Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

Continue reading
0 Comments

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Alert: Fake Email Invoices Contain Ransomware

Alert: Fake Email Invoices Contain Ransomware

Ransomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Business Computing Privacy Malware Internet Tech Term Computer Network Security Hosted Solutions Innovation IT Services User Tips Business Data Mobile Devices Software Data Backup Efficiency Android Hardware Communication Productivity Google Microsoft Smartphone Browser Business Management Small Business Windows 10 Workplace Tips Smartphones Productivity Collaboration Data Management Facebook Ransomware IT Support Artificial Intelligence Data Recovery Internet of Things Social Media App Server Microsoft Office Managed Service Provider communications Backup Gmail Cybersecurity Encryption Saving Money Cloud Computing Two-factor Authentication Automation Windows 10 Office 365 VoIP Outsourced IT Mobile Device Passwords Information Applications Upgrade Managed Service Business Technology Windows Office Tips Miscellaneous Bandwidth Spam Disaster Recovery Managed IT Services Phishing Vulnerability Going Green Website BDR Mobile Device Management Computing Printer Firewall Access Control The Internet of Things WiFi Infrastructure IT Support Tip of the week Big Data Paperless Office Social Augmented Reality Government Scam Employer-Employee Relationship Business Continuity Apps Cooperation BYOD Users Holiday Apple Blockchain Hacker Office Robot Wireless Technology HIPAA Vendor Router Network End of Support Settings Printing Content Filtering Modem Cybercrime IT Management Mobile Security Wi-Fi Quick Tips Risk Management Safety Saving Time Data storage LiFi Healthcare Analytics Money Chrome Retail Storage Sports Antivirus Mouse Document Management Maintenance Bring Your Own Device Customer Service Data Security Hacking Administration Computers Cost Management Presentation Patch Management Wearable Technology Current Events Tech Support User Buisness Security Cameras Content Solutions Health IT Techology Motherboard Legal IT solutions Business Growth Save Money Directions Specifications Assessment Permissions IP Address Websites Avoiding Downtime SSID Integration Cortana Unified Threat Management Tablet Alt Codes Vendor Management Microchip Black Friday Internet Exlporer Remote Monitoring Fraud VPN Mobile Office Machine Learning Recovery Downtime Marketing Medical IT Wireless Username User Tip User Error Operating System Hard Drives Hosted Solution Network Congestion Typing Electronic Medical Records Word Processor Cyber Monday Database Domains Virtual Private Network IT Technicians Error YouTube PowerPoint Knowledge Proxy Server Cookies Google Drive Google Maps Refrigeration Display Cryptocurrency Virtual Reality Navigation Smart Technology Tactics Hotspot Public Speaking Mirgation Lithium-ion battery Information Technology 5G Monitoring Experience Help Desk Nanotechnology Google Docs Unified Communications Monitors Entrepreneur Bitcoin Twitter Running Cable Evernote Distributed Denial of Service Addiction Professional Services Network Management Language Chatbots Google Wallet Travel Virtual Desktop Management SharePoint Screen Reader Undo Windows 8 Remote Computing Laptop Managed IT Service Service Level Agreement Voice over Internet Protocol Computing Infrastructure Lenovo Identity Drones Unified Threat Management Conferencing Bookmark Downloads Smart Tech Outlook Virtualization Writing Alert Halloween Tech Download iPhone Alerts Superfish Application Telephone Browsers Multi-Factor Security Connectivity Humor Break Fix IBM Hacks Scary Stories Gadgets Term Upload Vulnerabilities Server Management Licensing Social Network Compliance Budget Fun Entertainment Google Calendar IoT Managed IT Services Dark Web Deep Learning Social Engineering Customer Relationship Management Password Mobility Trends Windows 7 Customer Resource management Networking Regulations Education Data Analysis Legislation Star Wars Microsoft Excel Competition Staff Mobile Computing Google Play Gamification Microsoft 365 Telephone System Social Networking Identity Theft Dark Data Search Best Practice How To Fileless Malware Comparison Data loss

Sign Up For Our Newsletter!