Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Google Privacy Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Managed Service Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Facebook Productivity Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing AI Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Information Holiday Encryption Employee/Employer Relationship Spam Office Windows 10 Compliance Data Management Government Training Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Gmail Apple Networking App Vendor Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget How To WiFi BDR Applications Computing Information Technology Hacker Access Control Conferencing Avoiding Downtime Office 365 IT Support Tip of the week Marketing Bring Your Own Device Managed IT Services HIPAA Big Data Router Operating System Help Desk Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Physical Security Monitoring Customer Service 2FA Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Firewall Project Management Images 101 Mouse Telephone System Multi-Factor Authentication Safety Mobility Administration Cost Management Robot Employees Integration Settings Wireless User Tip Printing Modem Mobile Security Content Filtering Processor IT Management Customer Relationship Management VPN Holidays YouTube Meetings Data Storage Cryptocurrency Smart Technology Supply Chain Hacking Presentation Computer Repair Video Conferencing Managed Services Provider Saving Time Virtual Machines Virtual Desktop Professional Services LiFi Wireless Technology Data storage Managed IT Service Outlook Machine Learning Downloads Money iPhone Licensing Word Humor Entertainment Vulnerabilities Maintenance Data Privacy Antivirus Sports Microsoft Excel IT Maintenance Social Engineering Entrepreneur Data Analysis Star Wars IT Assessment Education Gamification Flexibility Staff Value Business Intelligence Remote Computing Organization Mobile Computing Social Networking Legislation Shortcuts Tablet Ransmoware Undo Search Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Best Practice Wearable Technology Memory Vendors Alert Dark Data Health IT Managed IT Motherboard Data Breach Buisness File Sharing Comparison Google Play Be Proactive IT solutions Permissions Workforce How To Directions Videos Legal Assessment Electronic Health Records Business Growth Wasting Time Threats Notifications Trend Micro Travel Specifications Security Cameras Workplace Strategies Application Google Maps Fraud Meta Cortana Microchip Techology Internet Exlporer Software as a Service Username Alt Codes Managing Costs Amazon IBM eCommerce Downtime Unified Threat Management Black Friday SSID Hosted Solution Virtual Assistant Outsource IT Unified Threat Management Database Surveillance Typing IT Technicians Virtual Machine Environment Media Network Congestion Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Competition Knowledge Google Drive User Error Tactics Development Mirgation Hypervisor Displays 5G Shopping Nanotechnology Optimization Point of Sale PowerPoint Unified Communications Language Employer/Employee Relationships Outsourcing Experience Google Docs Addiction Management PCI DSS Bitcoin Network Management Chatbots Running Cable Tech Support Navigation User Monitors Gig Economy Google Wallet Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Regulations Compliance Windows 8 Identity IP Address Laptop Websites Evernote Paperless Bookmark Drones Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Electronic Medical Records SharePoint Download Net Neutrality Financial Data History Halloween Business Communications Recovery Hard Drives Writing Browsers Smartwatch Lenovo Connectivity IT Break Fix Scams Azure Hybrid Work Domains Virtual Reality Upload Procurement Social Network Telework Hacks Server Management Cyber security Scary Stories Private Cloud Multi-Factor Security Tech Human Resources Refrigeration Fun CES Superfish IoT Communitications Identity Theft Dark Web Cables Deep Learning Public Speaking Twitter Trends Supply Chain Management Customer Resource management FinTech Regulations Lithium-ion battery Error Google Calendar Term Google Apps

Blog Archive