Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest cybersecurity risks we’ve ever known, and your business needs to act immediately to make sure you aren’t at risk.

Continue reading
0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

Continue reading
0 Comments

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Continue reading
0 Comments

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Apps Vendor Two-factor Authentication Mobile Office Data Security Apple App BYOD Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Networking WiFi HIPAA Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 How To BDR Big Data Router Physical Security Virtual Private Network Operating System Computers Health 2FA Risk Management Help Desk Website Retail Analytics Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Patch Management Save Money Microsoft 365 Social Remote Monitoring End of Support Vulnerability Vendor Management Solutions Going Green Display Customer Service Printer Cybercrime Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management The Internet of Things Windows 7 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Administration IT Management Employees VPN Meetings Customer Relationship Management Integration Settings Printing Wireless User Tip Modem Computer Repair Mobile Security Content Filtering Processor Hacking Presentation YouTube Holidays Data Storage Cryptocurrency Wireless Technology Supply Chain Smart Technology Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Virtual Desktop Saving Time Data storage LiFi Managed IT Service Word Maintenance Outlook Downloads Antivirus Money iPhone Humor Licensing Vulnerabilities Entertainment Safety Data Privacy Sports Mouse Images 101 Mobile Computing Shortcuts Legislation Organization Travel Social Networking Smart Devices Google Maps Ransmoware Search Digital Security Cameras Techology Fileless Malware Remote Working Content Vendors Wearable Technology Memory Application Best Practice Be Proactive Comparison Google Play Buisness Health IT Unified Threat Management Motherboard Data Breach Electronic Health Records Assessment IBM Legal Workforce Permissions IT solutions Videos Unified Threat Management Directions Threats Wasting Time Business Growth Workplace Strategies Network Congestion Specifications Security Cameras Trend Micro Software as a Service Internet Exlporer Meta Fraud Cortana User Error Microchip Username Amazon Managing Costs Alt Codes Competition Black Friday SSID Downtime Point of Sale eCommerce Surveillance Database Outsource IT Virtual Assistant Hosted Solution Network Management Environment Tech Support IT Technicians Virtual Machine Typing Media Monitors Cyber Monday Medical IT Reviews Proxy Server Cookies Development Tactics Google Drive Small Businesses Hotspot Transportation User Knowledge Displays Websites Mirgation Hypervisor PowerPoint 5G Shopping Nanotechnology Optimization SharePoint Addiction IP Address Google Docs Outsourcing Electronic Medical Records Language Employer/Employee Relationships Unified Communications Experience Running Cable PCI DSS Management Chatbots Bitcoin Navigation Screen Reader Google Wallet Workplace Writing Distributed Denial of Service Gig Economy Lenovo Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Recovery Paperless Evernote Laptop Regulations Compliance Server Management Private Cloud Identity Hard Drives Windows 8 Memes Identity Theft Smart Tech Domains Drones Co-managed IT Superfish Bookmark Net Neutrality Download Technology Care Twitter Alerts SQL Server Business Communications Halloween Financial Data Error History Refrigeration IT Connectivity Public Speaking Scams Social Engineering Break Fix Smartwatch Browsers Procurement Upload Lithium-ion battery Hybrid Work Remote Computing Azure Hacks Human Resources Multi-Factor Security Tech Entrepreneur Scary Stories Telework Social Network Cyber security Communitications Tablet IoT Cables Dark Web Fun CES Supply Chain Management Trends Alert Deep Learning Undo Google Apps Dark Data Google Calendar Term FinTech Managed IT Customer Resource management File Sharing Regulations IT Assessment Star Wars IT Maintenance How To Microsoft Excel Education Data Analysis Flexibility Gamification Business Intelligence Notifications Staff Value

Blog Archive