Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones Data Recovery AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Automation Artificial Intelligence Information Holiday Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Vendor Apps Two-factor Authentication Mobile Office Data Security Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail BYOD Budget Applications WiFi Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Router Storage Password Virtual Private Network Bring Your Own Device Big Data Health 2FA Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Physical Security The Internet of Things Display Printer Paperless Office Windows 11 Social Infrastructure Monitoring Going Green Excel Document Management Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Firewall Remote Monitoring Vulnerability End of Support Vendor Management Solutions Employees VPN Meetings Safety Sports Integration Mouse User Tip Modem Processor Computer Repair Mobile Security Administration Holidays Data Storage Supply Chain Smart Technology Video Conferencing Managed Services Provider Machine Learning Customer Relationship Management Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering Managed IT Service Hacking Presentation YouTube Maintenance Downloads Antivirus iPhone Cryptocurrency Wireless Technology Licensing Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Multi-Factor Authentication Outlook Robot Mobility Telephone System Cost Management Money Humor IT Management Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Deep Learning User Error Microchip Software as a Service Internet Exlporer Meta Fraud Undo Managing Costs Amazon Education Username eCommerce Point of Sale Black Friday SSID Surveillance Database Outsource IT Virtual Assistant Mobile Computing Virtual Machine Environment Tech Support IT Technicians Media Search Network Management Reviews Proxy Server Cookies Monitors Cyber Monday Medical IT Application Best Practice Buisness Development Tactics Small Businesses Hotspot Transportation Hypervisor Displays Websites Mirgation IBM Legal IT solutions Shopping Optimization Nanotechnology PowerPoint Business Growth SharePoint Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Cortana PCI DSS Management Gig Economy Lenovo Screen Reader Workplace Writing Distributed Denial of Service Alt Codes Competition Downtime Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Paperless Evernote Hosted Solution Regulations Compliance Server Management Superfish Bookmark Memes Identity Theft Smart Tech Co-managed IT Typing Net Neutrality Download Technology Care Twitter Alerts SQL Server History Error Google Drive Business Communications User Knowledge Financial Data Smartwatch Browsers IT Connectivity Scams Social Engineering Break Fix 5G Procurement Upload Hybrid Work Remote Computing Azure Cyber security IP Address Google Docs Human Resources Multi-Factor Security Tech Unified Communications Experience Telework Social Network Running Cable CES Communitications Tablet IoT Cables Dark Web Bitcoin Google Wallet Supply Chain Management Trends Alert File Sharing Regulations Google Apps Dark Data Google Calendar Term Recovery FinTech Managed IT Customer Resource management Laptop Data Analysis IT Assessment Star Wars IT Maintenance How To Microsoft Excel Hard Drives Windows 8 Domains Drones Flexibility Gamification Business Intelligence Notifications Staff Value Travel Social Networking Shortcuts Legislation Organization Halloween Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Ransmoware Refrigeration Public Speaking Remote Working Content Vendors Wearable Technology Memory Health IT Data Breach Unified Threat Management Motherboard Lithium-ion battery Be Proactive Comparison Google Play Entrepreneur Scary Stories Videos Unified Threat Management Directions Electronic Health Records Assessment Workforce Permissions Hacks Wasting Time Threats Fun

Blog Archive