Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Tech Term Internet Business Computing Computer Network Security Business Data Hosted Solutions Innovation Software Efficiency IT Services Mobile Devices Data Backup User Tips Android Microsoft Smartphone Hardware Communication Google Browser Productivity Windows 10 Business Management Small Business Workplace Tips Productivity Artificial Intelligence Ransomware Data Recovery Social Media Managed Service Provider IT Support Backup Gmail Data Management Facebook Internet of Things Smartphones Collaboration Server Two-factor Authentication Microsoft Office Saving Money App Encryption Spam Phishing communications Cloud Computing Business Technology Passwords Cybersecurity Windows 10 Automation Windows Office 365 Upgrade Office Tips Information Applications Bandwidth Managed Service Managed IT Services Disaster Recovery Mobile Device Miscellaneous Users BDR Printer Computing Access Control Website Blockchain Infrastructure Tip of the week Paperless Office Mobile Device Management Government IT Support Scam Firewall BYOD Business Continuity Holiday The Internet of Things WiFi Outsourced IT Big Data Social VoIP Apps Employer-Employee Relationship Going Green Network End of Support Settings Printing Content Filtering Customer Service Hacking Cybercrime Quick Tips Wi-Fi Presentation Computers Hacker Office Risk Management Wireless Technology Cost Management Data storage LiFi Analytics HIPAA Chrome Augmented Reality Vendor Router Money Antivirus Document Management Modem Storage Mobile Security Maintenance Safety Sports Mouse Data Security Bring Your Own Device Apple Administration Vulnerability Saving Time Robot Smart Tech User Error Cortana Customer Relationship Management Bookmark Tech Vendor Management Download Alerts Alt Codes Cyber Monday IT Management Downtime Virtual Private Network Wireless Error Competition Telephone Connectivity Operating System Hosted Solution Google Maps Browsers Network Congestion Term Electronic Medical Records Upload Licensing Typing Smart Technology YouTube Social Network Compliance User IoT Google Drive Dark Web Knowledge Entertainment Display Network Management Mobility Virtual Reality Trends Cooperation Cryptocurrency Distributed Denial of Service 5G Travel Customer Resource management Regulations Information Technology Monitors Avoiding Downtime Star Wars Google Docs Microsoft Excel Unified Communications SharePoint Experience IP Address Data Analysis Google Play Remote Computing Gamification Staff Bitcoin Managed IT Service Running Cable Virtual Desktop Lenovo Unified Threat Management Telephone System Social Networking Google Wallet Recovery Marketing Downloads Mobile Office Fileless Malware Security Cameras Alert Hard Drives Content Wearable Technology Windows 8 Break Fix Laptop Superfish Domains Health IT Word Motherboard Drones Writing Assessment Outlook Permissions Multi-Factor Security Directions Server Management SSID Refrigeration Halloween Public Speaking Retail Internet Exlporer Humor Fraud Google Calendar Managed IT Services Lithium-ion battery Microchip Username Entrepreneur Hacks Scary Stories Networking Fun User Tip Budget Social Engineering Database Deep Learning Legislation Processor Undo IT Technicians Password Education Identity Theft Proxy Server Cookies Tactics Hotspot Comparison Data loss Navigation Patch Management Tech Support Virtualization Monitoring Mirgation Mobile Computing Techology Search Help Desk Dark Data Nanotechnology Evernote How To Application Addiction Language Best Practice Specifications Buisness Websites Management Chatbots Current Events Screen Reader Legal Gadgets IT solutions Unified Threat Management Tablet IBM Healthcare Save Money Service Level Agreement Computing Infrastructure Business Growth Black Friday Remote Monitoring VPN Machine Learning Conferencing Identity

Sign Up For Our Newsletter!