Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Tech Term Internet Computer Network Security Hosted Solutions Business Data IT Services Innovation Efficiency Software Mobile Devices Android User Tips Data Backup Microsoft Smartphone Hardware Google Communication Browser Small Business Workplace Tips Productivity Windows 10 Business Management Productivity Data Recovery Artificial Intelligence Ransomware Smartphones IT Support Social Media Managed Service Provider Backup Gmail Data Management Facebook Internet of Things App Encryption Two-factor Authentication Server Microsoft Office Saving Money Collaboration Windows 10 Miscellaneous Automation Spam Phishing communications Managed IT Services Passwords Mobile Device Windows Office 365 Office Tips Upgrade Information Bandwidth Applications Cloud Computing Disaster Recovery Managed Service Business Technology Cybersecurity Big Data Social Infrastructure Tip of the week Going Green Paperless Office Apps Employer-Employee Relationship Users Government Scam Computing BYOD Holiday Outsourced IT Website IT Support Blockchain Mobile Device Management BDR Firewall Printer Business Continuity Access Control The Internet of Things WiFi VoIP Network Saving Time Settings Printing Content Filtering Cybercrime Wi-Fi Antivirus Customer Service Document Management Hacking Maintenance Presentation Computers Risk Management Hacker Office Data Security Wireless Technology Data storage LiFi Vulnerability Analytics Robot Cost Management Chrome Augmented Reality Money End of Support HIPAA Storage Vendor Router Quick Tips Sports Safety Mouse Bring Your Own Device Modem Mobile Security Administration Apple Hotspot Managed IT Service Navigation Current Events Tactics Remote Computing Buisness Legal Monitoring Unified Threat Management Application IT solutions Mirgation Lenovo Downloads Help Desk Business Growth Nanotechnology Language Gadgets Break Fix Evernote IBM Addiction Alert Management Chatbots Cortana Superfish Multi-Factor Security Alt Codes Screen Reader Writing Downtime Computing Infrastructure Wireless Healthcare Server Management Customer Relationship Management Service Level Agreement Operating System Conferencing Hosted Solution Identity Google Calendar Bookmark Managed IT Services Competition Typing Smart Tech Retail YouTube Alerts Tech Download Google Drive Telephone Knowledge Networking Legislation Browsers Cryptocurrency Connectivity Social Engineering User Licensing 5G Term Information Technology Upload Google Docs Social Network Identity Theft Unified Communications Compliance Experience Comparison Entertainment Data loss Bitcoin IoT Running Cable Dark Web Avoiding Downtime Virtual Desktop Cooperation Mobility Patch Management IP Address Google Wallet Trends Tech Support Customer Resource management Regulations Dark Data Techology Specifications Data Analysis Windows 8 Star Wars How To Laptop Microsoft Excel Recovery Staff Marketing Google Play Mobile Office Drones Gamification Websites Unified Threat Management Outlook Telephone System Tablet Hard Drives Social Networking Black Friday Fileless Malware Remote Monitoring Domains Save Money Word Halloween Machine Learning Wearable Technology Security Cameras VPN Content User Error Humor Health IT Refrigeration Motherboard Cyber Monday Directions IT Management Public Speaking Hacks Assessment Vendor Management Scary Stories Permissions Error Fun SSID Virtual Private Network Lithium-ion battery Budget Google Maps Deep Learning Network Congestion Entrepreneur Fraud Smart Technology Microchip Password Internet Exlporer Electronic Medical Records Username Education User Tip Undo Display Distributed Denial of Service Processor Network Management Mobile Computing Database Virtual Reality Travel IT Technicians Search SharePoint Proxy Server Virtualization Best Practice Cookies Monitors

Sign Up For Our Newsletter!