Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Server Remote Work Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Avoiding Downtime HIPAA Access Control Marketing Applications Office 365 WiFi Conferencing How To BDR Computing Hacker Information Technology Router Website Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Risk Management Virtual Private Network Printer Solutions Paperless Office Infrastructure Firewall Document Management Windows 11 Monitoring Excel The Internet of Things Scam Data loss Remote Workers Social Telephone Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Customer Service Cybercrime Microsoft 365 Physical Security Display Computer Repair Virtual Desktop Employees Data storage Integration LiFi Word User Tip Modem Outlook Mobile Security Processor Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Safety Maintenance Video Conferencing Managed Services Provider Antivirus Sports Saving Time Virtual Machines Mouse Professional Services Administration Managed IT Service Downloads iPhone Licensing Robot Entertainment Customer Relationship Management Vulnerabilities Data Privacy Settings Wireless Printing Content Filtering Images 101 Hacking IT Management Telephone System Multi-Factor Authentication Presentation VPN Mobility YouTube Meetings Cost Management Cryptocurrency Wireless Technology IP Address Google Docs Permissions Workforce Unified Communications Experience Directions Videos Assessment Electronic Health Records Wasting Time Threats Bitcoin Network Management Running Cable Tech Support Monitors Trend Micro Google Wallet Specifications Security Cameras Workplace Strategies Fraud Meta Recovery Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Hard Drives Windows 8 Laptop Websites eCommerce Domains Drones Black Friday SSID SharePoint Virtual Assistant Outsource IT Electronic Medical Records Database Surveillance IT Technicians Virtual Machine Environment Refrigeration Media Halloween Writing Proxy Server Reviews Cookies Public Speaking Lenovo Cyber Monday Medical IT Lithium-ion battery Hotspot Transportation Small Businesses Virtual Reality Tactics Development Mirgation Hypervisor Displays Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft Fun Shopping Nanotechnology Optimization Superfish PowerPoint Language Employer/Employee Relationships Outsourcing Deep Learning Twitter Addiction Management PCI DSS Chatbots Undo Navigation Error Education Social Engineering Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Regulations Compliance Identity Mobile Computing Evernote Paperless Tablet Search Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Application Best Practice Alert Download Net Neutrality Dark Data Financial Data History Managed IT Business Communications Buisness File Sharing IT solutions How To Browsers Smartwatch Connectivity IT IBM Legal Break Fix Scams Azure Hybrid Work Business Growth Notifications Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Travel Google Maps Cortana CES IoT Communitications Techology Dark Web Cables Trends Supply Chain Management Alt Codes Customer Resource management FinTech Regulations Competition Google Calendar Term Google Apps Downtime Unified Threat Management Microsoft Excel IT Maintenance Hosted Solution Data Analysis Star Wars IT Assessment Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Typing Network Congestion Organization Social Networking Legislation Shortcuts Google Drive User Error Ransmoware User Knowledge Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Point of Sale 5G Health IT Motherboard Data Breach Comparison Google Play Be Proactive

Blog Archive