Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Network Security Hardware User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media AI Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Information Facebook Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications How To WiFi BDR Conferencing Virtual Private Network Risk Management Computers Health Website Office Tips Analytics Augmented Reality Router Retail Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Physical Security Customer Service Display Cooperation Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Solutions Document Management Firewall Scam Data loss Windows 11 Monitoring The Internet of Things Excel Going Green Patch Management Social Save Money Remote Monitoring Vulnerability Remote Workers End of Support Vendor Management Telephone Cybercrime VPN YouTube Meetings iPhone Licensing Cryptocurrency Entertainment Hacking Vulnerabilities Presentation Computer Repair Data Privacy Images 101 Virtual Desktop Wireless Technology Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Outlook Machine Learning Money Word Humor Employees Integration Maintenance Antivirus User Tip Sports Modem Mobile Security Mouse Processor Safety Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Robot Professional Services Settings Printing Wireless Managed IT Service Content Filtering IT Management Customer Relationship Management Downloads Browsers Smartwatch Connectivity IT Network Congestion Break Fix Scams Knowledge Azure Hybrid Work Google Drive User Error Upload Procurement Competition Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Point of Sale IoT Communitications 5G Dark Web Cables Experience Google Docs Unified Communications Trends Supply Chain Management Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Regulations User Google Calendar Term Google Apps Google Wallet Data Analysis Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance Staff Value Business Intelligence Gamification Flexibility Windows 8 Organization IP Address Laptop Websites Social Networking Legislation Shortcuts Drones Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors SharePoint Health IT Halloween Motherboard Data Breach Recovery Comparison Google Play Be Proactive Permissions Workforce Lenovo Directions Videos Assessment Electronic Health Records Hard Drives Writing Domains Virtual Reality Wasting Time Threats Hacks Server Management Scary Stories Private Cloud Trend Micro Specifications Security Cameras Workplace Strategies Fun Fraud Meta Superfish Microchip Identity Theft Internet Exlporer Software as a Service Refrigeration Deep Learning Username Public Speaking Twitter Managing Costs Amazon Lithium-ion battery Error eCommerce Black Friday SSID Social Engineering Virtual Assistant Outsource IT Entrepreneur Education Database Surveillance Remote Computing IT Technicians Virtual Machine Environment Media Mobile Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Search Hotspot Transportation Small Businesses Tablet Tactics Development Undo Best Practice Alert Mirgation Hypervisor Displays Managed IT Shopping Buisness File Sharing Nanotechnology Optimization Dark Data PowerPoint How To Language Employer/Employee Relationships Outsourcing Legal IT solutions Addiction Business Growth Management PCI DSS Notifications Chatbots Navigation Gig Economy Travel Screen Reader Application Distributed Denial of Service Workplace Cortana Computing Infrastructure Teamwork Hiring/Firing Techology Google Maps Service Level Agreement Internet Service Provider Alt Codes Regulations Compliance IBM Identity Evernote Paperless Bookmark Downtime Unified Threat Management Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Unified Threat Management Hosted Solution Download Net Neutrality Typing Financial Data History Business Communications

Blog Archive