Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Smartphone Data Backup AI Android Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Covid-19 Cloud Computing Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Virtualization Business Technology Wi-Fi Two-factor Authentication Data Security Mobile Office Vendor Apps Networking Chrome Budget Mobile Device Management BYOD Apple Gmail App WiFi Managed Services Tip of the week Voice over Internet Protocol Employer-Employee Relationship Hacker Office 365 How To Avoiding Downtime BDR Marketing HIPAA Applications Access Control Computing Information Technology Conferencing Computers Office Tips Analytics Managed IT Services Augmented Reality Website Storage Password Bring Your Own Device Router Virtual Private Network Health Big Data Operating System Help Desk 2FA Healthcare Risk Management Retail Customer Service Telephone Scam Free Resource Data loss Project Management Windows 7 Cooperation Microsoft 365 Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Display Going Green Printer The Internet of Things Paperless Office Infrastructure Social Monitoring Cybercrime Windows 11 Remote Workers Document Management Excel Virtual Desktop Maintenance Antivirus Downloads Vulnerabilities Hacking Data storage LiFi Presentation Licensing Images 101 Outlook Entertainment Wireless Technology Multi-Factor Authentication Mobility Money Humor Telephone System Data Privacy Robot Word Sports Cost Management Mouse Employees Integration IT Management Administration VPN Meetings Holidays Safety User Tip Modem Computer Repair Processor Data Storage Mobile Security Settings Video Conferencing Printing Wireless Managed Services Provider Content Filtering Virtual Machines Professional Services Smart Technology YouTube Machine Learning Cryptocurrency Saving Time Supply Chain Customer Relationship Management iPhone Managed IT Service Workplace Tech Twitter Google Wallet Download Telework Alerts Cyber security Communitications Hiring/Firing Error CES Windows 8 Browsers Laptop Connectivity Supply Chain Management Break Fix Paperless Social Engineering Co-managed IT Term Remote Computing User Drones Upload FinTech IT Assessment Technology Care Multi-Factor Security Social Network Halloween IoT Flexibility Dark Web Value Tablet Business Communications Scams IP Address Alert Trends Organization Customer Resource management Digital Security Cameras Regulations Smart Devices Managed IT Hybrid Work Google Calendar File Sharing Dark Data How To Hacks Data Analysis Scary Stories Star Wars Remote Working Microsoft Excel Memory Human Resources Staff Data Breach Cables Google Play Notifications Recovery Gamification Fun Videos Social Networking Electronic Health Records Legislation Travel Hard Drives Deep Learning Fileless Malware Techology Wasting Time Google Maps Google Apps Domains Wearable Technology Trend Micro IT Maintenance Security Cameras Education Content Health IT Motherboard Software as a Service Business Intelligence Comparison Unified Threat Management Refrigeration Mobile Computing Directions Assessment Unified Threat Management Permissions Managing Costs Shortcuts Public Speaking Search eCommerce Ransmoware Lithium-ion battery SSID Best Practice Surveillance Vendors Specifications Virtual Assistant Network Congestion Entrepreneur Microchip Buisness Internet Exlporer User Error Fraud Virtual Machine Be Proactive Workforce Medical IT Legal IT solutions Username Reviews Business Growth Development Threats Black Friday Transportation Point of Sale Undo Database Hypervisor Workplace Strategies Cortana IT Technicians Optimization Network Management Meta PowerPoint Tech Support Shopping Alt Codes Proxy Server Cookies Amazon Cyber Monday Employer/Employee Relationships Monitors Navigation Downtime Tactics PCI DSS Hotspot Mirgation Outsource IT Websites Application Hosted Solution Gig Economy Typing Nanotechnology Internet Service Provider Environment Teamwork Media Evernote Electronic Medical Records Addiction Regulations Compliance SharePoint Language IBM Knowledge Chatbots Memes Small Businesses Google Drive Management Screen Reader Net Neutrality Lenovo Displays Distributed Denial of Service SQL Server Writing Virtual Reality Service Level Agreement Financial Data 5G Computing Infrastructure History Experience Identity IT Server Management Outsourcing Private Cloud Google Docs Unified Communications Smartwatch Bitcoin Bookmark Running Cable Smart Tech Procurement Superfish Azure Identity Theft Competition

Blog Archive