Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Holiday Miscellaneous Automation Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps Chrome Tip of the week Budget Managed Services Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Hacker Conferencing Avoiding Downtime Marketing How To BDR Computing HIPAA Information Technology Applications Access Control Office 365 Augmented Reality Computers Storage Password Retail Healthcare Bring Your Own Device Website Managed IT Services Operating System Router Risk Management Big Data Virtual Private Network Health Office Tips Analytics 2FA Help Desk Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Going Green Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Cybercrime Vulnerability Vendor Management Solutions The Internet of Things Physical Security Social Display Printer Windows 11 Paperless Office Infrastructure Monitoring Video Conferencing Money Hacking Humor Machine Learning Managed Services Provider Virtual Machines Professional Services Presentation Saving Time Managed IT Service Sports Wireless Technology Maintenance Mouse Downloads Antivirus iPhone Licensing Administration Vulnerabilities Word Entertainment Data Privacy Images 101 Robot Mobility Settings Telephone System Multi-Factor Authentication Cost Management Printing Wireless Content Filtering Safety YouTube IT Management Cryptocurrency VPN Employees Meetings Integration User Tip Modem Computer Repair Mobile Security Virtual Desktop Processor Data storage LiFi Holidays Customer Relationship Management Data Storage Outlook Smart Technology Supply Chain SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Chatbots Screen Reader Hacks Writing Distributed Denial of Service Workplace Scary Stories Lenovo Gig Economy User Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Fun Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Deep Learning Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Education IP Address Business Communications Financial Data Error History Connectivity IT Mobile Computing Social Engineering Break Fix Scams Browsers Smartwatch Recovery Upload Procurement Remote Computing Azure Hybrid Work Search Multi-Factor Security Tech Human Resources Hard Drives Social Network Telework Cyber security Best Practice Tablet IoT Communitications Dark Web Cables Buisness Domains CES Trends Supply Chain Management Legal Alert IT solutions Business Growth Dark Data Google Calendar Term Google Apps Refrigeration Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Data Analysis Cortana Gamification Flexibility Notifications Staff Value Business Intelligence Lithium-ion battery Alt Codes Legislation Shortcuts Entrepreneur Organization Travel Social Networking Google Maps Smart Devices Ransmoware Downtime Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Hosted Solution Typing Comparison Google Play Be Proactive Undo Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Knowledge Google Drive Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta 5G User Error Microchip Experience Application Username Google Docs Managing Costs Amazon Unified Communications Bitcoin Black Friday SSID Running Cable Point of Sale eCommerce Database Surveillance Google Wallet Virtual Assistant Outsource IT IBM Network Management Tech Support IT Technicians Virtual Machine Environment Media Windows 8 Monitors Cyber Monday Medical IT Laptop Proxy Server Reviews Cookies Tactics Development Drones Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Halloween Competition Shopping

Blog Archive