Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest cybersecurity risks we’ve ever known, and your business needs to act immediately to make sure you aren’t at risk.

Continue reading
0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

Continue reading
0 Comments

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Continue reading
0 Comments

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management AI Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Cloud Computing Holiday Miscellaneous Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption IT Support Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Mobile Office Data Security Vendor Two-factor Authentication Apps Apple Managed Services Networking Voice over Internet Protocol App Mobile Device Management Gmail BYOD Chrome Employer-Employee Relationship Budget Tip of the week Hacker Avoiding Downtime Marketing How To BDR HIPAA Applications Computing Information Technology WiFi Office 365 Access Control Conferencing Computers Bring Your Own Device Retail Website Managed IT Services Healthcare Operating System Router Risk Management 2FA Virtual Private Network Help Desk Big Data Analytics Office Tips Health Augmented Reality Storage Password Cooperation Scam Data loss Remote Workers Going Green Patch Management Firewall Save Money Cybercrime Remote Monitoring Free Resource Vulnerability Project Management End of Support Windows 7 Vendor Management Windows 11 The Internet of Things Microsoft 365 Physical Security Monitoring Display Printer Social Solutions Excel Paperless Office Infrastructure Telephone Document Management Customer Service Mouse Presentation Data Storage Entertainment Video Conferencing Maintenance Data Privacy Managed Services Provider Administration Wireless Technology Antivirus Virtual Machines Professional Services Telephone System Cost Management Word iPhone Settings Wireless Printing Robot Content Filtering Vulnerabilities YouTube User Tip Modem Safety Images 101 Mobile Security Processor Cryptocurrency IT Management VPN Multi-Factor Authentication Meetings Mobility Virtual Desktop Smart Technology Data storage Supply Chain LiFi Computer Repair Outlook Saving Time Employees Integration Money Managed IT Service Humor Customer Relationship Management Machine Learning Downloads Holidays Sports Licensing Hacking Private Cloud Human Resources Social Network Education Multi-Factor Security Server Management Hypervisor Shopping Dark Web User Superfish Optimization Identity Theft Cables PowerPoint IoT Trends Employer/Employee Relationships Mobile Computing Twitter Error Google Apps Navigation Customer Resource management Regulations Search PCI DSS Google Calendar Gig Economy Microsoft Excel IT Maintenance Data Analysis Best Practice Social Engineering Star Wars IP Address Gamification Buisness Staff Internet Service Provider Business Intelligence Teamwork Remote Computing Legal Shortcuts Evernote IT solutions Social Networking Regulations Compliance Legislation Recovery Memes Tablet Ransmoware Fileless Malware Business Growth Content Wearable Technology Hard Drives Net Neutrality Vendors SQL Server Alert History File Sharing Be Proactive Health IT Dark Data Motherboard Cortana Domains Financial Data Comparison Managed IT Smartwatch Permissions IT Workforce Directions Alt Codes How To Assessment Downtime Refrigeration Procurement Threats Azure Notifications Cyber security Travel Workplace Strategies Tech Hosted Solution Public Speaking Telework Specifications CES Fraud Techology Communitications Google Maps Meta Microchip Typing Internet Exlporer Lithium-ion battery Username Supply Chain Management Entrepreneur Amazon Google Drive Unified Threat Management Term Knowledge FinTech Black Friday Unified Threat Management IT Assessment Outsource IT Database Media IT Technicians 5G Undo Flexibility Environment Value Google Docs Proxy Server Unified Communications Network Congestion Cookies Experience Organization Cyber Monday Tactics Running Cable Digital Security Cameras Hotspot User Error Smart Devices Small Businesses Bitcoin Google Wallet Mirgation Remote Working Displays Memory Data Breach Point of Sale Google Play Nanotechnology Addiction Laptop Videos Language Application Electronic Health Records Outsourcing Windows 8 Drones Tech Support Management Chatbots Network Management Wasting Time Distributed Denial of Service Trend Micro Workplace Security Cameras Monitors Screen Reader IBM Service Level Agreement Halloween Computing Infrastructure Software as a Service Hiring/Firing Websites Paperless Identity Managing Costs eCommerce Co-managed IT SSID Bookmark Smart Tech Download Scary Stories Alerts SharePoint Surveillance Technology Care Virtual Assistant Hacks Electronic Medical Records Business Communications Fun Competition Virtual Machine Break Fix Lenovo Scams Medical IT Browsers Deep Learning Writing Connectivity Reviews Upload Development Hybrid Work Transportation Virtual Reality

Blog Archive