Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Hackers Cloud Hosted Solutions Productivity Software Privacy Computer Data Email Network Security Internet Hardware Innovation User Tips Malware IT Support Business Efficiency Data Backup Tech Term Collaboration IT Services Google Mobile Devices Microsoft Business Management Workplace Tips communications Android Communication Small Business Cybersecurity Smartphones Social Media Data Recovery Smartphone Server Upgrade Backup Browser Internet of Things VoIP Phishing Microsoft Office Outsourced IT Data Management Artificial Intelligence Cloud Computing Windows 10 Network Productivity Managed Service Provider Windows 10 Ransomware Facebook Managed IT Services Two-factor Authentication Automation Mobile Device Quick Tips Government Users App Encryption Passwords Information Gmail Managed Service Miscellaneous Disaster Recovery Apple Apps Spam Access Control Business Technology Holiday Computing Windows Office 365 Saving Money Bandwidth Managed IT Services Employer-Employee Relationship Office Tips Applications Augmented Reality Business Continuity Big Data Gadgets Printer Healthcare Windows 7 Conferencing Infrastructure BYOD Going Green Customer Service Paperless Office Tip of the week Computers Hacker Covid-19 Vendor Management Office Cybercrime Cooperation Wi-Fi Website Mobile Office Scam Data loss Blockchain Mobile Device Management Firewall Vendor Analytics IT Support BDR The Internet of Things Vulnerability Retail WiFi Storage Social Bring Your Own Device Virtual Private Network Administration Saving Time Current Events Customer Relationship Management Meetings Managed IT Service Telephone Robot Save Money Hacking Settings Licensing Presentation Printing End of Support Operating System Downloads Content Filtering Wireless Technology Integration Avoiding Downtime Document Management Remote Work Maintenance Antivirus Information Technology Risk Management Display Cost Management Virtual Desktop Networking Data storage LiFi HIPAA Data Security Router Managed Services Provider Patch Management Professional Services Money Safety Chrome Modem Remote Monitoring Mobile Security Managed Services Humor Processor Voice over Internet Protocol Budget IT Management Virtualization iPhone Sports Monitoring VPN Mouse Help Desk Addiction Language Alert Cyber security Evernote Vulnerabilities Mobile Computing IBM Management Chatbots Unified Threat Management Communitications Supply Chain Management Distributed Denial of Service Free Resource Search Screen Reader Service Level Agreement Network Management Computing Infrastructure Project Management Best Practice Buisness Identity IT Assessment Dark Data Flexibility How To Value Legal IT solutions Bookmark Smart Tech Download Alerts Multi-Factor Authentication Mobility Business Growth Tech Competition Microsoft 365 Smart Devices Remote Working Break Fix Memory Browsers SharePoint Cortana Connectivity Upload Data Breach Google Play Alt Codes Term Solutions Downtime Social Network Lenovo User Wireless Compliance Electronic Health Records Dark Web Wasting Time Hosted Solution Entertainment IoT Trends Server Management Tech Support Trend Micro Security Cameras Typing IP Address YouTube Customer Resource management Superfish Regulations Software as a Service Network Congestion Microsoft Excel Computer Repair Managing Costs Google Drive Data Analysis Multi-Factor Security Knowledge Star Wars Gamification Staff Websites eCommerce SSID Cryptocurrency Virtual Assistant Telephone System Recovery 5G Social Networking Identity Theft Marketing Surveillance Employee/Employer Relationship Health Virtual Machine Google Docs Unified Communications Fileless Malware Google Calendar Hard Drives Experience Bitcoin Domains Running Cable Content Word Wearable Technology Machine Learning Holidays Medical IT Monitors Transportation Google Wallet Health IT Motherboard Development Assessment How To Permissions Electronic Medical Records Hypervisor Directions Legislation Refrigeration Windows 8 Public Speaking Laptop Managed IT Private Cloud Optimization PowerPoint Specifications Employer/Employee Relationships Drones Lithium-ion battery Tablet Video Conferencing Internet Exlporer Entrepreneur Fraud Virtual Reality Outlook Microchip Comparison Halloween Username Error Virtual Machines Internet Service Provider Black Friday Writing Teamwork User Tip Techology Database Twitter Undo Hacks Scary Stories IT Technicians Memes Net Neutrality Cyber Monday SQL Server Proxy Server Unified Threat Management Fun Cookies Google Maps Tactics Hotspot Remote Computing History Deep Learning Navigation Password Mirgation Travel IT Procurement Smart Technology Social Engineering Azure Education User Error Application Nanotechnology