Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Productivity Passwords Backup Quick Tips Saving Money Cybersecurity Communication Smartphone Data Backup Managed Service Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Automation Gadgets Cloud Computing Covid-19 Holiday Training Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Business Technology Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Gmail Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing HIPAA Information Technology Applications WiFi Access Control Office 365 2FA Analytics Office Tips Help Desk Augmented Reality Retail Storage Password Computers Healthcare Bring Your Own Device Managed IT Services Website Operating System Router Virtual Private Network Risk Management Big Data Health Monitoring Document Management Excel Customer Service Remote Workers Scam Telephone Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Firewall Vendor Management Cybercrime Solutions Physical Security Display Printer The Internet of Things Paperless Office Infrastructure Social Windows 11 Data Storage Outlook Machine Learning Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Customer Relationship Management Saving Time Virtual Machines Professional Services Maintenance Hacking Sports Managed IT Service Antivirus Mouse Presentation Downloads iPhone Licensing Wireless Technology Administration Entertainment Vulnerabilities Data Privacy Images 101 Robot Word Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering IT Management VPN YouTube Meetings Employees Safety Cryptocurrency Integration Computer Repair User Tip Modem Virtual Desktop Processor Mobile Security Data storage LiFi Holidays Mirgation Hypervisor Displays SharePoint IBM Electronic Medical Records Halloween Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Lenovo Writing Addiction Management PCI DSS Chatbots Navigation Virtual Reality Scary Stories Private Cloud Gig Economy Screen Reader Distributed Denial of Service Workplace Hacks Server Management Computing Infrastructure Teamwork Hiring/Firing Superfish Competition Identity Theft Fun Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Deep Learning Twitter Error Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Education Social Engineering Download Net Neutrality Financial Data History Business Communications User Remote Computing Browsers Smartwatch Connectivity IT Break Fix Scams Mobile Computing Azure Hybrid Work Tablet Search Upload Procurement Social Network Telework Cyber security IP Address Multi-Factor Security Tech Human Resources Best Practice Alert Buisness File Sharing CES Dark Data IoT Communitications Dark Web Cables Managed IT Legal IT solutions How To Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Business Growth Recovery Notifications Hard Drives Travel Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Techology Domains Google Maps Cortana Gamification Flexibility Organization Social Networking Legislation Shortcuts Alt Codes Refrigeration Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Unified Threat Management Public Speaking Hosted Solution Content Remote Working Health IT Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Typing Entrepreneur Directions Videos Network Congestion Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Google Drive User Error Knowledge Trend Micro Specifications Security Cameras Workplace Strategies Undo Point of Sale Microchip 5G Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Google Docs Unified Communications Experience Username Running Cable Tech Support eCommerce Black Friday SSID Bitcoin Network Management Google Wallet Monitors Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Laptop Websites Proxy Server Reviews Cookies Cyber Monday Medical IT Windows 8 Application Drones Tactics Development Hotspot Transportation Small Businesses

Blog Archive