Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest cybersecurity risks we’ve ever known, and your business needs to act immediately to make sure you aren’t at risk.

Continue reading
0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

Continue reading
0 Comments

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Continue reading
0 Comments

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Artificial Intelligence Holiday Automation Cloud Computing Gadgets Training Covid-19 Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Data Security Two-factor Authentication Vendor Apps Mobile Office Mobile Device Management Managed Services Voice over Internet Protocol Networking Gmail WiFi BYOD Chrome Employer-Employee Relationship Budget Apple Tip of the week App Computing How To Information Technology BDR Office 365 HIPAA Applications Access Control Hacker Avoiding Downtime Conferencing Marketing Operating System Managed IT Services Risk Management Healthcare Big Data Analytics Office Tips Router Augmented Reality Physical Security Virtual Private Network Storage Password Bring Your Own Device Health Computers Help Desk Website 2FA Retail Scam Data loss Cybercrime Firewall Remote Workers Cooperation Patch Management The Internet of Things Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Windows 7 Social Vendor Management Microsoft 365 Display Solutions Printer Paperless Office Customer Service Infrastructure Monitoring Windows 11 Document Management Going Green Excel Telephone Professional Services Content Filtering Virtual Machines Licensing YouTube Entertainment Cryptocurrency Safety iPhone Telephone System Virtual Desktop Robot Vulnerabilities Data storage Cost Management LiFi Data Privacy Outlook Images 101 IT Management Mobility VPN Money Meetings Multi-Factor Authentication Humor User Tip Modem Customer Relationship Management Processor Computer Repair Mobile Security Sports Mouse Employees Integration Hacking Presentation Administration Smart Technology Machine Learning Wireless Technology Saving Time Holidays Data Storage Supply Chain Managed IT Service Video Conferencing Maintenance Settings Word Downloads Wireless Managed Services Provider Antivirus Printing Workplace Browsers Connectivity Hosted Solution Social Engineering Break Fix Gig Economy Internet Service Provider Teamwork Hiring/Firing Refrigeration Upload Typing Remote Computing Multi-Factor Security Regulations Compliance Public Speaking Evernote Paperless Social Network Lithium-ion battery Co-managed IT Google Drive Tablet IoT Dark Web Knowledge Memes Net Neutrality SQL Server Technology Care Trends Entrepreneur Alert Managed IT Customer Resource management File Sharing Regulations Dark Data Google Calendar Financial Data 5G History Business Communications IT Scams Data Analysis Google Docs Star Wars Unified Communications How To Microsoft Excel Smartwatch Experience Notifications Staff Running Cable Procurement Azure Hybrid Work Undo Gamification Bitcoin Tech Human Resources Google Wallet Travel Social Networking Legislation Telework Cyber security Communitications Cables Techology Fileless Malware Google Maps CES Wearable Technology Laptop Supply Chain Management Content Windows 8 Term Google Apps Health IT Drones Unified Threat Management Motherboard Comparison FinTech IT Assessment IT Maintenance Unified Threat Management Directions Application Assessment Permissions Halloween Flexibility Value Business Intelligence Shortcuts Network Congestion Specifications Organization IBM Smart Devices Ransmoware User Error Microchip Internet Exlporer Fraud Digital Security Cameras Scary Stories Remote Working Memory Vendors Username Hacks Google Play Be Proactive Point of Sale Black Friday Fun Data Breach Electronic Health Records Workforce Database Deep Learning Videos Tech Support IT Technicians Wasting Time Threats Competition Network Management Security Cameras Workplace Strategies Proxy Server Cookies Education Monitors Cyber Monday Trend Micro Software as a Service Meta Tactics Hotspot Websites Mirgation Managing Costs Amazon Mobile Computing SSID User Nanotechnology Search eCommerce Surveillance Virtual Assistant Outsource IT SharePoint Addiction Best Practice Electronic Medical Records Language Chatbots Buisness Virtual Machine Environment Media Management Medical IT Lenovo Legal Screen Reader IT solutions Writing Distributed Denial of Service Reviews IP Address Development Transportation Small Businesses Service Level Agreement Business Growth Virtual Reality Computing Infrastructure Private Cloud Identity Hypervisor Displays Server Management PowerPoint Superfish Bookmark Recovery Identity Theft Smart Tech Shopping Cortana Optimization Employer/Employee Relationships Outsourcing Hard Drives Download Alt Codes Twitter Alerts Error Downtime PCI DSS Domains Navigation

Blog Archive