Endpoint detection and response (EDR) has become the new cybersecurity buzzword. Why is endpoint detection and response essential? Hackers constantly evolve their tactics to bypass traditional security measures like antivirus software. That’s where Endpoint Detection and Response (EDR) steps in as a game-changer for modern cybersecurity. Here’s why EDR is essential: What is EDR? […]
Category: Tech Articles
Why Anti-Virus Alone Isn’t Enough: Embracing a Holistic Cybersecurity Strategy
Anti-virus alone isn’t enough to bolster your cybersecurity, but there are comprehensive, dynamic tools you can add to your arsenal. While anti-virus software is a crucial element in the fight against malware, it alone cannot ensure complete cybersecurity. Although anti-virus plays a significant role in detecting and removing known malicious hardware, it relies on something […]
Cybersecurity Firm CrowdStrike’s Window’s Update: Global Disruption
Cybersecurity firm CrowdStrike underwent a faulty Window’s update which led to massive global business disruptions. This incident affected industries such as healthcare, retail, and airfare. What exactly happened, and should you be concerned? Let’s break it down. What happened with the Window’s Update? Cybersecurity firm CrowdStrike’s recent Windows Update for its customers […]
Managed Detection and Response (MDR): Cybersecurity Necessity
Managed Detection and Response (MDR), it may sound like Greek, but it’s your new cybersecurity necessity! While you’ve no doubt been hearing the horror stories of cyber-attacks, MDR is a new advanced cybersecurity tool, that when utilized with an expert’s guidance, allows you to fight back. However, unlike traditional security measures, MDR combines cutting-edge […]
Unveiling Social Engineering: Digital Deception
You’ve seen the news about catastrophic cyber breaches, malware, and ransomware attacks. But are you familiar with social engineering? This term is becoming the new digital “open sesame” into your organization, as attackers manipulate users to gain access. In other words, social engineering is a new cybersecurity nightmare. But there is light at the […]
2018 Cyber Crime Update
2017 was a crazy year for cyber crime and cyber security. WannaCry hit every continent and most modern countries (See image below), reminding us that bad guys were out there and were just an IP ping away. So, what should we expect from 2018? Less ransomware, more IoT attacks, and more memory and chip attacks. […]
Security Alert: “Locky” Crytpolocker Virus
NBC and several other news organizations reported Wednesday in an article about an encryption virus that has hit several U.S. Hospitals and crippled them so much so that they are seeking to pay the perpetrators to unlock their data. This is a staggering reality that saddens and angers me as an IT security professional. What […]
VIRUS, MALWARE, TROJAN, WORM… SO WHAT’S THE DIFFERENCE?
There are several types of threats out there that you probably hear about on a regular basis from the new media, social media, or internet forums. There are two basic categories to this, viruses and malware. Of course, by its definition viruses are malicious software and therefore could be considered malware, but in technical nomenclature […]
Avoid email-borne virus
Several customers have reported getting an email containing a Dropbox link. These emails are coming from people they know. This is likely a result of the senders email being hacked and used to send malicious email to the victim’s address book on behalf of the spammer. Two things you need to watch out for: Be very […]
A FALSE SENSE OF SECURITY: BUSINESS CONTINUITY VS DISASTER RECOVERY
ANYONE CAN PROMISE DISASTER RECOVERY, BUT WHAT’S YOUR BUSINESS CONTINUITY PLAN? At Velox Systems, we know our customers trust us to power and protect their most valuable assets and data. This doesn’t just mean we promise a backup of critical data, it means that we fight to provide business continuity when disaster hits. For instance, […]