Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Facebook Holiday Miscellaneous Artificial Intelligence Automation Cloud Computing Covid-19 Training Gadgets Compliance Managed Service Provider Remote Work Server IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Virtualization Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Vendor Apps Mobile Device Management Gmail BYOD WiFi Chrome Employer-Employee Relationship Tip of the week Budget Managed Services Voice over Internet Protocol Apple App Networking How To Marketing BDR Computing Information Technology HIPAA Applications Office 365 Access Control Conferencing Hacker Avoiding Downtime Website Operating System Risk Management Physical Security Router Virtual Private Network Big Data Analytics Office Tips Health Augmented Reality 2FA Help Desk Storage Password Bring Your Own Device Retail Computers Healthcare Managed IT Services Going Green Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Cybercrime Remote Monitoring Firewall End of Support Microsoft 365 Vulnerability Vendor Management Solutions The Internet of Things Display Printer Paperless Office Social Infrastructure Windows 11 Monitoring Document Management Excel Customer Service Remote Workers Scam Data loss Telephone Entertainment Vulnerabilities Settings Data Privacy Wireless Printing Word Robot Images 101 Content Filtering Multi-Factor Authentication Mobility YouTube Telephone System Cost Management Cryptocurrency IT Management Safety VPN Meetings Virtual Desktop Employees LiFi Integration Data storage Computer Repair User Tip Modem Processor Mobile Security Outlook Holidays Money Humor Data Storage Customer Relationship Management Smart Technology Supply Chain Machine Learning Video Conferencing Managed Services Provider Sports Saving Time Virtual Machines Professional Services Mouse Hacking Presentation Maintenance Managed IT Service Antivirus Administration Wireless Technology Downloads iPhone Licensing Cyber security Multi-Factor Security Tech Human Resources Alert Social Network Telework Dark Data CES Cortana IoT Communitications Dark Web Cables Managed IT Recovery File Sharing Hard Drives Alt Codes How To Trends Supply Chain Management Regulations Domains Google Calendar Term Google Apps Notifications Downtime Customer Resource management FinTech Hosted Solution Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Refrigeration Google Maps Typing Gamification Flexibility Staff Value Business Intelligence Techology Social Networking Public Speaking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Knowledge Smart Devices Lithium-ion battery Ransmoware Google Drive Unified Threat Management Entrepreneur Content Remote Working Wearable Technology Memory Vendors Unified Threat Management 5G Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Communications Network Congestion Directions Videos Experience Assessment Electronic Health Records Permissions Workforce Google Docs User Error Undo Bitcoin Running Cable Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Point of Sale Microchip Internet Exlporer Software as a Service Fraud Meta Windows 8 Laptop Username Managing Costs Amazon eCommerce Black Friday SSID Network Management Drones Tech Support Monitors Database Surveillance Virtual Assistant Outsource IT Application IT Technicians Virtual Machine Environment Media Halloween Proxy Server Reviews Cookies IBM Cyber Monday Medical IT Websites Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays SharePoint Hacks Electronic Medical Records Scary Stories Shopping Fun Nanotechnology Optimization PowerPoint Deep Learning Writing Addiction Language Employer/Employee Relationships Outsourcing Lenovo Chatbots Competition Navigation Virtual Reality Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Server Management Private Cloud Education Identity Theft Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Superfish Identity Evernote Paperless Mobile Computing Twitter Regulations Compliance Bookmark Search Smart Tech Memes Co-managed IT User Error Best Practice Social Engineering Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Remote Computing Buisness Financial Data Browsers Smartwatch Connectivity IT IP Address Break Fix Scams Legal IT solutions Tablet Business Growth Upload Procurement Azure Hybrid Work

Blog Archive