Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Facebook Miscellaneous Information Holiday Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Blockchain Data Security Apps Two-factor Authentication Vendor Mobile Office Mobile Device Management Budget Tip of the week Gmail Apple WiFi App Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship BYOD Chrome Conferencing How To BDR Computing Information Technology Hacker HIPAA Avoiding Downtime Applications Office 365 Marketing Access Control Help Desk Storage Password Bring Your Own Device 2FA Retail Big Data Managed IT Services Healthcare Operating System Risk Management Computers Router Physical Security Virtual Private Network Analytics Website Office Tips Augmented Reality Health Monitoring Firewall Document Management Windows 11 The Internet of Things Excel Telephone Scam Data loss Social Going Green Remote Workers Cooperation Cybercrime Patch Management Save Money Customer Service Remote Monitoring Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Smart Technology Sports Machine Learning Holidays Mouse Saving Time Data Storage Safety Administration Supply Chain Managed IT Service Video Conferencing Maintenance Downloads Antivirus Managed Services Provider Virtual Machines Professional Services Licensing Entertainment Settings Wireless Printing iPhone Content Filtering Customer Relationship Management Robot Telephone System YouTube Cost Management Vulnerabilities Cryptocurrency Data Privacy Hacking Presentation Images 101 IT Management Meetings Mobility VPN Multi-Factor Authentication Virtual Desktop Data storage LiFi Wireless Technology Modem User Tip Outlook Processor Computer Repair Mobile Security Employees Money Humor Integration Word Hacks Managing Costs Amazon Scary Stories Websites Mirgation eCommerce Refrigeration Nanotechnology SSID Fun SharePoint Surveillance Deep Learning Public Speaking Addiction Virtual Assistant Outsource IT Electronic Medical Records Language Media Lithium-ion battery Management Virtual Machine Environment Chatbots Education Screen Reader Medical IT Entrepreneur Writing Distributed Denial of Service Reviews Lenovo Development Service Level Agreement Transportation Small Businesses Virtual Reality Computing Infrastructure Mobile Computing Server Management Hypervisor Displays Private Cloud Identity Optimization Undo Identity Theft Smart Tech PowerPoint Search Shopping Superfish Bookmark Best Practice Download Employer/Employee Relationships Outsourcing Twitter Alerts Navigation PCI DSS Buisness Error IT solutions Connectivity Workplace Social Engineering Break Fix Gig Economy Legal Browsers Internet Service Provider Business Growth Upload Teamwork Hiring/Firing Remote Computing Evernote Paperless Multi-Factor Security Regulations Compliance Social Network Application Memes Tablet IoT Co-managed IT Cortana Dark Web Net Neutrality Alt Codes IBM Trends SQL Server Technology Care Alert Business Communications Dark Data Google Calendar Financial Data Managed IT Customer Resource management History Downtime File Sharing Regulations Data Analysis IT Hosted Solution Star Wars Scams How To Microsoft Excel Smartwatch Procurement Typing Gamification Azure Hybrid Work Notifications Staff Travel Social Networking Tech Human Resources Legislation Telework Cyber security Techology Fileless Malware Communitications Competition Google Maps Cables Knowledge CES Google Drive Supply Chain Management Content Wearable Technology Unified Threat Management Motherboard Term Google Apps 5G Comparison FinTech Health IT Unified Threat Management Directions IT Assessment Unified Communications Assessment IT Maintenance Experience Permissions Google Docs Flexibility Bitcoin Value Business Intelligence Running Cable User Shortcuts Network Congestion Specifications Organization Google Wallet User Error Microchip Smart Devices Internet Exlporer Ransmoware Fraud Digital Security Cameras Remote Working Windows 8 IP Address Username Memory Vendors Laptop Point of Sale Google Play Be Proactive Black Friday Drones Data Breach Electronic Health Records Database Workforce Videos Network Management Wasting Time Threats Halloween Recovery Tech Support IT Technicians Hard Drives Cookies Security Cameras Workplace Strategies Monitors Cyber Monday Proxy Server Trend Micro Software as a Service Domains Tactics Meta Hotspot

Blog Archive