Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Business Computing Cloud Email Privacy Hosted Solutions Computer Malware Internet Tech Term Innovation User Tips Data Network Security Efficiency Software Business Hardware Mobile Devices Productivity IT Services Android Business Management Data Backup Microsoft Communication Small Business Social Media Google Smartphone Smartphones IT Support Data Recovery Browser Collaboration Workplace Tips Artificial Intelligence Productivity Server Backup Windows 10 Facebook Ransomware Internet of Things Microsoft Office Managed Service Provider Data Management communications Two-factor Authentication Automation Cloud Computing Cybersecurity Phishing VoIP App Upgrade Gmail Office 365 Windows 10 Spam Government Information Encryption Mobile Device Saving Money Miscellaneous Business Technology Windows Apps Office Tips Employer-Employee Relationship Users Bandwidth Managed IT Services Disaster Recovery Passwords Applications Managed Service Network Outsourced IT Quick Tips Big Data Social Access Control Analytics Cooperation IT Support Augmented Reality Infrastructure Tip of the week Customer Service Blockchain Paperless Office Business Continuity Computers BYOD Scam Holiday Apple Website Going Green Mobile Device Management Firewall Vulnerability Computing BDR The Internet of Things WiFi Printer LiFi Data storage Money Chrome Retail Downloads Hacking Cost Management Presentation Storage Hacker Sports Office Mouse Managed IT Services Bring Your Own Device HIPAA Wireless Technology Antivirus Vendor Router Avoiding Downtime Administration Networking Document Management Maintenance Modem Robot Mobile Security Data Security End of Support Settings Printing Content Filtering Cybercrime Wi-Fi Saving Time Safety Healthcare IT Management Risk Management Telephone Bitcoin Twitter Running Cable Smart Technology Browsers Google Wallet Connectivity Virtual Desktop Break Fix Application Licensing Term Upload Vulnerabilities Network Management Social Network Windows 8 Remote Computing Compliance IBM Laptop Distributed Denial of Service Gadgets Entertainment Drones Travel IoT Dark Web Windows 7 Writing SharePoint Mobility Outlook Trends Customer Resource management Alert Regulations Customer Relationship Management Halloween Lenovo Data Analysis Unified Threat Management Star Wars Microsoft Excel Gamification Microsoft 365 Staff Competition Google Play Humor Telephone System Hacks Social Networking Scary Stories Fun Superfish Fileless Malware Budget Content Solutions Deep Learning Social Engineering Wearable Technology Multi-Factor Security Security Cameras Server Management Health IT Password Motherboard User Permissions Directions Assessment Education Integration Google Calendar SSID Mobile Computing IP Address Dark Data Fraud Search Microchip Internet Exlporer Username Virtual Assistant Best Practice How To Legislation Medical IT Marketing User Tip Current Events Tech Support Mobile Office Buisness Recovery IT solutions Hard Drives Processor Legal Identity Theft Database Data loss Transportation Business Growth Save Money IT Technicians Domains Word Comparison Patch Management Proxy Server Websites Cookies Hotspot Refrigeration Cortana Techology Navigation Tactics PowerPoint Monitoring Employer/Employee Relationships Alt Codes Vendor Management Mirgation Public Speaking Specifications Wireless Help Desk Machine Learning Nanotechnology Lithium-ion battery Downtime Hosted Solution Network Congestion Language Entrepreneur Unified Threat Management Evernote Operating System Tablet Addiction Professional Services Remote Monitoring Management Teamwork Typing Electronic Medical Records Chatbots Black Friday VPN Private Cloud Screen Reader YouTube Display Computing Infrastructure Undo Knowledge User Error Google Drive Service Level Agreement Voice over Internet Protocol Conferencing Cryptocurrency Virtual Reality Identity Cyber Monday 5G Virtual Private Network Bookmark Information Technology Error Smart Tech Managed IT Service Unified Communications Monitors Alerts Virtualization Experience Tech Google Docs Google Maps Download iPhone

Sign Up For Our Newsletter!