Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords AI Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Covid-19 Training Gadgets Compliance Cloud Computing Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Blockchain Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Managed Services Apps Data Security Mobile Device Management Chrome Budget Gmail Tip of the week WiFi Apple Voice over Internet Protocol App Networking Employer-Employee Relationship BYOD Avoiding Downtime Physical Security Office 365 Marketing HIPAA Access Control Applications Password Conferencing Managed IT Services How To BDR Computing Hacker Information Technology Website Virtual Private Network Analytics Office Tips Augmented Reality Router Health Storage Bring Your Own Device Help Desk Retail Big Data Healthcare 2FA Operating System Computers Risk Management Solutions Display Printer Paperless Office Infrastructure Firewall Document Management The Internet of Things Monitoring Scam Social Data loss Remote Workers Going Green Windows 11 Managed IT Service Telephone Excel Cybercrime Customer Service Free Resource Patch Management Save Money Project Management Windows 7 Remote Monitoring Cooperation End of Support Vulnerability Vendor Management Microsoft 365 Telephone System VPN Meetings Virtual Desktop LiFi Cost Management Data storage Data Privacy Employees Computer Repair Outlook Integration Word Money Humor User Tip Modem Processor Holidays Mobile Security Machine Learning Sports Data Storage Safety Mouse Video Conferencing Administration Managed Services Provider Smart Technology Maintenance Virtual Machines Professional Services Antivirus Saving Time iPhone Settings Wireless Customer Relationship Management Downloads Printing Supply Chain Content Filtering Vulnerabilities Licensing Robot YouTube Entertainment Hacking Cryptocurrency Images 101 Presentation Multi-Factor Authentication Mobility IT Management Wireless Technology Remote Working Network Congestion Social Networking IP Address Memory Legislation Google Wallet Scams Hybrid Work Fileless Malware Data Breach Google Play User Error Wearable Technology Windows 8 Videos Human Resources Laptop Content Electronic Health Records Health IT Motherboard Wasting Time Comparison Recovery Drones Cables Point of Sale Directions Assessment Trend Micro Permissions Hard Drives Security Cameras Domains Network Management Google Apps Tech Support Halloween Software as a Service Monitors Managing Costs Specifications IT Maintenance Business Intelligence Microchip Internet Exlporer eCommerce Fraud Refrigeration SSID Public Speaking Virtual Assistant Hacks Shortcuts Websites Scary Stories Username Surveillance Fun Lithium-ion battery Virtual Machine Black Friday Ransmoware SharePoint Entrepreneur Vendors Deep Learning Reviews Electronic Medical Records Database Medical IT IT Technicians Transportation Be Proactive Development Education Proxy Server Writing Cookies Hypervisor Cyber Monday Lenovo Workforce Threats Shopping Virtual Reality Tactics Optimization Hotspot Undo PowerPoint Mirgation Employer/Employee Relationships Server Management Mobile Computing Workplace Strategies Private Cloud Meta Identity Theft PCI DSS Search Nanotechnology Navigation Superfish Amazon Best Practice Gig Economy Twitter Addiction Language Internet Service Provider Chatbots Teamwork Error Buisness Management Outsource IT IT solutions Regulations Compliance Social Engineering Screen Reader Distributed Denial of Service Application Evernote Legal Environment Business Growth Media Remote Computing Service Level Agreement Memes Computing Infrastructure Net Neutrality Identity IBM SQL Server Small Businesses Tablet Bookmark Financial Data Cortana Smart Tech History Displays Alt Codes Smartwatch Alert Download IT Alerts Procurement Dark Data Azure Managed IT File Sharing Downtime Outsourcing Hosted Solution Browsers Telework How To Connectivity Cyber security Break Fix Tech Typing CES Notifications Upload Communitications Competition Supply Chain Management Multi-Factor Security Workplace Travel Social Network Hiring/Firing Google Maps FinTech Knowledge IoT Dark Web Term Techology Google Drive Paperless Trends IT Assessment Flexibility 5G Regulations Value Google Calendar User Co-managed IT Unified Threat Management Customer Resource management Technology Care Unified Communications Data Analysis Organization Experience Star Wars Microsoft Excel Unified Threat Management Google Docs Bitcoin Digital Security Cameras Business Communications Running Cable Gamification Smart Devices Staff

Blog Archive