Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Artificial Intelligence Miscellaneous Holiday Gadgets Covid-19 Cloud Computing Compliance Training Server Managed Service Provider Outsourced IT Remote Work IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Mobile Office Managed Services Vendor Two-factor Authentication Data Security Apps Tip of the week Voice over Internet Protocol Mobile Device Management Gmail Networking Chrome WiFi Budget Employer-Employee Relationship Apple BYOD App Avoiding Downtime Computing Marketing HIPAA Information Technology Applications Office 365 Managed IT Services How To BDR Password Conferencing Physical Security Hacker Access Control Operating System Website Risk Management Router Healthcare Retail Analytics Office Tips Augmented Reality Help Desk 2FA Big Data Storage Bring Your Own Device Virtual Private Network Computers Health Cybercrime Document Management Remote Workers Firewall Scam Data loss Free Resource Project Management Windows 7 The Internet of Things Monitoring Windows 11 Microsoft 365 Patch Management Social Save Money Excel Remote Monitoring Solutions Vulnerability Managed IT Service End of Support Vendor Management Telephone Customer Service Display Printer Cooperation Going Green Paperless Office Infrastructure Telephone System Video Conferencing Content Filtering Cost Management Managed Services Provider Virtual Machines YouTube Professional Services Machine Learning Cryptocurrency Word Virtual Desktop iPhone Maintenance User Tip Antivirus Modem Data storage LiFi Processor Mobile Security Vulnerabilities Outlook Safety Images 101 Money Humor Smart Technology Multi-Factor Authentication Mobility Supply Chain Saving Time Robot Sports Mouse Employees IT Management Downloads Administration Integration Customer Relationship Management VPN Meetings Licensing Entertainment Hacking Computer Repair Holidays Presentation Data Privacy Data Storage Settings Printing Wireless Wireless Technology IT Maintenance Social Networking Websites Legislation Hosted Solution Employer/Employee Relationships IP Address Navigation Fileless Malware Business Intelligence PCI DSS Typing Wearable Technology Electronic Medical Records SharePoint Content Shortcuts Gig Economy Health IT Ransmoware Recovery Motherboard Google Drive Internet Service Provider Comparison Teamwork Knowledge Evernote Directions Vendors Hard Drives Lenovo Assessment Regulations Compliance Permissions Writing Virtual Reality Memes 5G Domains Be Proactive Workforce Server Management Google Docs Private Cloud Net Neutrality Specifications Unified Communications SQL Server Experience History Running Cable Microchip Threats Refrigeration Superfish Internet Exlporer Identity Theft Financial Data Fraud Bitcoin Smartwatch Google Wallet Twitter IT Public Speaking Username Workplace Strategies Meta Error Procurement Black Friday Azure Lithium-ion battery Cyber security Laptop Tech Amazon Database Entrepreneur Telework Windows 8 Social Engineering CES IT Technicians Drones Remote Computing Communitications Proxy Server Outsource IT Cookies Supply Chain Management Cyber Monday Halloween Term Environment Undo Tactics Media Tablet FinTech Hotspot Mirgation Alert IT Assessment Small Businesses Managed IT Nanotechnology File Sharing Flexibility Dark Data Value Scary Stories Displays Addiction Organization Language Hacks How To Digital Security Cameras Chatbots Notifications Smart Devices Fun Management Outsourcing Application Screen Reader Travel Remote Working Distributed Denial of Service Deep Learning Memory Data Breach Google Play Techology Service Level Agreement Google Maps Computing Infrastructure Videos Identity Electronic Health Records Education IBM Workplace Bookmark Hiring/Firing Smart Tech Unified Threat Management Wasting Time Trend Micro Security Cameras Unified Threat Management Download Paperless Alerts Mobile Computing Co-managed IT Software as a Service Search Browsers Technology Care Connectivity Break Fix Best Practice Network Congestion Managing Costs eCommerce Buisness SSID Competition User Error Upload Business Communications Scams Legal Surveillance Multi-Factor Security IT solutions Virtual Assistant Social Network Hybrid Work IoT Point of Sale Dark Web Business Growth Virtual Machine Medical IT Trends Human Resources Reviews Cables User Network Management Regulations Tech Support Development Google Calendar Transportation Cortana Customer Resource management Data Analysis Star Wars Microsoft Excel Alt Codes Monitors Hypervisor Optimization Downtime PowerPoint Gamification Google Apps Shopping Staff

Blog Archive