Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money AI Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Artificial Intelligence Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Managed Services Data Security Two-factor Authentication Vendor Apps Apple Tip of the week App Voice over Internet Protocol Mobile Device Management Gmail Networking WiFi BYOD Chrome Employer-Employee Relationship Budget Access Control Hacker Avoiding Downtime Marketing Conferencing Computing Managed IT Services How To Information Technology BDR Office 365 HIPAA Physical Security Applications Password Computers Bring Your Own Device Health 2FA Help Desk Website Retail Healthcare Operating System Risk Management Big Data Analytics Office Tips Augmented Reality Router Virtual Private Network Storage Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Going Green Managed IT Service Remote Workers Telephone Firewall Scam Data loss Cybercrime Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social Vulnerability End of Support Vendor Management Solutions Display Printer Customer Service Mouse Presentation Holidays Data Storage Wireless Technology Administration Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Word Maintenance Settings Antivirus Printing Downloads Wireless iPhone Content Filtering Licensing YouTube Vulnerabilities Entertainment Safety Cryptocurrency Data Privacy Images 101 Telephone System Multi-Factor Authentication Virtual Desktop Robot Mobility LiFi Data storage Cost Management Outlook IT Management VPN Employees Money Meetings Integration Humor Customer Relationship Management User Tip Modem Computer Repair Mobile Security Processor Hacking Sports Proxy Server Reviews Cookies Education Monitors Cyber Monday Medical IT User Hotspot Transportation Small Businesses Tactics Development Mobile Computing Websites Mirgation Hypervisor Displays Search Shopping Nanotechnology Optimization PowerPoint Best Practice Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint IP Address Addiction Management PCI DSS Chatbots Buisness Navigation Lenovo Gig Economy Legal Screen Reader IT solutions Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Business Growth Recovery Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Hard Drives Private Cloud Identity Evernote Paperless Co-managed IT Cortana Superfish Bookmark Domains Identity Theft Smart Tech Memes Download Net Neutrality Alt Codes Twitter Alerts SQL Server Technology Care Financial Data Refrigeration Error History Downtime Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Public Speaking Connectivity IT Hosted Solution Lithium-ion battery Upload Procurement Typing Remote Computing Azure Hybrid Work Social Network Telework Cyber security Entrepreneur Multi-Factor Security Tech Human Resources Dark Web Cables Knowledge CES Google Drive Tablet IoT Communitications Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Undo File Sharing Regulations Dark Data Google Calendar Term Google Apps 5G Unified Communications How To Microsoft Excel IT Maintenance Experience Data Analysis Google Docs Star Wars IT Assessment Gamification Flexibility Bitcoin Notifications Staff Value Business Intelligence Running Cable Organization Google Wallet Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Windows 8 Application Wearable Technology Memory Vendors Laptop Health IT Drones Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos IBM Assessment Electronic Health Records Wasting Time Threats Halloween Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Internet Exlporer Software as a Service Username Hacks Managing Costs Amazon Scary Stories Fun Competition Point of Sale eCommerce Black Friday SSID Deep Learning Virtual Assistant Outsource IT Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media

Blog Archive