Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Cloud Computing Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Managed Services Tip of the week Voice over Internet Protocol Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Router Operating System Computers Virtual Private Network Risk Management 2FA Help Desk Website Health Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Cybercrime Physical Security Windows 11 Display Monitoring Printer Paperless Office Infrastructure Excel Remote Workers Firewall Document Management Telephone Cooperation Free Resource The Internet of Things Scam Project Management Data loss Windows 7 Social Microsoft 365 Going Green Patch Management Solutions Save Money Employees Settings Wireless Printing Integration Content Filtering User Tip Hacking Modem IT Management Processor Presentation VPN Mobile Security YouTube Meetings Holidays Cryptocurrency Wireless Technology Computer Repair Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Saving Time Virtual Machines Professional Services Word Outlook Managed IT Service Machine Learning Money Humor Downloads iPhone Licensing Safety Maintenance Entertainment Antivirus Vulnerabilities Sports Data Privacy Mouse Images 101 Administration Telephone System Multi-Factor Authentication Mobility Cost Management Robot Customer Relationship Management Trend Micro Alt Codes Specifications Security Cameras Workplace Strategies Microchip Competition Internet Exlporer Software as a Service Fraud Meta Downtime Unified Threat Management Managing Costs Amazon Hosted Solution Username Unified Threat Management eCommerce Typing Black Friday SSID Network Congestion Database Surveillance Virtual Assistant Outsource IT User IT Technicians Virtual Machine Environment Media Knowledge Google Drive User Error Proxy Server Reviews Cookies Cyber Monday Medical IT 5G Tactics Development Hotspot Transportation Small Businesses Point of Sale Mirgation Hypervisor Displays Unified Communications Experience IP Address Google Docs Shopping Nanotechnology Optimization Bitcoin Network Management PowerPoint Running Cable Tech Support Monitors Addiction Google Wallet Language Employer/Employee Relationships Outsourcing Management PCI DSS Recovery Chatbots Navigation Gig Economy Hard Drives Screen Reader Windows 8 Distributed Denial of Service Workplace Laptop Websites Computing Infrastructure Teamwork Hiring/Firing Domains Service Level Agreement Internet Service Provider Drones Regulations Compliance SharePoint Identity Evernote Paperless Electronic Medical Records Bookmark Refrigeration Smart Tech Memes Co-managed IT Halloween Alerts SQL Server Technology Care Writing Public Speaking Download Net Neutrality Lenovo Lithium-ion battery Financial Data History Business Communications Virtual Reality Browsers Smartwatch Connectivity IT Hacks Server Management Entrepreneur Break Fix Scams Scary Stories Private Cloud Azure Hybrid Work Identity Theft Fun Upload Procurement Superfish Social Network Telework Cyber security Deep Learning Multi-Factor Security Tech Human Resources Twitter CES Undo IoT Communitications Dark Web Cables Error Education Social Engineering Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Remote Computing Data Analysis Star Wars IT Assessment Mobile Computing Microsoft Excel IT Maintenance Staff Value Business Intelligence Tablet Search Gamification Flexibility Organization Application Social Networking Best Practice Legislation Shortcuts Alert Dark Data Fileless Malware Digital Security Cameras Smart Devices Managed IT Ransmoware Buisness File Sharing Wearable Technology Memory Vendors IT solutions How To IBM Content Remote Working Legal Health IT Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Notifications Directions Videos Assessment Electronic Health Records Permissions Workforce Travel Wasting Time Threats Google Maps Cortana Techology

Blog Archive