Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Chrome Mobile Device Management Tip of the week Budget Managed Services Gmail Voice over Internet Protocol Apple WiFi App Networking Computing Information Technology HIPAA Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Conferencing How To BDR Operating System 2FA Risk Management Computers Router Virtual Private Network Office Tips Analytics Website Health Augmented Reality Help Desk Storage Password Retail Bring Your Own Device Healthcare Big Data Managed IT Services Patch Management Windows 11 Save Money Microsoft 365 Cybercrime Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Solutions Excel Physical Security Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Going Green Cooperation Free Resource Social Project Management Windows 7 Content Filtering Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management YouTube Supply Chain Cryptocurrency IT Management Hacking VPN Employees Meetings Presentation Integration Virtual Desktop User Tip Data storage Modem LiFi Wireless Technology Computer Repair Mobile Security Processor Outlook Holidays Data Storage Money Smart Technology Word Humor Video Conferencing Data Privacy Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Sports Mouse Managed IT Service Maintenance Safety Antivirus Administration Downloads iPhone Licensing Vulnerabilities Entertainment Settings Images 101 Printing Wireless Organization Travel Social Networking Hosted Solution Legislation Small Businesses Typing Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Displays Wearable Technology Memory Knowledge Health IT Google Drive Unified Threat Management Motherboard Data Breach Competition Comparison Google Play Outsourcing Permissions Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time 5G Experience Google Docs Trend Micro Workplace Unified Communications Network Congestion Specifications Security Cameras Hiring/Firing Bitcoin Fraud Running Cable User User Error Microchip Internet Exlporer Software as a Service Username Google Wallet Managing Costs Paperless Point of Sale eCommerce Co-managed IT Black Friday SSID Database Surveillance Technology Care Windows 8 IP Address Virtual Assistant Laptop Network Management Drones Tech Support IT Technicians Virtual Machine Business Communications Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Scams Tactics Development Hybrid Work Hotspot Transportation Halloween Recovery Websites Mirgation Hypervisor Human Resources Hard Drives PowerPoint Shopping Nanotechnology Optimization Cables Domains Addiction Hacks Electronic Medical Records Language Employer/Employee Relationships Scary Stories SharePoint Management PCI DSS Chatbots Google Apps Refrigeration Navigation Fun Public Speaking Writing Distributed Denial of Service Lenovo Gig Economy Screen Reader IT Maintenance Deep Learning Service Level Agreement Internet Service Provider Business Intelligence Lithium-ion battery Virtual Reality Computing Infrastructure Teamwork Entrepreneur Server Management Regulations Compliance Private Cloud Identity Shortcuts Education Evernote Superfish Bookmark Identity Theft Smart Tech Memes Ransmoware Download Net Neutrality Vendors Mobile Computing Twitter Alerts SQL Server Financial Data Error History Be Proactive Undo Search Social Engineering Break Fix Browsers Smartwatch Connectivity IT Workforce Best Practice Upload Procurement Threats Remote Computing Azure Buisness Social Network Telework Legal Cyber security Workplace Strategies IT solutions Multi-Factor Security Tech Business Growth Dark Web CES Tablet IoT Communitications Meta Trends Supply Chain Management Amazon Alert Application Cortana Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Outsource IT Alt Codes IBM How To Microsoft Excel Data Analysis Star Wars IT Assessment Gamification Flexibility Environment Notifications Staff Value Media Downtime

Blog Archive