In a recent BBC article, they explain how easy it is for cyber criminals to take over a vulnerable server. And don’t think they aren’t targeting little guys, because they are using automated tools, you’re just as vulnerable as a Fortune 100 company for many attacks. A test was done by a company that does […]
Blog
Ransomeware Still a Big Problem
In a recent article from the BBC, they discuss the fact that ransomware is still a huge problem, accounting for 40% of successful breaches. Not only that, but the criminals are targeting small firms too! [See Article Link Below] So, what can you do about? Make sure your employees are well trained in how to […]
2018 Cyber Crime Update
2017 was a crazy year for cyber crime and cyber security. WannaCry hit every continent and most modern countries (See image below), reminding us that bad guys were out there and were just an IP ping away. So, what should we expect from 2018? Less ransomware, more IoT attacks, and more memory and chip attacks. […]
BitCoin Mining: Warning to the miners
If you are mining Bitcoins, you may want to reconsider. A new study from RWTH Aachen University shows that the ledger used to verify transactions includes illegal content, such as child abuse imagery. The ledger is stored locally on the miner’s computer, and because that content is on your computer, you are liable for it…. […]
Why You Need to Clean Up your Computer
The Norton Community recently posted a good blog on why you should clean up your computers. Here’s a brief summary on what you need to do and why it matters: Why you need to: Outdated and unused software can be a vulnerability to cyber criminals Have a clear backup system will help you recover from […]
What is RAM, Processor Speed, and Hard Drive Memory?
Picture that your computer is a house. The RAM is your floor space. Basically this is how many toys you can play with at a time. How fast you play with the toys is determined by your processor speed (measured in gigahertz). And your Hard Drive memory is how large your closet space is, basically […]
Happy Thanksgiving!
Today we want to give a shout out to all our wonderful customers! We are so thankful that you have chosen to do business with us! Sincerely, The Velox Team
32 Bit vs 64 Bit Windows?
What do these designations mean? The two terms refer to how a computer processor handles information. A 64-bit Windows can handle larger amounts of RAM (Random Access Memory) more effectively than a 32-bit, and the difference is substantial. A 64-bit can handle nearly 4 billion times the amount of a 32-bit. Why do some programs […]
Are You Monitoring for Intrusions?
“In short, there is no way that any organization can keep it, and its customers and their data, safe all the time. Many organizations now assume they will be breached and set up monitoring systems to spot when that happens, while also training staff to react quickly to fix problems.” This is how a recent […]
Security Alert: “Locky” Crytpolocker Virus
NBC and several other news organizations reported Wednesday in an article about an encryption virus that has hit several U.S. Hospitals and crippled them so much so that they are seeking to pay the perpetrators to unlock their data. This is a staggering reality that saddens and angers me as an IT security professional. What […]