Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Artificial Intelligence Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Bandwidth Business Technology Wi-Fi Windows 10 Two-factor Authentication Data Security Apps Vendor Mobile Office WiFi Networking Chrome Employer-Employee Relationship Budget BYOD Apple App Mobile Device Management Tip of the week Managed Services Gmail Voice over Internet Protocol Office 365 How To BDR HIPAA Hacker Applications Avoiding Downtime Marketing Access Control Computing Conferencing Information Technology Managed IT Services Big Data Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Computers Router Virtual Private Network Website Health 2FA Help Desk Operating System Risk Management Retail Healthcare Scam The Internet of Things Data loss Cooperation Free Resource Social Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Physical Security Display Printer Paperless Office Going Green Windows 11 Infrastructure Monitoring Excel Cybercrime Firewall Document Management Remote Workers Telephone Virtual Desktop iPhone Data storage Licensing LiFi Vulnerabilities Entertainment Outlook Data Privacy Images 101 Money Humor Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Sports Mouse IT Management Hacking VPN Employees Meetings Presentation Integration Administration User Tip Modem Wireless Technology Computer Repair Mobile Security Processor Holidays Data Storage Settings Word Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing Machine Learning Managed Services Provider YouTube Saving Time Virtual Machines Professional Services Cryptocurrency Managed IT Service Safety Maintenance Antivirus Downloads Browsers Smartwatch Connectivity IT Google Wallet Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Cyber security Windows 8 Multi-Factor Security Tech Human Resources Laptop Dark Web Cables CES Tablet IoT Communitications Drones Trends Supply Chain Management Alert Application Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Halloween How To Microsoft Excel IT Maintenance IBM Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Hacks Legislation Shortcuts Scary Stories Ransmoware Fun Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Deep Learning Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Competition Permissions Workforce Education Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats Trend Micro Mobile Computing Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Search User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Best Practice Point of Sale eCommerce Black Friday SSID Buisness Virtual Assistant Outsource IT IP Address IT solutions Database Surveillance Legal Network Management Tech Support IT Technicians Virtual Machine Environment Business Growth Media Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Recovery Cortana Tactics Development Websites Mirgation Hypervisor Displays Alt Codes Hard Drives Downtime Shopping Nanotechnology Optimization PowerPoint Domains Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hosted Solution SharePoint Addiction Management PCI DSS Chatbots Typing Navigation Refrigeration Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Public Speaking Google Drive Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Knowledge Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Entrepreneur 5G Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Google Docs Twitter Alerts SQL Server Technology Care Unified Communications Experience Download Net Neutrality Financial Data Error History Bitcoin Business Communications Undo Running Cable

Blog Archive