Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Disaster Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Automation Artificial Intelligence Information Cloud Computing Training Covid-19 Gadgets Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Mobile Office Data Security Vendor Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Networking Managed Services Voice over Internet Protocol Apple Mobile Device Management App Applications Computing Information Technology Access Control Conferencing Office 365 Hacker Avoiding Downtime How To Marketing BDR HIPAA Operating System Virtual Private Network Big Data Help Desk Risk Management 2FA Health Analytics Office Tips Augmented Reality Retail Computers Storage Password Bring Your Own Device Managed IT Services Website Healthcare Router Vendor Management Free Resource Project Management Windows 7 Cybercrime Physical Security The Internet of Things Display Microsoft 365 Printer Windows 11 Monitoring Paperless Office Solutions Social Infrastructure Excel Document Management Telephone Customer Service Scam Cooperation Data loss Remote Workers Patch Management Save Money Firewall Going Green Remote Monitoring End of Support Vulnerability Settings Wireless User Tip Modem Printing IT Management Meetings Images 101 Content Filtering Safety Processor VPN Mobile Security Multi-Factor Authentication Mobility YouTube Cryptocurrency Computer Repair Smart Technology Supply Chain Employees Saving Time Virtual Desktop LiFi Integration Data storage Customer Relationship Management Managed IT Service Machine Learning Outlook Downloads Holidays Money Licensing Hacking Humor Presentation Maintenance Data Storage Entertainment Antivirus Video Conferencing Wireless Technology Managed Services Provider Sports Virtual Machines Data Privacy Professional Services Mouse Telephone System Administration Cost Management Word Robot iPhone Vulnerabilities Unified Threat Management Entrepreneur Workplace Strategies Alt Codes Supply Chain Management Username Meta Term Black Friday Downtime FinTech Hosted Solution Network Congestion IT Assessment Amazon Database User Error IT Technicians Typing Flexibility Undo Value Proxy Server Outsource IT Cookies Cyber Monday Organization Point of Sale Digital Security Cameras Knowledge Smart Devices Environment Tactics Google Drive Media Hotspot Mirgation Remote Working Memory 5G Data Breach Small Businesses Nanotechnology Google Play Network Management Tech Support Unified Communications Videos Experience Monitors Electronic Health Records Application Displays Addiction Google Docs Language Management Wasting Time Chatbots Bitcoin Running Cable IBM Trend Micro Outsourcing Screen Reader Security Cameras Google Wallet Distributed Denial of Service Websites Computing Infrastructure Software as a Service Service Level Agreement Managing Costs SharePoint Workplace Identity Windows 8 Laptop Electronic Medical Records Bookmark eCommerce Hiring/Firing Smart Tech SSID Drones Paperless Alerts Writing Surveillance Download Virtual Assistant Lenovo Competition Virtual Machine Co-managed IT Halloween Virtual Reality Reviews Browsers Technology Care Connectivity Medical IT Server Management Break Fix Private Cloud Business Communications Identity Theft Development Upload Transportation Superfish Social Network Hypervisor Scams Hacks Multi-Factor Security Scary Stories Twitter Shopping Fun Optimization User Hybrid Work IoT PowerPoint Dark Web Error Human Resources Deep Learning Social Engineering Trends Employer/Employee Relationships Customer Resource management Cables Regulations Navigation Google Calendar Remote Computing PCI DSS Gig Economy IP Address Data Analysis Star Wars Microsoft Excel Education Google Apps Staff Tablet Internet Service Provider Gamification Teamwork IT Maintenance Social Networking Evernote Mobile Computing Legislation Alert Regulations Compliance File Sharing Search Dark Data Fileless Malware Memes Recovery Business Intelligence Managed IT Shortcuts Wearable Technology Best Practice How To Net Neutrality Hard Drives Content SQL Server Domains Health IT History Ransmoware Motherboard Comparison Buisness Notifications Financial Data IT solutions Travel Smartwatch Directions IT Vendors Assessment Legal Permissions Techology Be Proactive Business Growth Google Maps Procurement Refrigeration Azure Public Speaking Cyber security Workforce Tech Specifications Telework Unified Threat Management CES Cortana Lithium-ion battery Microchip Communitications Threats Internet Exlporer Fraud

Blog Archive