Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions Users IT Services Cybersecurity Ransomware Quick Tips Microsoft Data Backup Small Business Mobile Device Communication Smartphones communications Android Workplace Strategy Business Management Mobile Devices Smartphone VoIP Saving Money Managed IT Services Microsoft Office Data Recovery Managed Service Browser Social Media Passwords Network Upgrade Backup Disaster Recovery Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Server Remote Work Managed Service Provider Artificial Intelligence Facebook Miscellaneous Encryption Windows Gadgets Spam Windows 10 Outsourced IT Information Employee/Employer Relationship Holiday Data Management Government Business Continuity Business Technology Productivity Wi-Fi Blockchain Windows 10 Compliance Two-factor Authentication Data Security Bandwidth Virtualization Apps Current Events Office Vendor Mobile Device Management Networking Gmail Chrome Budget Managed Services Voice over Internet Protocol Apple Employer-Employee Relationship App Hacker Avoiding Downtime Computing Information Technology Mobile Office Applications How To Office 365 BDR Conferencing Access Control Computers Operating System Retail Website Marketing Risk Management Router Managed IT Services Analytics Office Tips Augmented Reality Help Desk WiFi Storage Password BYOD Big Data Bring Your Own Device Virtual Private Network Training Health Going Green Windows 7 Customer Service Cooperation Microsoft 365 Tip of the week Document Management Cybercrime AI Solutions Scam HIPAA Data loss Firewall Windows 11 IT Support Patch Management Save Money Remote Monitoring The Internet of Things Monitoring Vulnerability Excel End of Support Vendor Management Remote Workers Social Healthcare Display Printer Telephone Free Resource Paperless Office Infrastructure Project Management Data Privacy Images 101 Entertainment Hacking Settings Presentation Multi-Factor Authentication Mobility Printing Machine Learning Wireless Content Filtering Wireless Technology Telephone System YouTube Cost Management Maintenance Employees Cryptocurrency Integration Antivirus Word Virtual Desktop Data storage LiFi Holidays User Tip Modem Data Storage Processor Outlook Mobile Security Safety Video Conferencing Money 2FA Robot Supply Chain Humor Managed Services Provider Professional Services Virtual Machines Smart Technology IT Management Sports Saving Time Mouse VPN Meetings iPhone Administration Managed IT Service Computer Repair Vulnerabilities Downloads Customer Relationship Management Licensing Social Network Multi-Factor Security Websites IT Assessment Flexibility Value IoT Dark Web Cortana Google Apps IT Maintenance Electronic Medical Records Organization Trends SharePoint Alt Codes Customer Resource management User Regulations Downtime Business Intelligence Google Calendar Digital Security Cameras Smart Devices Writing Remote Working Data Analysis Memory Star Wars Lenovo Hosted Solution Microsoft Excel Shortcuts Staff Ransmoware Virtual Reality Data Breach Gamification Typing Google Play Social Networking Server Management Vendors Legislation Private Cloud Videos IP Address Electronic Health Records Fileless Malware Google Drive Wasting Time Superfish Identity Theft Knowledge Be Proactive Wearable Technology Workforce Twitter Trend Micro Content Security Cameras Software as a Service Health IT Recovery Motherboard Threats Comparison Error 5G Social Engineering Directions Hard Drives Google Docs Managing Costs Assessment Unified Communications Permissions Experience Workplace Strategies SSID Running Cable Meta Remote Computing Domains eCommerce Bitcoin Surveillance Google Wallet Virtual Assistant Amazon Specifications Microchip Refrigeration Virtual Machine Internet Exlporer Fraud Tablet Medical IT Laptop Outsource IT Alert Reviews Public Speaking Username Windows 8 Lithium-ion battery Development Drones Transportation Managed IT Environment Black Friday File Sharing Media Dark Data How To Hypervisor Database Entrepreneur PowerPoint IT Technicians Halloween Small Businesses Notifications Shopping Optimization Proxy Server Employer/Employee Relationships Cookies Displays Cyber Monday Travel PCI DSS Undo Tactics Techology Navigation Hotspot Google Maps Hacks Mirgation Scary Stories Outsourcing Gig Economy Internet Service Provider Teamwork Nanotechnology Unified Threat Management Fun Workplace Regulations Compliance Addiction Unified Threat Management Deep Learning Evernote Language Chatbots Hiring/Firing Memes Management Network Congestion Net Neutrality Application SQL Server Screen Reader Education Distributed Denial of Service Paperless Co-managed IT Physical Security Financial Data History Service Level Agreement User Error Computing Infrastructure Mobile Computing Identity Technology Care Smartwatch IBM IT Procurement Bookmark Azure Smart Tech Point of Sale Search Business Communications Scams Telework Cyber security Download Best Practice Tech Alerts Network Management Buisness Hybrid Work Tech Support CES Communitications Monitors Supply Chain Management Browsers Legal Connectivity IT solutions Break Fix Human Resources Cables FinTech Competition Upload Business Growth Term

Blog Archive