Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest cybersecurity risks we’ve ever known, and your business needs to act immediately to make sure you aren’t at risk.

Continue reading
0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

Continue reading
0 Comments

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Continue reading
0 Comments

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Google Privacy Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Small Business Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Android Smartphones Upgrade communications Managed Service Mobile Devices Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Facebook Automation Productivity Artificial Intelligence Cloud Computing Covid-19 Gadgets Managed Service Provider AI Remote Work Miscellaneous Server Outsourced IT Information Holiday Encryption Employee/Employer Relationship Spam Compliance Windows 10 Office Data Management Government Training Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Apps Apple Networking Mobile Device Management App Gmail BYOD Vendor Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Marketing How To BDR WiFi Computing Applications Information Technology Access Control Office 365 IT Support Tip of the week Hacker Conferencing Avoiding Downtime Website Bring Your Own Device Managed IT Services Operating System HIPAA Router Big Data Risk Management Virtual Private Network Health Help Desk Analytics Office Tips Computers Augmented Reality Retail Storage Password Healthcare Scam Data loss Free Resource Cooperation Project Management Windows 7 Firewall Going Green Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Solutions Vendor Management Cybercrime Physical Security Social Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Customer Service Excel Document Management Remote Workers Telephone iPhone Mouse Licensing Administration Vulnerabilities Word Entertainment Data Privacy Images 101 Mobility Robot Telephone System Multi-Factor Authentication Cost Management Safety Settings Wireless Printing Content Filtering IT Management YouTube Meetings Employees VPN Integration Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage Customer Relationship Management LiFi Data Storage Supply Chain Smart Technology Outlook Video Conferencing Managed Services Provider Hacking Machine Learning Professional Services Money Saving Time Virtual Machines Presentation Humor Managed IT Service Wireless Technology Maintenance Downloads Antivirus Sports IT Education Connectivity Scams Social Engineering Break Fix Smartwatch Browsers Procurement Upload Azure Hybrid Work Recovery Remote Computing Tech Human Resources Multi-Factor Security Telework Mobile Computing Social Network Cyber security Hard Drives Communitications Domains Tablet IoT Cables Search Dark Web CES Supply Chain Management Best Practice Trends Alert Term Google Apps Dark Data Google Calendar FinTech Managed IT Customer Resource management Refrigeration Buisness File Sharing Regulations IT Assessment Public Speaking IT solutions Star Wars IT Maintenance How To Microsoft Excel Legal Data Analysis Flexibility Lithium-ion battery Business Growth Gamification Value Business Intelligence Notifications Staff Shortcuts Entrepreneur Legislation Organization Travel Social Networking Techology Fileless Malware Smart Devices Google Maps Ransmoware Cortana Digital Security Cameras Remote Working Alt Codes Content Memory Vendors Wearable Technology Downtime Unified Threat Management Motherboard Google Play Be Proactive Comparison Health IT Data Breach Undo Unified Threat Management Directions Electronic Health Records Hosted Solution Assessment Workforce Permissions Videos Typing Wasting Time Threats Security Cameras Workplace Strategies Network Congestion Specifications Trend Micro Google Drive User Error Microchip Software as a Service Internet Exlporer Meta Knowledge Fraud Username Managing Costs Amazon Application Point of Sale SSID 5G Black Friday eCommerce Google Docs Surveillance IBM Unified Communications Database Virtual Assistant Outsource IT Experience Bitcoin Network Management Virtual Machine Environment Running Cable Tech Support IT Technicians Media Cookies Medical IT Monitors Cyber Monday Reviews Google Wallet Proxy Server Development Tactics Transportation Small Businesses Hotspot Windows 8 Hypervisor Displays Laptop Websites Mirgation Nanotechnology PowerPoint Shopping Drones Optimization Competition SharePoint Addiction Employer/Employee Relationships Outsourcing Electronic Medical Records Language PCI DSS Management Halloween Chatbots Navigation Screen Reader Workplace Writing Distributed Denial of Service Gig Economy Lenovo Internet Service Provider Service Level Agreement Teamwork Hiring/Firing User Virtual Reality Computing Infrastructure Regulations Compliance Hacks Server Management Scary Stories Private Cloud Identity Evernote Paperless Identity Theft Smart Tech Co-managed IT Fun Superfish Bookmark Memes Net Neutrality IP Address Deep Learning Download SQL Server Technology Care Twitter Alerts Financial Data History Error Business Communications

Blog Archive