’ve been fortunate to grow in the last year and add some new teammates! You may have already spoken to them on the phone, but we wanted to formally introduce them to you! We’re really excited to have them on board, and we think you’ll enjoy working with them too! Lisa Ellefson Nerd […]