Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Operating System Router 2FA Computers Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Remote Monitoring End of Support Vulnerability Customer Service Windows 11 Vendor Management Solutions Cybercrime Physical Security Excel Display Printer Paperless Office Infrastructure Monitoring Document Management Firewall Remote Workers Telephone Scam The Internet of Things Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Settings Wireless Printing Content Filtering IT Management Hacking YouTube Meetings Presentation VPN Employees Supply Chain Integration Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Word Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Data Privacy Managed IT Service Maintenance Safety Downloads Antivirus Sports Mouse iPhone Licensing Entertainment Administration Vulnerabilities Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Customer Relationship Management Alt Codes Content Remote Working Outsource IT Wearable Technology Memory Environment Downtime Unified Threat Management Motherboard Data Breach Competition Media Comparison Google Play Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Typing Small Businesses Wasting Time Displays Trend Micro Network Congestion Specifications Security Cameras Google Drive User Error Microchip Internet Exlporer Software as a Service Fraud Knowledge User Username Outsourcing Managing Costs Point of Sale eCommerce Black Friday SSID 5G Google Docs Unified Communications Database Surveillance IP Address Workplace Virtual Assistant Experience Bitcoin Network Management Hiring/Firing Tech Support IT Technicians Virtual Machine Running Cable Cookies Paperless Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Co-managed IT Hotspot Transportation Recovery Windows 8 Technology Care Websites Mirgation Hypervisor Laptop Hard Drives Nanotechnology Optimization Domains Business Communications PowerPoint Drones Shopping SharePoint Addiction Scams Electronic Medical Records Language Employer/Employee Relationships Refrigeration Navigation Management PCI DSS Hybrid Work Chatbots Halloween Screen Reader Public Speaking Human Resources Writing Distributed Denial of Service Lenovo Gig Economy Service Level Agreement Internet Service Provider Lithium-ion battery Cables Virtual Reality Computing Infrastructure Teamwork Evernote Entrepreneur Hacks Server Management Regulations Compliance Private Cloud Identity Scary Stories Identity Theft Smart Tech Memes Google Apps Fun Superfish Bookmark Deep Learning Download Net Neutrality IT Maintenance Twitter Alerts SQL Server Undo Financial Data Business Intelligence Error History Browsers Smartwatch Education Connectivity IT Shortcuts Social Engineering Break Fix Upload Procurement Ransmoware Remote Computing Azure Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework Vendors CES Tablet IoT Communitications Be Proactive Dark Web Search Best Practice Trends Supply Chain Management Workforce Alert Application Buisness File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Threats Legal Data Analysis IT solutions Star Wars IT Assessment IBM Workplace Strategies How To Microsoft Excel Business Growth Gamification Flexibility Meta Notifications Staff Value Travel Social Networking Legislation Organization Amazon Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana

Blog Archive