Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Data Recovery Android AI Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Holiday Automation Facebook Information Miscellaneous Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Blockchain Virtualization Wi-Fi Mobile Office Vendor Apps Data Security Two-factor Authentication BYOD Chrome Budget Mobile Device Management Gmail Apple Managed Services Tip of the week Voice over Internet Protocol WiFi App Employer-Employee Relationship Networking Office 365 Avoiding Downtime Conferencing Marketing Access Control HIPAA Applications Computing How To Information Technology BDR Hacker Analytics Office Tips Augmented Reality Website 2FA Virtual Private Network Storage Password Health Bring Your Own Device Healthcare Retail Big Data Router Operating System Managed IT Services Risk Management Help Desk Computers Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Physical Security Telephone Display Excel Printer Firewall Cooperation Paperless Office Infrastructure Remote Workers Document Management The Internet of Things Going Green Social Free Resource Scam Data loss Project Management Cybercrime Windows 7 Microsoft 365 Customer Service Monitoring Patch Management Solutions Save Money Employees Saving Time Integration Wireless Technology Outlook Managed IT Service IT Management VPN Meetings Money Humor Supply Chain Downloads Holidays Word Licensing Data Storage Computer Repair Entertainment Sports Video Conferencing Mouse Managed Services Provider Virtual Machines Professional Services Administration Safety Telephone System Cost Management Machine Learning Data Privacy iPhone Maintenance Settings Wireless Antivirus Printing Vulnerabilities Content Filtering User Tip Modem Mobile Security Images 101 Processor YouTube Customer Relationship Management Multi-Factor Authentication Cryptocurrency Mobility Smart Technology Hacking Virtual Desktop Presentation Robot Data storage LiFi Distributed Denial of Service Outsource IT Trend Micro Windows 8 Security Cameras Laptop Screen Reader Service Level Agreement Computing Infrastructure Environment Software as a Service Unified Threat Management Drones Media IP Address Managing Costs Identity Unified Threat Management Small Businesses eCommerce Bookmark SSID Halloween Smart Tech Virtual Assistant Network Congestion Download Alerts Displays Surveillance Virtual Machine Recovery User Error Break Fix Reviews Outsourcing Hard Drives Hacks Browsers Medical IT Scary Stories Connectivity Transportation Upload Fun Development Point of Sale Domains Workplace Hypervisor Deep Learning Social Network Multi-Factor Security IoT Dark Web Shopping Network Management Hiring/Firing Optimization Tech Support Refrigeration PowerPoint Paperless Employer/Employee Relationships Monitors Education Trends Public Speaking Google Calendar PCI DSS Lithium-ion battery Co-managed IT Customer Resource management Navigation Regulations Star Wars Microsoft Excel Gig Economy Technology Care Websites Mobile Computing Data Analysis Entrepreneur Business Communications Teamwork Gamification Search Staff Internet Service Provider Legislation Regulations Compliance Scams Electronic Medical Records Best Practice Evernote Social Networking SharePoint Hybrid Work Memes Undo Fileless Malware Buisness Human Resources SQL Server Writing IT solutions Content Wearable Technology Lenovo Net Neutrality Legal Comparison Financial Data Cables History Virtual Reality Business Growth Health IT Motherboard Assessment Permissions Smartwatch Server Management IT Private Cloud Directions Google Apps Azure Cortana Superfish Procurement Identity Theft Specifications Telework IT Maintenance Cyber security Twitter Application Alt Codes Tech Internet Exlporer Fraud CES Business Intelligence Communitications Error Microchip Downtime Shortcuts Social Engineering Hosted Solution Username Supply Chain Management IBM Black Friday FinTech Ransmoware Remote Computing Typing Term Database Vendors IT Assessment Google Drive Be Proactive Value Knowledge IT Technicians Flexibility Tablet Cyber Monday Organization Workforce Alert Proxy Server Cookies Tactics 5G Hotspot Digital Security Cameras Managed IT Threats Smart Devices File Sharing Competition Dark Data Google Docs Workplace Strategies Memory How To Unified Communications Experience Mirgation Remote Working Meta Data Breach Notifications Bitcoin Google Play Running Cable Nanotechnology Addiction Language Videos Amazon Electronic Health Records Travel Google Wallet Google Maps Wasting Time User Management Chatbots Techology

Blog Archive