Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Workplace Tips Computer Privacy Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Mobile Device Smartphones Smartphone Business Management Workplace Strategy Mobile Devices communications Android Saving Money VoIP Managed IT Services Data Recovery Microsoft Office Browser Managed Service Social Media Passwords Upgrade Network Backup Disaster Recovery Internet of Things Tech Term Automation Artificial Intelligence Covid-19 Remote Cloud Computing Remote Work Server Managed Service Provider Facebook Miscellaneous Windows Encryption Gadgets Spam Outsourced IT Information Employee/Employer Relationship Holiday Windows 10 Government Business Continuity Data Management Current Events Wi-Fi Productivity Business Technology Windows 10 Blockchain Data Security Virtualization Apps Two-factor Authentication Compliance Bandwidth Apple Networking Vendor App Employer-Employee Relationship Office Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail How To BDR Applications Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Mobile Office AI Managed IT Services WiFi HIPAA Router Big Data Operating System BYOD Help Desk Virtual Private Network Risk Management Computers Training Health Healthcare Office Tips Analytics Website Marketing Augmented Reality Retail Storage Password Bring Your Own Device Solutions The Internet of Things Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Cybercrime Monitoring Customer Service Display Excel Printer Paperless Office Remote Workers Infrastructure Telephone IT Support Tip of the week Document Management Cooperation Free Resource Project Management Firewall Windows 7 Scam Microsoft 365 Data loss Safety Administration Employees Integration Robot User Tip Modem Settings Mobile Security Processor Printing Wireless Holidays Content Filtering Customer Relationship Management IT Management VPN Data Storage YouTube Meetings 2FA Smart Technology Supply Chain Video Conferencing Cryptocurrency Hacking Managed Services Provider Professional Services Saving Time Presentation Virtual Machines Computer Repair Virtual Desktop Managed IT Service Data storage LiFi Wireless Technology Downloads iPhone Outlook Machine Learning Licensing Money Word Vulnerabilities Humor Entertainment Data Privacy Images 101 Maintenance Antivirus Sports Mouse Telephone System Multi-Factor Authentication Mobility Cost Management Mobile Computing Content Remote Working Wearable Technology Memory Vendors Health IT Tablet Undo Motherboard Data Breach Search Comparison Google Play Be Proactive Alert Permissions Workforce Directions Videos Best Practice Assessment Electronic Health Records Managed IT Buisness File Sharing Wasting Time Threats Dark Data Legal IT solutions Trend Micro How To Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Notifications Fraud Meta Microchip Business Growth Username Travel Application Managing Costs Amazon Black Friday SSID Techology Google Maps eCommerce Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes IBM Downtime Unified Threat Management IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Unified Threat Management Proxy Server Reviews Hosted Solution Cookies Tactics Development Hotspot Transportation Small Businesses Typing Mirgation Hypervisor Displays Network Congestion PowerPoint Google Drive User Error Shopping Competition Nanotechnology Optimization Knowledge Physical Security Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Point of Sale Chatbots 5G Navigation Distributed Denial of Service Workplace Google Docs Gig Economy Unified Communications Screen Reader Experience Service Level Agreement Internet Service Provider Running Cable Tech Support User Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Google Wallet Regulations Compliance Identity Monitors Evernote Paperless Co-managed IT Bookmark Smart Tech Memes Windows 8 IP Address Download Net Neutrality Laptop Websites Alerts SQL Server Technology Care Drones Financial Data History Business Communications Electronic Medical Records Break Fix Scams SharePoint Browsers Smartwatch Connectivity IT Upload Procurement Halloween Recovery Azure Hybrid Work Lenovo Social Network Telework Hard Drives Cyber security Writing Multi-Factor Security Tech Human Resources Virtual Reality Dark Web Cables CES Domains IoT Communitications Hacks Server Management Trends Supply Chain Management Scary Stories Private Cloud Superfish Customer Resource management FinTech Identity Theft Refrigeration Regulations Fun Google Calendar Term Google Apps Twitter Microsoft Excel IT Maintenance Data Analysis Deep Learning Public Speaking Star Wars IT Assessment Lithium-ion battery Gamification Flexibility Error Staff Value Business Intelligence Organization Education Social Networking Social Engineering Entrepreneur Legislation Shortcuts Remote Computing Ransmoware Fileless Malware Digital Security Cameras Smart Devices

Blog Archive