Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Training Covid-19 Compliance Server Managed Service Provider Outsourced IT Remote Work IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Managed Services Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi Computing Physical Security HIPAA Information Technology Applications Access Control Office 365 Hacker Avoiding Downtime Marketing Password Conferencing Managed IT Services How To BDR Operating System Big Data Risk Management Virtual Private Network Router Healthcare Health Computers Analytics Office Tips Augmented Reality Help Desk Retail Website Storage Bring Your Own Device 2FA Vendor Management Cybercrime Social Remote Workers Display Printer Paperless Office Infrastructure Customer Service Free Resource Project Management Windows 7 Document Management Monitoring Microsoft 365 Solutions Scam Data loss Managed IT Service Telephone Windows 11 Firewall Patch Management Cooperation Going Green Excel Save Money Remote Monitoring The Internet of Things Vulnerability End of Support Telephone System Video Conferencing Content Filtering IT Management Cost Management Managed Services Provider Virtual Machines YouTube Professional Services VPN Meetings Cryptocurrency Computer Repair Customer Relationship Management Virtual Desktop iPhone Data Privacy User Tip Modem Data storage LiFi Processor Mobile Security Vulnerabilities Hacking Presentation Outlook Machine Learning Images 101 Money Wireless Technology Humor Smart Technology Multi-Factor Authentication Mobility Maintenance Saving Time Sports Antivirus Mouse Word Employees Downloads Administration Integration Licensing Entertainment Supply Chain Holidays Safety Robot Data Storage Settings Printing Wireless Paperless Social Networking Legislation Hosted Solution Employer/Employee Relationships Unified Threat Management Navigation Fileless Malware Co-managed IT PCI DSS Typing Wearable Technology Technology Care Content Application Network Congestion Gig Economy Health IT Business Communications Motherboard Google Drive Internet Service Provider Comparison Teamwork User Error Knowledge Evernote Directions IBM Scams Assessment Regulations Compliance Permissions Memes 5G Hybrid Work Point of Sale Human Resources Google Docs Net Neutrality Specifications Unified Communications SQL Server Experience History Running Cable Network Management Microchip Cables Tech Support Internet Exlporer Financial Data Fraud Bitcoin Smartwatch Google Wallet IT Username Monitors Competition Google Apps Procurement Black Friday Azure Cyber security Laptop Tech IT Maintenance Websites Database Telework Windows 8 CES IT Technicians Drones Communitications Business Intelligence Proxy Server Shortcuts Electronic Medical Records Cookies Supply Chain Management Cyber Monday SharePoint Halloween Term Ransmoware Tactics User FinTech Hotspot Writing Mirgation IT Assessment Lenovo Vendors Be Proactive Virtual Reality Nanotechnology Flexibility Value Scary Stories Server Management IP Address Workforce Private Cloud Addiction Organization Language Hacks Digital Security Cameras Chatbots Smart Devices Superfish Fun Threats Identity Theft Management Workplace Strategies Twitter Screen Reader Remote Working Distributed Denial of Service Deep Learning Memory Data Breach Google Play Meta Error Service Level Agreement Recovery Computing Infrastructure Hard Drives Social Engineering Videos Identity Electronic Health Records Education Amazon Bookmark Domains Remote Computing Smart Tech Wasting Time Trend Micro Security Cameras Outsource IT Download Alerts Mobile Computing Refrigeration Media Software as a Service Search Environment Tablet Browsers Public Speaking Alert Connectivity Break Fix Best Practice Managing Costs eCommerce Buisness SSID Managed IT Lithium-ion battery Small Businesses File Sharing Upload Dark Data How To Legal Entrepreneur Surveillance Multi-Factor Security IT solutions Virtual Assistant Displays Social Network Notifications IoT Dark Web Business Growth Virtual Machine Medical IT Outsourcing Travel Trends Reviews Undo Regulations Development Google Calendar Transportation Techology Cortana Google Maps Customer Resource management Data Analysis Workplace Star Wars Microsoft Excel Alt Codes Hypervisor Optimization Downtime PowerPoint Hiring/Firing Unified Threat Management Gamification Shopping Staff

Blog Archive