Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device AI Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Automation Artificial Intelligence Facebook Holiday Covid-19 Gadgets Cloud Computing Compliance Training Server IT Support Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Blockchain Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Data Security Managed Services Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Voice over Internet Protocol Employer-Employee Relationship BYOD Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications Password Managed IT Services How To BDR Conferencing Computing Physical Security Information Technology Hacker Health Office Tips Analytics Website Augmented Reality Router Retail Storage Bring Your Own Device 2FA Help Desk Big Data Healthcare Operating System Virtual Private Network Risk Management Computers Paperless Office Microsoft 365 Infrastructure Solutions Document Management Firewall Windows 11 Scam Data loss Monitoring The Internet of Things Excel Going Green Patch Management Social Managed IT Service Remote Workers Save Money Remote Monitoring Vulnerability Telephone End of Support Vendor Management Cybercrime Customer Service Cooperation Free Resource Display Project Management Windows 7 Printer Mobility Virtual Desktop Telephone System Multi-Factor Authentication Cost Management Data storage LiFi Wireless Technology Outlook Machine Learning Money Employees Word Integration Humor User Tip Modem Processor Mobile Security Maintenance Antivirus Sports Holidays Mouse Safety Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Robot Settings Downloads Printing Wireless iPhone Content Filtering IT Management Customer Relationship Management Licensing VPN YouTube Meetings Vulnerabilities Entertainment Cryptocurrency Data Privacy Hacking Computer Repair Presentation Images 101 Legislation Shortcuts Google Wallet Organization Monitors Social Networking Smart Devices Ransmoware Fileless Malware Digital Security Cameras Windows 8 IP Address Laptop Websites Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Drones Health IT Motherboard Data Breach Electronic Medical Records Assessment Electronic Health Records Permissions Workforce SharePoint Directions Videos Halloween Recovery Wasting Time Threats Specifications Security Cameras Workplace Strategies Lenovo Hard Drives Writing Trend Micro Virtual Reality Internet Exlporer Software as a Service Fraud Meta Domains Microchip Hacks Server Management Scary Stories Private Cloud Username Managing Costs Amazon Black Friday SSID Superfish Identity Theft Refrigeration Fun eCommerce Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Public Speaking Lithium-ion battery Error IT Technicians Virtual Machine Environment Media Cookies Cyber Monday Medical IT Education Proxy Server Reviews Social Engineering Entrepreneur Remote Computing Tactics Development Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Tablet Undo Shopping Search Alert Addiction Language Employer/Employee Relationships Outsourcing Best Practice Navigation Managed IT Buisness File Sharing Management PCI DSS Dark Data Chatbots Screen Reader Distributed Denial of Service Workplace Legal IT solutions Gig Economy How To Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Business Growth Evernote Paperless Travel Application Regulations Compliance Identity Smart Tech Memes Co-managed IT Techology Google Maps Bookmark Cortana IBM Download Net Neutrality Alerts SQL Server Technology Care Alt Codes Business Communications Downtime Unified Threat Management Financial Data History Connectivity IT Break Fix Scams Unified Threat Management Hosted Solution Browsers Smartwatch Typing Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Network Congestion Cyber security Knowledge IoT Communitications Dark Web Cables Google Drive User Error Competition CES Trends Supply Chain Management Google Calendar Term Google Apps Point of Sale Customer Resource management FinTech 5G Regulations Experience Star Wars IT Assessment Microsoft Excel IT Maintenance Google Docs Unified Communications Data Analysis Bitcoin Network Management Running Cable Tech Support User Gamification Flexibility Staff Value Business Intelligence

Blog Archive