Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Computer Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Holiday Automation Facebook Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT IT Support Server Managed Service Provider Remote Work Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Business Technology Wi-Fi Virtualization Apps Data Security Vendor Mobile Office Managed Services Two-factor Authentication Employer-Employee Relationship Networking Chrome Budget BYOD Apple App Mobile Device Management Gmail Tip of the week WiFi Voice over Internet Protocol Office 365 Managed IT Services How To BDR Password Hacker Avoiding Downtime HIPAA Marketing Physical Security Applications Access Control Computing Information Technology Conferencing Analytics Office Tips Augmented Reality Computers Storage Bring Your Own Device Website Router Virtual Private Network Health 2FA Operating System Help Desk Risk Management Big Data Retail Healthcare Scam Data loss Cooperation Free Resource Project Management Customer Service Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Display Going Green Printer Firewall Paperless Office Windows 11 Infrastructure Monitoring Cybercrime Excel The Internet of Things Document Management Remote Workers Managed IT Service Social Telephone iPhone Licensing Outlook Customer Relationship Management Entertainment Vulnerabilities Data Privacy Money Humor Images 101 Hacking Presentation Telephone System Multi-Factor Authentication Robot Mobility Sports Cost Management Mouse Wireless Technology Administration IT Management VPN Employees Meetings Integration User Tip Word Modem Processor Computer Repair Mobile Security Settings Holidays Printing Wireless Data Storage Content Filtering Smart Technology Supply Chain Safety YouTube Video Conferencing Machine Learning Managed Services Provider Cryptocurrency Saving Time Virtual Machines Professional Services Virtual Desktop Maintenance Antivirus Downloads Data storage LiFi Windows 8 IBM Browsers Smartwatch Laptop Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Drones Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Halloween Tablet IoT Communitications Dark Web Cables Alert Trends Supply Chain Management Competition Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Hacks Data Analysis Scary Stories Star Wars IT Assessment How To Microsoft Excel IT Maintenance Fun Notifications Staff Value Business Intelligence Gamification Flexibility Deep Learning Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras User Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Education Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Mobile Computing IP Address Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Search Wasting Time Threats Best Practice Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Buisness Recovery Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Legal IT solutions Hard Drives Username Business Growth Domains Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Cortana Tech Support IT Technicians Virtual Machine Environment Media Refrigeration Network Management Alt Codes Public Speaking Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Lithium-ion battery Downtime Tactics Development Hotspot Transportation Small Businesses Entrepreneur Websites Mirgation Hypervisor Displays Hosted Solution Typing Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Knowledge Chatbots Navigation Google Drive Undo Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider 5G Server Management Regulations Compliance Experience Private Cloud Identity Evernote Paperless Google Docs Unified Communications Bitcoin Superfish Bookmark Running Cable Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Google Wallet Application Download Net Neutrality Financial Data Error History Business Communications

Blog Archive