Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Bring Your Own Device Managed IT Services Big Data 2FA Operating System Healthcare Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password The Internet of Things Scam Data loss Windows 11 Social Cooperation Excel Going Green Patch Management Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Customer Service Cybercrime Display Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Firewall Document Management Solutions Telephone Mouse Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Telephone System Virtual Machines Professional Services Robot Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN YouTube Meetings iPhone Cryptocurrency Wireless Technology User Tip Modem Vulnerabilities Data Privacy Computer Repair Mobile Security Processor Images 101 Virtual Desktop Data storage LiFi Multi-Factor Authentication Mobility Word Smart Technology Outlook Machine Learning Money Saving Time Humor Employees Integration Managed IT Service Maintenance Safety Antivirus Sports Downloads Social Engineering Break Fix Browsers Surveillance Education Connectivity Virtual Assistant Outsource IT Upload Virtual Machine Environment Remote Computing Media Reviews Mobile Computing Social Network Medical IT Multi-Factor Security Transportation Small Businesses Search Dark Web Development Tablet IoT Application Best Practice Trends Hypervisor Displays Alert Shopping Managed IT Customer Resource management Optimization Buisness File Sharing Regulations PowerPoint Dark Data Google Calendar Employer/Employee Relationships Outsourcing How To Microsoft Excel IBM Legal Data Analysis IT solutions Star Wars PCI DSS Business Growth Gamification Notifications Staff Navigation Gig Economy Travel Social Networking Workplace Legislation Teamwork Hiring/Firing Cortana Techology Fileless Malware Internet Service Provider Google Maps Regulations Compliance Alt Codes Content Wearable Technology Evernote Paperless Competition Health IT Memes Downtime Unified Threat Management Motherboard Co-managed IT Comparison SQL Server Technology Care Permissions Unified Threat Management Directions Net Neutrality Hosted Solution Assessment Financial Data Typing History Business Communications Smartwatch IT Scams Network Congestion Specifications Azure Hybrid Work Knowledge Fraud Google Drive User Error Microchip User Procurement Internet Exlporer Telework Username Cyber security Tech Human Resources CES Communitications Point of Sale Cables 5G Black Friday Experience IP Address Google Docs Supply Chain Management Unified Communications Database FinTech Bitcoin Network Management Running Cable Tech Support IT Technicians Term Google Apps Google Wallet Proxy Server IT Assessment Cookies IT Maintenance Monitors Cyber Monday Value Business Intelligence Hotspot Recovery Flexibility Tactics Hard Drives Organization Windows 8 Laptop Websites Mirgation Shortcuts Domains Digital Security Cameras Drones Smart Devices Nanotechnology Ransmoware Memory Vendors Electronic Medical Records Language SharePoint Remote Working Addiction Refrigeration Management Data Breach Halloween Chatbots Google Play Be Proactive Public Speaking Videos Lenovo Electronic Health Records Screen Reader Workforce Writing Distributed Denial of Service Wasting Time Threats Virtual Reality Computing Infrastructure Lithium-ion battery Service Level Agreement Hacks Server Management Entrepreneur Trend Micro Scary Stories Private Cloud Identity Security Cameras Workplace Strategies Superfish Bookmark Software as a Service Identity Theft Smart Tech Meta Fun Deep Learning Download Managing Costs Amazon Twitter Alerts Undo eCommerce Error SSID

Blog Archive