Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Holiday Facebook Automation Miscellaneous Information Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Bandwidth Blockchain Virtualization Business Technology Vendor Apps Data Security Two-factor Authentication Mobile Office App Employer-Employee Relationship Networking Managed Services Voice over Internet Protocol Mobile Device Management BYOD Chrome Gmail Budget WiFi Apple Tip of the week Applications Computing Hacker How To Information Technology BDR Avoiding Downtime Conferencing Marketing Office 365 Access Control HIPAA Router Retail Operating System 2FA Computers Help Desk Managed IT Services Risk Management Website Healthcare Office Tips Analytics Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device Big Data Document Management Going Green Customer Service Windows 11 Scam Cybercrime Data loss Monitoring Excel Patch Management Remote Workers Save Money Remote Monitoring Telephone End of Support Vulnerability Vendor Management Firewall Physical Security Cooperation Free Resource Display Project Management Printer Windows 7 Paperless Office The Internet of Things Infrastructure Microsoft 365 Solutions Social Employees Integration User Tip Modem Customer Relationship Management Mobile Security Settings Maintenance Processor Printing Antivirus Wireless Content Filtering Holidays Hacking Data Storage Presentation YouTube Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Wireless Technology Saving Time Virtual Machines Professional Services Robot Virtual Desktop Data storage LiFi Managed IT Service Downloads Word Outlook iPhone Licensing IT Management Meetings Money VPN Entertainment Humor Vulnerabilities Data Privacy Images 101 Computer Repair Safety Sports Telephone System Mouse Multi-Factor Authentication Mobility Cost Management Administration Machine Learning Writing Legal Trend Micro IBM IT solutions Specifications Security Cameras Workplace Strategies Lenovo Business Growth Fraud Meta Microchip Virtual Reality Internet Exlporer Software as a Service Username Managing Costs Amazon Server Management Private Cloud Cortana Identity Theft eCommerce Black Friday SSID Superfish Alt Codes Virtual Assistant Outsource IT Twitter Database Surveillance IT Technicians Virtual Machine Environment Competition Downtime Media Error Proxy Server Reviews Social Engineering Cookies Hosted Solution Cyber Monday Medical IT Typing Hotspot Transportation Small Businesses Remote Computing Tactics Development Mirgation Hypervisor Displays Knowledge Tablet Shopping Google Drive Nanotechnology Optimization PowerPoint User Language Employer/Employee Relationships Outsourcing Alert Addiction File Sharing Management PCI DSS Dark Data Chatbots Navigation Managed IT 5G Experience Gig Economy How To Google Docs Screen Reader IP Address Unified Communications Distributed Denial of Service Workplace Bitcoin Computing Infrastructure Teamwork Hiring/Firing Running Cable Notifications Service Level Agreement Internet Service Provider Travel Regulations Compliance Google Wallet Identity Evernote Paperless Techology Google Maps Bookmark Smart Tech Memes Co-managed IT Recovery Windows 8 Alerts SQL Server Technology Care Hard Drives Laptop Download Net Neutrality Unified Threat Management Financial Data Drones History Domains Business Communications Unified Threat Management Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Refrigeration Halloween Upload Procurement Social Network Telework Network Congestion Cyber security Public Speaking Multi-Factor Security Tech Human Resources User Error CES IoT Communitications Lithium-ion battery Dark Web Cables Hacks Scary Stories Entrepreneur Trends Supply Chain Management Point of Sale Customer Resource management FinTech Regulations Google Calendar Term Google Apps Fun Data Analysis Star Wars IT Assessment Deep Learning Microsoft Excel IT Maintenance Staff Value Business Intelligence Undo Network Management Tech Support Gamification Flexibility Organization Monitors Social Networking Education Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Mobile Computing Wearable Technology Memory Vendors Websites Health IT Motherboard Data Breach Comparison Google Play Be Proactive Search Best Practice Permissions Workforce Application SharePoint Directions Videos Electronic Medical Records Assessment Electronic Health Records Wasting Time Threats Buisness

Blog Archive