Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

Continue reading
0 Comments

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Alert: Fake Email Invoices Contain Ransomware

Alert: Fake Email Invoices Contain Ransomware

Ransomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Internet Tech Term Business Computing Computer Network Security Business Data Hosted Solutions Innovation IT Services Software Efficiency Mobile Devices User Tips Data Backup Android Google Microsoft Smartphone Hardware Communication Browser Productivity Windows 10 Business Management Small Business Workplace Tips Data Recovery Productivity Ransomware Artificial Intelligence Internet of Things Social Media Managed Service Provider Backup Gmail Data Management Facebook IT Support Smartphones App Encryption Server Microsoft Office Collaboration Saving Money Two-factor Authentication Spam Disaster Recovery Managed IT Services Phishing Information Mobile Device Applications Passwords Managed Service Upgrade Cloud Computing communications Business Technology Cybersecurity Windows 10 Automation Windows Office 365 Office Tips Miscellaneous Bandwidth Users Holiday Blockchain Outsourced IT VoIP Going Green BDR Website Printer Mobile Device Management Computing Access Control Firewall Infrastructure Tip of the week The Internet of Things WiFi Paperless Office Big Data IT Support Government Scam Social BYOD Employer-Employee Relationship Business Continuity Apps Sports Cost Management Mouse Data Security Bring Your Own Device Customer Service HIPAA Apple Hacking Administration Computers Vendor Router Presentation Hacker Vulnerability Robot Office Modem Wireless Technology Mobile Security End of Support Network Settings Printing Content Filtering Cybercrime Quick Tips Wi-Fi Saving Time Risk Management Safety Data storage LiFi Analytics Money Chrome Augmented Reality Antivirus Document Management Maintenance Storage Customer Relationship Management Password Fileless Malware Wearable Technology Education Security Cameras Content Identity Theft Health IT Data loss Motherboard Competition Comparison Mobile Computing Directions Patch Management Assessment Tech Support Permissions Dark Data SSID Techology Search Specifications How To Best Practice Current Events User Buisness Microchip Internet Exlporer Websites Fraud Tablet Legal IT solutions Unified Threat Management Username Black Friday User Tip Remote Monitoring Save Money Business Growth IP Address Avoiding Downtime Processor VPN Database Machine Learning IT Technicians User Error Cortana Cyber Monday Proxy Server IT Management Cookies Vendor Management Alt Codes Mobile Office Recovery Downtime Navigation Virtual Private Network Marketing Wireless Tactics Error Hotspot Google Maps Mirgation Network Congestion Operating System Hard Drives Hosted Solution Monitoring Smart Technology Word Help Desk Nanotechnology Electronic Medical Records Domains Typing YouTube Evernote Addiction Language Chatbots Display Google Drive Refrigeration Knowledge Management Distributed Denial of Service Network Management Screen Reader Virtual Reality Public Speaking Cryptocurrency Lithium-ion battery Information Technology Healthcare 5G Service Level Agreement Travel Computing Infrastructure Conferencing Identity Monitors Google Docs Unified Communications SharePoint Entrepreneur Experience Managed IT Service Running Cable Bookmark Smart Tech Remote Computing Bitcoin Alerts Google Wallet Virtual Desktop Tech Lenovo Download Unified Threat Management Telephone Undo Downloads Windows 8 Break Fix Laptop Browsers Connectivity Alert Licensing Drones Term Superfish Upload Social Network Compliance Writing Outlook Virtualization Multi-Factor Security Halloween Entertainment Server Management IoT Dark Web Cooperation Application Mobility Trends Customer Resource management Managed IT Services Regulations Retail Humor Google Calendar IBM Hacks Scary Stories Data Analysis Gadgets Star Wars Microsoft Excel Staff Budget Google Play Networking Fun Gamification Telephone System Social Networking Social Engineering Deep Learning Legislation

Sign Up For Our Newsletter!