Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

ALERT: Log4j is the Worst Cybersecurity News in a Long Time

Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest cybersecurity risks we’ve ever known, and your business needs to act immediately to make sure you aren’t at risk.

Continue reading
0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

Continue reading
0 Comments

Update Google Chrome, Says Homeland Security

Update Google Chrome, Says Homeland Security

Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we worry about things like that more. However, we’re hoping that a warning from Homeland Security to update Google Chrome will have a little more weight.

Continue reading
0 Comments

Is This Bug in Your System? Chances Are, It Was!

Is This Bug in Your System? Chances Are, It Was!

Cybersecurity is challenging enough… you don’t need issues coming from one of your key applications. However, since a bug was found in some of the most popular Internet browsers today—potentially risking billions of people’s data security—you could very well see these kinds of issues. Let’s go over this vulnerability, and what you can do to address it.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet IT Support Malware Privacy Google Computer Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Backup Android Managed Service VoIP Business Management Smartphones Upgrade communications Mobile Devices Disaster Recovery Data Recovery Browser Social Media Microsoft Office Windows Managed IT Services Current Events Network Remote Productivity Tech Term Internet of Things Facebook Automation Artificial Intelligence AI Cloud Computing Covid-19 Holiday Gadgets Managed Service Provider Remote Work Miscellaneous Server Outsourced IT Information Compliance Encryption Training Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Business Technology IT Support Bandwidth Mobile Office Data Security Vendor Two-factor Authentication Apps Apple Networking Mobile Device Management App Gmail BYOD Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Marketing How To BDR WiFi HIPAA Computing Applications Information Technology Access Control Office 365 Tip of the week Hacker Conferencing Avoiding Downtime Website Bring Your Own Device Managed IT Services Operating System Router Big Data Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Computers Retail Storage Healthcare Password Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Cybercrime Physical Security Social Display Printer Paperless Office Windows 11 Infrastructure 2FA Monitoring Customer Service Excel Document Management Remote Workers Telephone iPhone Mouse Licensing Administration Vulnerabilities Word Entertainment Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Safety Wireless Printing Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Customer Relationship Management Data Storage Smart Technology Supply Chain Outlook Video Conferencing Hacking Machine Learning Managed Services Provider Virtual Machines Professional Services Presentation Money Saving Time Humor Managed IT Service Wireless Technology Maintenance Downloads Antivirus Sports Education Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Recovery Multi-Factor Security Tech Human Resources Hard Drives Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Cables Domains CES Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Refrigeration Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Lithium-ion battery Legislation Shortcuts Entrepreneur Organization Travel Social Networking Google Maps Smart Devices Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Undo Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Typing Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Meta Google Drive User Error Microchip Application Username Managing Costs Amazon 5G Black Friday SSID Point of Sale eCommerce Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT IBM Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Windows 8 Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Competition Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Halloween Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Co-managed IT Superfish Bookmark Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care IP Address Business Communications Financial Data Error History

Blog Archive