Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Email Phishing Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Workplace Strategy Small Business Microsoft Data Backup Communication Smartphone Business Management VoIP Smartphones Android Saving Money Mobile Devices communications Data Recovery Passwords Backup Managed Service Managed IT Services Browser Social Media Microsoft Office Upgrade Disaster Recovery Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Remote Work Miscellaneous Gadgets Server Managed Service Provider Windows Outsourced IT Current Events Information Employee/Employer Relationship Encryption Spam Productivity Holiday Windows 10 Data Management Business Continuity Government Compliance Office AI Virtualization Wi-Fi Training Blockchain Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Mobile Office Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol Mobile Device Management Chrome Vendor Applications WiFi How To BDR Conferencing BYOD Computing Hacker Information Technology Avoiding Downtime Access Control Office 365 Tip of the week Retail Storage Password Bring Your Own Device Big Data Help Desk Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Website Marketing Health Office Tips Analytics HIPAA Router Augmented Reality Windows 11 The Internet of Things Scam Data loss 2FA Monitoring Social Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Vulnerability Telephone End of Support Vendor Management Customer Service Cybercrime Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions IT Support Firewall Document Management Modem User Tip Processor Mobile Security Safety Maintenance Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Robot Managed IT Service Customer Relationship Management Settings Downloads Printing Wireless Content Filtering iPhone Hacking IT Management Licensing Presentation VPN YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Wireless Technology Images 101 Computer Repair Multi-Factor Authentication Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Word Outlook Machine Learning Money Employees Integration Humor Hacks Server Management Entrepreneur Scary Stories Private Cloud Username Managing Costs Amazon eCommerce Black Friday SSID Superfish Identity Theft Fun Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Media Undo Error IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Education Proxy Server Reviews Social Engineering Remote Computing Tactics Development Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Tablet Shopping Search Alert Addiction Language Employer/Employee Relationships Outsourcing Application Best Practice Navigation Managed IT Buisness File Sharing Management PCI DSS Dark Data Chatbots Screen Reader Distributed Denial of Service Workplace IBM Legal IT solutions Gig Economy How To Business Growth Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Travel Regulations Compliance Identity Cortana Smart Tech Memes Co-managed IT Techology Google Maps Bookmark Alt Codes Download Net Neutrality Alerts SQL Server Technology Care Business Communications Competition Downtime Unified Threat Management Financial Data History Connectivity IT Break Fix Scams Unified Threat Management Hosted Solution Browsers Smartwatch Typing Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Network Congestion Cyber security CES Knowledge Physical Security IoT Communitications Dark Web Cables Google Drive User Error User Trends Supply Chain Management Regulations Google Calendar Term Google Apps Point of Sale Customer Resource management FinTech 5G Data Analysis Experience Star Wars IT Assessment Microsoft Excel IT Maintenance IP Address Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Google Wallet Organization Monitors Fileless Malware Digital Security Cameras Smart Devices Ransmoware Recovery Hard Drives Windows 8 Laptop Websites Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Domains Drones Health IT Directions Videos Electronic Medical Records Assessment Electronic Health Records Permissions Workforce SharePoint Refrigeration Halloween Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Public Speaking Lenovo Writing Microchip Virtual Reality Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery

Blog Archive