Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Smartphones AI VoIP Business Management communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Training Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Networking Budget Mobile Device Management Gmail Apple Managed Services Voice over Internet Protocol BYOD App Applications Access Control Computing Information Technology Hacker Office 365 Conferencing Avoiding Downtime Marketing How To BDR WiFi HIPAA Router 2FA Operating System Health Risk Management Help Desk Computers Retail Analytics Office Tips Website Augmented Reality Managed IT Services Storage Password Bring Your Own Device Healthcare Big Data Virtual Private Network Social Printer Paperless Office Free Resource Infrastructure Excel Project Management Cybercrime Windows 7 Microsoft 365 Monitoring Document Management Customer Service Solutions Scam Data loss Telephone Cooperation Firewall Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers The Internet of Things Physical Security Windows 11 Going Green Display Computer Repair Settings Vulnerabilities Wireless Supply Chain Printing Content Filtering User Tip Modem Mobile Security YouTube Processor Images 101 Customer Relationship Management Multi-Factor Authentication Cryptocurrency Mobility Machine Learning Smart Technology Hacking Virtual Desktop Presentation Data storage LiFi Saving Time Employees Maintenance Integration Wireless Technology Antivirus Data Privacy Outlook Managed IT Service Money Humor Downloads Holidays Licensing Word Data Storage Entertainment Sports Mouse Robot Video Conferencing Managed Services Provider Virtual Machines Professional Services Administration Telephone System Safety IT Management Cost Management Meetings VPN iPhone Displays Telework Cyber security Alt Codes Specifications Tech Application Downtime Microchip CES Network Management Internet Exlporer Communitications Tech Support Fraud Username Outsourcing Supply Chain Management Hosted Solution Monitors IBM FinTech Typing Black Friday Term Database Workplace IT Assessment Websites Hiring/Firing Flexibility Google Drive IT Technicians Value Knowledge SharePoint Proxy Server Organization Cookies Paperless Electronic Medical Records Cyber Monday Hotspot Competition 5G Digital Security Cameras Tactics Co-managed IT Smart Devices Technology Care Remote Working Google Docs Mirgation Memory Unified Communications Writing Experience Lenovo Nanotechnology Business Communications Data Breach Bitcoin Virtual Reality Google Play Running Cable Language Videos Server Management Addiction Scams Electronic Health Records Google Wallet Private Cloud Superfish Management Hybrid Work Identity Theft Chatbots Wasting Time User Screen Reader Human Resources Trend Micro Windows 8 Twitter Distributed Denial of Service Security Cameras Laptop Error Computing Infrastructure Service Level Agreement Cables Software as a Service Drones Identity Managing Costs Social Engineering IP Address Bookmark Smart Tech Google Apps eCommerce Remote Computing SSID Halloween Alerts Virtual Assistant Download IT Maintenance Surveillance Business Intelligence Tablet Virtual Machine Recovery Hard Drives Browsers Reviews Connectivity Shortcuts Hacks Alert Break Fix Medical IT Scary Stories File Sharing Transportation Dark Data Domains Fun Managed IT Upload Ransmoware Development Social Network Vendors Hypervisor Deep Learning How To Multi-Factor Security Refrigeration Shopping IoT Be Proactive Optimization Notifications Dark Web PowerPoint Travel Employer/Employee Relationships Education Public Speaking Trends Workforce Techology Customer Resource management Threats PCI DSS Google Maps Regulations Lithium-ion battery Google Calendar Navigation Entrepreneur Data Analysis Gig Economy Star Wars Workplace Strategies Mobile Computing Microsoft Excel Internet Service Provider Unified Threat Management Staff Teamwork Search Gamification Meta Unified Threat Management Amazon Regulations Compliance Social Networking Best Practice Legislation Evernote Buisness Undo Fileless Malware Memes Net Neutrality Legal Wearable Technology SQL Server IT solutions Network Congestion Content Outsource IT User Error Health IT Environment Financial Data Motherboard Media History Business Growth Comparison Directions Smartwatch Assessment IT Permissions Small Businesses Procurement Point of Sale Azure Cortana

Blog Archive