Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

Continue reading
0 Comments

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Alert: Fake Email Invoices Contain Ransomware

Alert: Fake Email Invoices Contain Ransomware

Ransomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Business Computing Cloud Email Privacy Hosted Solutions Computer Malware Internet Innovation User Tips Tech Term Data Network Security Efficiency Software Business Hardware IT Services Mobile Devices Android Productivity Business Management Microsoft Data Backup Communication Small Business Social Media Smartphone Google Data Recovery Smartphones IT Support Browser Workplace Tips Productivity Collaboration Server Artificial Intelligence Backup Windows 10 Facebook communications Microsoft Office Managed Service Provider Ransomware Data Management Internet of Things App Phishing Two-factor Authentication Automation Cloud Computing Cybersecurity Upgrade Gmail VoIP Encryption Mobile Device Spam Information Office 365 Windows 10 Government Saving Money Miscellaneous Network Outsourced IT Apps Employer-Employee Relationship Users Applications Managed Service Passwords Business Technology Windows Office Tips Bandwidth Managed IT Services Disaster Recovery Big Data Social Blockchain Going Green Vulnerability Computing Customer Service BDR Computers Printer Quick Tips Access Control Website Analytics IT Support Augmented Reality Mobile Device Management Infrastructure Tip of the week Firewall Paperless Office Business Continuity BYOD Scam Cooperation Holiday The Internet of Things WiFi Apple Robot Data Security Cost Management End of Support Settings HIPAA Printing Content Filtering Vendor Router Cybercrime Wi-Fi Hacking Modem IT Management Mobile Security Presentation Hacker Risk Management Office Wireless Technology Avoiding Downtime LiFi Data storage Saving Time Healthcare Money Chrome Retail Downloads Storage Sports Safety Mouse Managed IT Services Bring Your Own Device Antivirus Administration Networking Document Management Maintenance Gamification Microsoft 365 Staff Current Events Tech Support Buisness Google Play IT solutions Application Telephone System Social Networking Legal Identity Theft Data loss Business Growth Save Money Fileless Malware Comparison Content Solutions Gadgets Patch Management Wearable Technology Websites IBM Security Cameras Cortana Health IT Techology Motherboard Permissions Alt Codes Vendor Management Directions Specifications Assessment Wireless Integration Machine Learning Customer Relationship Management Downtime SSID Hosted Solution Network Congestion Unified Threat Management Operating System Tablet Remote Monitoring Fraud Typing Electronic Medical Records Competition Microchip Black Friday Internet Exlporer Username Virtual Assistant VPN Private Cloud YouTube Medical IT Display Knowledge User Tip User Error Google Drive Cryptocurrency Virtual Reality Processor Cyber Monday Database User 5G Transportation Virtual Private Network IT Technicians Information Technology Error Unified Communications Monitors Experience Proxy Server Cookies Google Docs Google Maps Hotspot Bitcoin Twitter Running Cable Navigation Smart Technology Tactics PowerPoint Monitoring Employer/Employee Relationships Mirgation Google Wallet IP Address Virtual Desktop Help Desk Nanotechnology Addiction Professional Services Network Management Language Windows 8 Remote Computing Laptop Evernote Distributed Denial of Service Recovery Management Teamwork Marketing Chatbots Drones Travel Mobile Office Writing Hard Drives SharePoint Screen Reader Outlook Service Level Agreement Voice over Internet Protocol Computing Infrastructure Alert Domains Halloween Word Conferencing Lenovo Identity Unified Threat Management Humor Managed IT Service Refrigeration Bookmark Smart Tech Download iPhone Alerts Hacks Public Speaking Scary Stories Tech Fun Telephone Superfish Budget Lithium-ion battery Break Fix Deep Learning Social Engineering Browsers Entrepreneur Multi-Factor Security Connectivity Upload Vulnerabilities Server Management Licensing Password Term Education Social Network Compliance Dark Web Undo Entertainment Google Calendar IoT Trends Windows 7 Mobile Computing Mobility Dark Data Search Customer Resource management Regulations Microsoft Excel Best Practice How To Virtualization Data Analysis Legislation Star Wars

Sign Up For Our Newsletter!