Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Business Computing Internet Computer Network Security Business Data Hosted Solutions IT Services Efficiency Innovation Software Android Mobile Devices User Tips Data Backup Hardware Smartphone Communication Browser Microsoft Google Windows 10 Business Management Small Business Workplace Tips Productivity Productivity Data Recovery Artificial Intelligence Ransomware Backup Gmail Data Management IT Support Facebook Smartphones Social Media Internet of Things Managed Service Provider Saving Money App Encryption Two-factor Authentication Server Microsoft Office Collaboration Cloud Computing Upgrade Business Technology Cybersecurity Windows 10 Automation communications Miscellaneous Information Managed IT Services Spam Windows Office 365 Mobile Device Applications Phishing Office Tips Managed Service Bandwidth Passwords Disaster Recovery Access Control Mobile Device Management VoIP Firewall Going Green Infrastructure Tip of the week Paperless Office The Internet of Things Government WiFi Computing Scam Big Data Social BYOD Blockchain Holiday Apps Employer-Employee Relationship Users Outsourced IT IT Support BDR Business Continuity Website Printer Apple Administration Network Settings Safety Printing Content Filtering Cybercrime Wi-Fi Antivirus Cost Management Risk Management Document Management Maintenance Data Security Data storage HIPAA LiFi Vendor Customer Service Analytics Hacking Vulnerability Money Robot Presentation Mobile Security Chrome Computers Augmented Reality Hacker Office End of Support Wireless Technology Storage Sports Mouse Quick Tips Bring Your Own Device Saving Time Service Level Agreement Display Domains Computing Infrastructure Word Search Healthcare Distributed Denial of Service Network Management Conferencing Virtual Reality Identity Best Practice Refrigeration Buisness Bookmark Travel Smart Tech Current Events Download Legal Monitors Public Speaking Alerts IT solutions SharePoint Tech Managed IT Service Telephone Remote Computing Lithium-ion battery Business Growth Entrepreneur Lenovo Browsers Unified Threat Management Connectivity Upload Licensing Cortana Downloads Term Break Fix Social Network Alert Compliance Alt Codes Undo Dark Web Downtime Wireless Superfish Entertainment IoT Mobility Trends Operating System Writing Cooperation Hosted Solution Multi-Factor Security Server Management Customer Resource management Regulations Typing Star Wars Virtualization Microsoft Excel YouTube Data Analysis Google Play Managed IT Services Gamification Google Drive Retail Staff Knowledge Google Calendar Telephone System Social Networking Cryptocurrency Application Information Technology 5G Networking Fileless Malware Security Cameras Content Google Docs Social Engineering IBM Wearable Technology Unified Communications Experience Legislation Gadgets Running Cable Health IT Motherboard Bitcoin Assessment Google Wallet Permissions Virtual Desktop Directions Identity Theft Data loss Customer Relationship Management Comparison Laptop Patch Management Tech Support Router Windows 8 Internet Exlporer Drones Dark Data Competition Fraud Techology Microchip Username Outlook How To Specifications Halloween User Tip Websites Modem Database Unified Threat Management Processor Tablet Remote Monitoring Humor Save Money IT Technicians User Black Friday Scary Stories VPN Proxy Server Machine Learning Cookies Hacks Tactics Budget Hotspot Fun User Error Navigation IT Management Monitoring Vendor Management IP Address Mirgation Deep Learning Avoiding Downtime Cyber Monday Virtual Private Network Help Desk Error Nanotechnology Password Addiction Network Congestion Language Education Evernote Google Maps Marketing Management Electronic Medical Records Mobile Office Chatbots Recovery Smart Technology Hard Drives Screen Reader Mobile Computing

Sign Up For Our Newsletter!