We’ve all heard many times how important passwords are, here are a list of common passwords people use, please don’t use these as it will make breaking your password really easy. Season + year (e.g. Winter 2018) Local Sports Team + Digits (e.g. Seahawks3) Company Name +Year/Number/Special Character (e.g. VeloxSystems2018@) So how do you compile a good […]
Category: General
Why Do We Do and Say Dumb Things Online?
BBC has an interesting article about a 16 year old who is pleading guilty to hacking into Apple’s network. This kid “boasted about his activities” and broke into their network because “he was a huge fan and dreamed of working there.” There is something that happens when you’re behind a computer (it’s called The Online […]
Y2K – Real or Myth?
Interesting article from BBC discussing if Y2K was a myth… conclusion: no, it wasn’t, the only reason it was a HUGE problem, was because of IT folks who spent countless hours preparing for it. Basically it would have been a big deal, but they realized that before it happened. “The prudent sees danger and hides […]
Data Breaches: What’s Actually Reported
Are you still shredding your bills and blacking out your address on envelopes. I hope not. In this day and age your much more likely to lose you information from a data breach than from someone dumpster diving… and c’mom, I can just google your address to find out who lives there. Check out this […]
How Quickly Cyber Criminals Can Take Over
In a recent BBC article, they explain how easy it is for cyber criminals to take over a vulnerable server. And don’t think they aren’t targeting little guys, because they are using automated tools, you’re just as vulnerable as a Fortune 100 company for many attacks. A test was done by a company that does […]
Ransomeware Still a Big Problem
In a recent article from the BBC, they discuss the fact that ransomware is still a huge problem, accounting for 40% of successful breaches. Not only that, but the criminals are targeting small firms too! [See Article Link Below] So, what can you do about? Make sure your employees are well trained in how to […]
2018 Cyber Crime Update
2017 was a crazy year for cyber crime and cyber security. WannaCry hit every continent and most modern countries (See image below), reminding us that bad guys were out there and were just an IP ping away. So, what should we expect from 2018? Less ransomware, more IoT attacks, and more memory and chip attacks. […]
BitCoin Mining: Warning to the miners
If you are mining Bitcoins, you may want to reconsider. A new study from RWTH Aachen University shows that the ledger used to verify transactions includes illegal content, such as child abuse imagery. The ledger is stored locally on the miner’s computer, and because that content is on your computer, you are liable for it…. […]
Why You Need to Clean Up your Computer
The Norton Community recently posted a good blog on why you should clean up your computers. Here’s a brief summary on what you need to do and why it matters: Why you need to: Outdated and unused software can be a vulnerability to cyber criminals Have a clear backup system will help you recover from […]
New Team Members at Velox
We’ve Grown! We’ve been fortunate to grow in the last year and add some new teammates! You may have already spoken to them on the phone, but we wanted to formally introduce them to you! We’re really excited to have them on board, and we think you’ll enjoy working with them too! Lisa Ellefson Nerd […]