2017 was a crazy year for cyber crime and cyber security. WannaCry hit every continent and most modern countries (See image below), reminding us that bad guys were out there and were just an IP ping away. So, what should we expect from 2018? Less ransomware, more IoT attacks, and more memory and chip attacks. […]
Author: Jordan Smith
BitCoin Mining: Warning to the miners
If you are mining Bitcoins, you may want to reconsider. A new study from RWTH Aachen University shows that the ledger used to verify transactions includes illegal content, such as child abuse imagery. The ledger is stored locally on the miner’s computer, and because that content is on your computer, you are liable for it…. […]
Why You Need to Clean Up your Computer
The Norton Community recently posted a good blog on why you should clean up your computers. Here’s a brief summary on what you need to do and why it matters: Why you need to: Outdated and unused software can be a vulnerability to cyber criminals Have a clear backup system will help you recover from […]
What is RAM, Processor Speed, and Hard Drive Memory?
Picture that your computer is a house. The RAM is your floor space. Basically this is how many toys you can play with at a time. How fast you play with the toys is determined by your processor speed (measured in gigahertz). And your Hard Drive memory is how large your closet space is, basically […]
Happy Thanksgiving!
Today we want to give a shout out to all our wonderful customers! We are so thankful that you have chosen to do business with us! Sincerely, The Velox Team
32 Bit vs 64 Bit Windows?
What do these designations mean? The two terms refer to how a computer processor handles information. A 64-bit Windows can handle larger amounts of RAM (Random Access Memory) more effectively than a 32-bit, and the difference is substantial. A 64-bit can handle nearly 4 billion times the amount of a 32-bit. Why do some programs […]
Are You Monitoring for Intrusions?
“In short, there is no way that any organization can keep it, and its customers and their data, safe all the time. Many organizations now assume they will be breached and set up monitoring systems to spot when that happens, while also training staff to react quickly to fix problems.” This is how a recent […]
Security Alert: “Locky” Crytpolocker Virus
NBC and several other news organizations reported Wednesday in an article about an encryption virus that has hit several U.S. Hospitals and crippled them so much so that they are seeking to pay the perpetrators to unlock their data. This is a staggering reality that saddens and angers me as an IT security professional. What […]
VIRUS, MALWARE, TROJAN, WORM… SO WHAT’S THE DIFFERENCE?
There are several types of threats out there that you probably hear about on a regular basis from the new media, social media, or internet forums. There are two basic categories to this, viruses and malware. Of course, by its definition viruses are malicious software and therefore could be considered malware, but in technical nomenclature […]
Are you settling for Break Fix or are you performing with Velox Systems?
Many of our competitors in Bend, Oregon provide business technical support on what is called a “Break Fix model”. This means that when something is broken, you call for help and someone comes to fix it. This sounds nice. You get help when you need it, and you only pay for the support hours spent […]