Picture that your computer is a house. The RAM is your floor space. Basically this is how many toys you can play with at a time. How fast you play with the toys is determined by your processor speed (measured in gigahertz). And your Hard Drive memory is how large your closet space is, basically […]
Category: General
Happy Thanksgiving!
Today we want to give a shout out to all our wonderful customers! We are so thankful that you have chosen to do business with us! Sincerely, The Velox Team
32 Bit vs 64 Bit Windows?
What do these designations mean? The two terms refer to how a computer processor handles information. A 64-bit Windows can handle larger amounts of RAM (Random Access Memory) more effectively than a 32-bit, and the difference is substantial. A 64-bit can handle nearly 4 billion times the amount of a 32-bit. Why do some programs […]
Are You Monitoring for Intrusions?
“In short, there is no way that any organization can keep it, and its customers and their data, safe all the time. Many organizations now assume they will be breached and set up monitoring systems to spot when that happens, while also training staff to react quickly to fix problems.” This is how a recent […]
Security Alert: “Locky” Crytpolocker Virus
NBC and several other news organizations reported Wednesday in an article about an encryption virus that has hit several U.S. Hospitals and crippled them so much so that they are seeking to pay the perpetrators to unlock their data. This is a staggering reality that saddens and angers me as an IT security professional. What […]
VIRUS, MALWARE, TROJAN, WORM… SO WHAT’S THE DIFFERENCE?
There are several types of threats out there that you probably hear about on a regular basis from the new media, social media, or internet forums. There are two basic categories to this, viruses and malware. Of course, by its definition viruses are malicious software and therefore could be considered malware, but in technical nomenclature […]
Avoid email-borne virus
Several customers have reported getting an email containing a Dropbox link. These emails are coming from people they know. This is likely a result of the senders email being hacked and used to send malicious email to the victim’s address book on behalf of the spammer. Two things you need to watch out for: Be very […]
A FALSE SENSE OF SECURITY: BUSINESS CONTINUITY VS DISASTER RECOVERY
ANYONE CAN PROMISE DISASTER RECOVERY, BUT WHAT’S YOUR BUSINESS CONTINUITY PLAN? At Velox Systems, we know our customers trust us to power and protect their most valuable assets and data. This doesn’t just mean we promise a backup of critical data, it means that we fight to provide business continuity when disaster hits. For instance, […]
PASSWORDS EXPLAINED – WHY SHOULD MY PASSWORDS BE COMPLEX?
How would I ever remember a password like “e$K7e*lx”? How important is your password, really? The greatest data security systems in the world can only keep you as secure as the strength of your password used to gain access to your sensitive data. This is why the big data storage organizations require you to choose […]