Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Encryption

Technology Basics: Encryption

Secrets need to be protected. That’s why humans created cryptography. Cryptography can be traced back to around the time the pharaohs ruled Egypt, but today’s cryptography is a lot different than simple hieroglyph replacement. Cryptography used in the computing systems today is called encryption. For this week’s tech term we will look back at the history of encryption and how it is used today to facilitate data security and personal privacy.

Continue reading
0 Comments

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

Continue reading
0 Comments

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Continue reading
0 Comments

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

Continue reading
0 Comments

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Business Computing Tech Term Internet Computer Network Security Business Data Hosted Solutions IT Services Efficiency Innovation Software Data Backup Android Mobile Devices User Tips Smartphone Hardware Communication Browser Microsoft Google Windows 10 Business Management Small Business Workplace Tips Productivity Productivity Ransomware Artificial Intelligence Data Recovery Managed Service Provider Backup Gmail Data Management Facebook Smartphones IT Support Social Media Internet of Things App Encryption Saving Money Collaboration Two-factor Authentication Server Microsoft Office Information Upgrade Applications Managed Service Cloud Computing Business Technology communications Cybersecurity Windows 10 Miscellaneous Automation Spam Windows Office 365 Office Tips Phishing Bandwidth Managed IT Services Passwords Disaster Recovery Mobile Device VoIP Mobile Device Management BDR Firewall Going Green Printer Access Control Computing The Internet of Things WiFi Big Data Social Infrastructure Tip of the week Paperless Office Apps Employer-Employee Relationship Government Users Scam IT Support BYOD Holiday Business Continuity Blockchain Outsourced IT Website Apple Administration Vulnerability HIPAA Robot Vendor End of Support Mobile Security Network Settings Printing Quick Tips Safety Content Filtering Cybercrime Wi-Fi Saving Time Risk Management Data storage LiFi Analytics Customer Service Money Chrome Augmented Reality Antivirus Document Management Hacking Computers Maintenance Presentation Hacker Data Security Office Storage Sports Cost Management Wireless Technology Mouse Bring Your Own Device Mobile Office Websites Recovery Marketing Search Unified Threat Management Router Tablet Hard Drives Best Practice Word Current Events Microchip Buisness Black Friday Internet Exlporer Remote Monitoring Fraud Domains Save Money Machine Learning Legal IT solutions Username VPN User Tip User Error Modem Refrigeration Business Growth Processor Cyber Monday Database IT Management Public Speaking Vendor Management IT Technicians Lithium-ion battery Error Cortana Virtual Private Network Proxy Server Cookies Google Maps Network Congestion Entrepreneur Alt Codes Navigation Downtime Smart Technology Tactics Wireless Hotspot Electronic Medical Records Mirgation Operating System Hosted Solution Monitoring Help Desk Nanotechnology Undo Display Typing Virtual Reality Evernote YouTube Distributed Denial of Service Addiction Network Management Language Chatbots Travel Google Drive Management Knowledge Cryptocurrency SharePoint Screen Reader Virtualization Monitors Remote Computing Information Technology Healthcare Managed IT Service Service Level Agreement 5G Computing Infrastructure Experience Lenovo Identity Unified Threat Management Application Google Docs Unified Communications Conferencing Bitcoin Bookmark Running Cable Downloads Smart Tech Alert Google Wallet Tech Gadgets Virtual Desktop Break Fix Download Alerts IBM Superfish Telephone Windows 8 Browsers Laptop Multi-Factor Security Connectivity Writing Drones Term Upload Server Management Licensing Customer Relationship Management Compliance Outlook Social Network Entertainment Halloween Google Calendar IoT Managed IT Services Dark Web Competition Retail Mobility Trends Cooperation Networking Regulations Humor Customer Resource management Hacks Data Analysis Scary Stories Legislation Star Wars Microsoft Excel Social Engineering User Budget Google Play Gamification Fun Staff Social Networking Identity Theft Deep Learning Telephone System Password Fileless Malware Comparison Data loss IP Address Tech Support Avoiding Downtime Security Cameras Education Content Patch Management Wearable Technology Techology Motherboard Dark Data Health IT Mobile Computing Directions Specifications Assessment Permissions How To

Sign Up For Our Newsletter!