Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Smartphones Data Recovery AI Disaster Recovery communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Automation Facebook Miscellaneous Information Cloud Computing Holiday Training Gadgets Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Mobile Office Apps Two-factor Authentication Data Security Vendor Chrome BYOD Budget Mobile Device Management Managed Services Voice over Internet Protocol Apple Gmail Tip of the week App Employer-Employee Relationship Networking Avoiding Downtime Marketing Conferencing Access Control WiFi Computing Information Technology How To HIPAA BDR Applications Office 365 Hacker Augmented Reality 2FA Website Help Desk Storage Virtual Private Network Password Bring Your Own Device Health Healthcare Big Data Retail Operating System Risk Management Managed IT Services Router Computers Analytics Office Tips Vendor Management Windows 11 Monitoring Physical Security Excel Display Printer Firewall Paperless Office Infrastructure Remote Workers Telephone The Internet of Things Document Management Going Green Cooperation Free Resource Project Management Social Windows 7 Cybercrime Scam Microsoft 365 Data loss Solutions Customer Service Patch Management Save Money Remote Monitoring Vulnerability End of Support Holidays Money IT Management Humor VPN Meetings Data Storage Smart Technology Supply Chain Video Conferencing Word Sports Managed Services Provider Computer Repair Virtual Machines Professional Services Mouse Saving Time Administration Managed IT Service Downloads iPhone Safety Machine Learning Licensing Vulnerabilities Entertainment Settings Data Privacy Wireless Printing Content Filtering Maintenance Images 101 Antivirus Mobility Telephone System YouTube Multi-Factor Authentication Cost Management Cryptocurrency Customer Relationship Management Virtual Desktop Employees Hacking Data storage LiFi Integration Presentation Robot Modem User Tip Outlook Processor Mobile Security Wireless Technology Cookies Cyber Monday Medical IT IP Address Unified Threat Management Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Hacks Network Congestion Scary Stories Mirgation Hypervisor Displays Nanotechnology Optimization Fun PowerPoint User Error Recovery Shopping Hard Drives Deep Learning Addiction Language Employer/Employee Relationships Outsourcing Navigation Domains Point of Sale Management PCI DSS Chatbots Education Screen Reader Distributed Denial of Service Workplace Gig Economy Refrigeration Network Management Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Public Speaking Mobile Computing Regulations Compliance Monitors Identity Smart Tech Memes Search Co-managed IT Lithium-ion battery Bookmark Entrepreneur Websites Best Practice Download Net Neutrality Alerts SQL Server Technology Care Business Communications Financial Data Buisness History Electronic Medical Records IT solutions Connectivity IT Break Fix Scams SharePoint Legal Browsers Smartwatch Undo Business Growth Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Lenovo Social Network Telework Writing Cyber security Virtual Reality IoT Communitications Cortana Dark Web Cables CES Server Management Private Cloud Alt Codes Trends Supply Chain Management Google Calendar Term Google Apps Superfish Identity Theft Customer Resource management FinTech Downtime Regulations Twitter Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Application Data Analysis Error Typing Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts IBM Organization Social Engineering Social Networking Google Drive Fileless Malware Digital Security Cameras Remote Computing Smart Devices Knowledge Ransmoware Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach 5G Comparison Google Play Be Proactive Tablet Health IT Google Docs Directions Videos Alert Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Competition Managed IT File Sharing Bitcoin Dark Data Running Cable Wasting Time Threats How To Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Microchip Notifications Internet Exlporer Software as a Service Fraud Meta Travel Windows 8 Username Laptop Managing Costs Amazon eCommerce Black Friday SSID Techology User Google Maps Drones Database Surveillance Virtual Assistant Outsource IT Media Unified Threat Management Halloween IT Technicians Virtual Machine Environment

Blog Archive