Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Managed Service Android Upgrade Data Recovery VoIP Business Management AI Smartphones communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Automation Artificial Intelligence Cloud Computing Holiday Covid-19 Gadgets Training Managed Service Provider Remote Work Server Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office Apple Networking Mobile Device Management App Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol How To BDR WiFi Computing Information Technology HIPAA Applications Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing Healthcare Managed IT Services Operating System Big Data Virtual Private Network Risk Management Router Health Analytics Office Tips 2FA Computers Augmented Reality Help Desk Retail Storage Password Website Bring Your Own Device Telephone Firewall Going Green Patch Management Cooperation Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Cybercrime Microsoft 365 Physical Security Social Solutions Display Printer Paperless Office Infrastructure Windows 11 Customer Service Document Management Monitoring Excel Scam Remote Workers Data loss Downloads Administration Word iPhone Licensing Entertainment Vulnerabilities Robot Data Privacy Images 101 Settings Safety Printing Wireless Multi-Factor Authentication Mobility Telephone System Content Filtering Cost Management IT Management VPN YouTube Meetings Cryptocurrency Employees Computer Repair Integration Virtual Desktop Modem Data storage Customer Relationship Management LiFi User Tip Processor Mobile Security Holidays Outlook Hacking Machine Learning Money Presentation Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Wireless Technology Saving Time Virtual Machines Professional Services Maintenance Antivirus Sports Mouse Managed IT Service Mobile Computing Hard Drives Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Domains Tablet Financial Data Search Browsers Smartwatch Alert Connectivity IT Break Fix Scams Best Practice Managed IT Refrigeration Buisness File Sharing Upload Procurement Dark Data Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Legal Public Speaking IT solutions Social Network Telework How To CES Notifications IoT Communitications Dark Web Cables Lithium-ion battery Business Growth Travel Entrepreneur Trends Supply Chain Management Regulations Google Calendar Term Google Apps Techology Google Maps Customer Resource management FinTech Cortana Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Alt Codes Undo Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Unified Threat Management Hosted Solution Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Typing Content Remote Working Network Congestion Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Google Drive User Error Health IT Knowledge Application Directions Videos Assessment Electronic Health Records Permissions Workforce Point of Sale 5G Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Google Docs IBM Unified Communications Experience Microchip Running Cable Tech Support Internet Exlporer Software as a Service Fraud Meta Bitcoin Network Management Google Wallet Username Monitors Managing Costs Amazon eCommerce Black Friday SSID Laptop Websites Database Surveillance Virtual Assistant Outsource IT Windows 8 Media Drones Competition IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT SharePoint Proxy Server Reviews Electronic Medical Records Halloween Tactics Development Hotspot Transportation Small Businesses Lenovo Writing Mirgation Hypervisor Displays Shopping Virtual Reality Nanotechnology Optimization PowerPoint User Hacks Server Management Scary Stories Private Cloud Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Superfish Identity Theft Management PCI DSS Fun Gig Economy Twitter Screen Reader Distributed Denial of Service Workplace IP Address Deep Learning Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Education Regulations Compliance Social Engineering Bookmark Remote Computing Smart Tech Memes Co-managed IT Recovery

Blog Archive