How Velocity Tech Solutions Saved Spring Break

Spring Break is upon us. Each year around this time, I think about one of my favorite Velocity Tech Solutions “saving asses among the masses” stories. This is Minnesota and spring break can feel more like winter solstice, so when families can actually get a room at the Water Park of America they feel like a Florida vacation without being in Florida. That is a BIG Deal!I was the lucky one to c…

Cyber Security- The Ostrich Approach is hurting the world

How important is cyber security to you? You folks in education, and healthcare how about you? IT professionals, I know you have your pretty little firewalls, but seriously does your software update every minute so it catches every threat out there? Perhaps its “good enough” It’s 2018, in case anyone hasn’t noticed and Cyber Security continues to be a huge issue for every business that has a networ…

How to Clear the Event Log For Dell PowerEdge Models: R710, R810, R910

How to Clear the Event Log For Dell PowerEdge Models: R710, R810, R910Hi, I'm Nate with Velocity Tech Solutions in Roseville, MN. I'm here to teach you, how to clear the event log on your Dell R710, R810, and R910 servers, also if you need to get rid of that troubling Amber LCD screen on the front of your server.When it comes to the 11th generation servers, there are 2 ways to clear the event log…

Can you Future Proof your IT Career?

Can you Future Proof your IT Career? Geeks, We Run the World! The world as we once knew it, when it comes to the antiquated term "nerds" has completely changed. Before Marty McFly ventured back in time to help his father George get the girl and escape the Biff Tannen nightmare, nerds most certainly did not run the world, and they were definitely not cool! Today "geeks" run virtually every…

My thoughts on the 5 Best Practices for Developing a Security Policy

My thoughts on the 5 Best Practices for Developing a Security PolicySecurity policies are the foundation of information security in an organization. A well drafted policy includes details with specific instruction to protect information and people within the organization. These policies range from computer usage guidelines for staff to the manner in which the network is monitored. Larger corporati…

Do I really need an information security policy?

Do I really need an information security policy?InfoSec Policy, Standards and Procedures - don't leave home without them!Implementing a Security Policy is all about mitigating risk. The goal is to prevent any unauthorized access, use, disruption, manipulation, or destruction of information. Since we have hackers and bots and new breeds of AI and Computer Learning attacking our networks every secon…