Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Covid-19 Cloud Computing Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Apps Vendor Data Security Mobile Office Managed Services Mobile Device Management Voice over Internet Protocol Gmail Tip of the week Chrome Budget WiFi Apple Networking Employer-Employee Relationship App BYOD Conferencing Access Control Office 365 How To HIPAA BDR Applications Hacker Computing Avoiding Downtime Information Technology Marketing Health Healthcare Analytics Office Tips Augmented Reality Retail 2FA Storage Big Data Password Bring Your Own Device Managed IT Services Router Computers Operating System Help Desk Website Virtual Private Network Risk Management Printer Paperless Office Infrastructure Remote Workers Firewall Telephone Document Management Cooperation Free Resource Windows 11 The Internet of Things Project Management Windows 7 Social Scam Data loss Microsoft 365 Excel Solutions Customer Service Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Monitoring Physical Security Display Saving Time Computer Repair Virtual Machines Professional Services Word Virtual Desktop LiFi Managed IT Service Data storage Downloads iPhone Outlook Licensing Machine Learning Safety Money Entertainment Vulnerabilities Humor Maintenance Images 101 Supply Chain Antivirus Sports Telephone System Multi-Factor Authentication Mobility Mouse Cost Management Administration Customer Relationship Management Employees Integration Robot User Tip Modem Hacking Presentation Processor Settings Mobile Security Printing Wireless Content Filtering Holidays Data Privacy Wireless Technology IT Management VPN YouTube Meetings Data Storage Smart Technology Cryptocurrency Video Conferencing Managed Services Provider Hard Drives Unified Communications Gig Economy Experience Screen Reader Vendors Distributed Denial of Service Google Docs Be Proactive Domains Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Monitors Identity Workforce Evernote Google Wallet Regulations Compliance Refrigeration Bookmark Smart Tech Memes Threats Workplace Strategies Public Speaking Windows 8 Laptop Websites Download Net Neutrality Alerts SQL Server Financial Data History Meta Lithium-ion battery Drones Browsers Smartwatch Entrepreneur Electronic Medical Records Connectivity IT Amazon Break Fix SharePoint Azure Halloween Upload Procurement Social Network Telework Writing Cyber security Outsource IT Multi-Factor Security Tech Lenovo Undo CES Virtual Reality IoT Communitications Environment Dark Web Media Hacks Server Management Scary Stories Private Cloud Trends Supply Chain Management Customer Resource management FinTech Fun Regulations Small Businesses Google Calendar Term Superfish Identity Theft Deep Learning Data Analysis Twitter Star Wars IT Assessment Displays Microsoft Excel Staff Value Error Gamification Flexibility Organization Social Engineering Social Networking Outsourcing Legislation Application Education Fileless Malware Digital Security Cameras Remote Computing Smart Devices Wearable Technology Memory Workplace IBM Mobile Computing Content Remote Working Health IT Search Motherboard Data Breach Hiring/Firing Comparison Google Play Tablet Best Practice Directions Videos Alert Assessment Electronic Health Records Permissions Paperless Wasting Time Co-managed IT Managed IT Buisness File Sharing Dark Data How To Trend Micro Technology Care Specifications Security Cameras Legal IT solutions Competition Business Growth Microchip Notifications Internet Exlporer Software as a Service Fraud Business Communications Managing Costs Scams Travel Username Cortana eCommerce Hybrid Work Black Friday SSID Techology Google Maps Alt Codes Database Surveillance Virtual Assistant Human Resources IT Technicians Virtual Machine Cables User Downtime Unified Threat Management Hosted Solution Proxy Server Reviews Cookies Cyber Monday Medical IT Unified Threat Management Google Apps Typing Tactics Development Hotspot Transportation Network Congestion Mirgation Hypervisor IT Maintenance IP Address Shopping Knowledge Nanotechnology Optimization Business Intelligence PowerPoint Google Drive User Error Shortcuts Addiction Language Employer/Employee Relationships 5G Chatbots Ransmoware Navigation Recovery Point of Sale Management PCI DSS

Blog Archive