Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Physical Security 2FA Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Healthcare Firewall Document Management Free Resource Telephone Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Social Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Windows 11 Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Money Saving Time iPhone Humor Vulnerabilities Managed IT Service Data Privacy Safety Maintenance Antivirus Sports Downloads Mouse Images 101 Licensing Multi-Factor Authentication Mobility Entertainment Administration Telephone System Employees Robot Integration Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Meetings YouTube Holidays Cryptocurrency Data Storage Wireless Technology User Tip Modem Supply Chain Computer Repair Mobile Security Processor Video Conferencing Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage LiFi Word Smart Technology Outlook Machine Learning Public Speaking Lenovo Smartwatch Screen Reader IT Writing Distributed Denial of Service Scams Procurement Virtual Reality Computing Infrastructure Azure Hybrid Work Lithium-ion battery Service Level Agreement Hacks Server Management Telework Entrepreneur Private Cloud Identity Scary Stories Cyber security Tech Human Resources Cables Superfish Bookmark CES Identity Theft Smart Tech Communitications Fun Supply Chain Management Twitter Alerts Download Deep Learning Undo FinTech Error Term Google Apps IT Maintenance Browsers Connectivity Education IT Assessment Social Engineering Break Fix Flexibility Remote Computing Value Business Intelligence Upload Mobile Computing Social Network Organization Multi-Factor Security Shortcuts Ransmoware Digital Security Cameras Tablet IoT Smart Devices Dark Web Search Remote Working Alert Memory Vendors Application Trends Best Practice Managed IT Customer Resource management File Sharing Regulations Buisness Data Breach Dark Data Google Calendar Google Play Be Proactive Workforce IBM Legal Data Analysis Videos Star Wars IT solutions Electronic Health Records How To Microsoft Excel Business Growth Gamification Notifications Staff Wasting Time Threats Travel Social Networking Trend Micro Legislation Security Cameras Workplace Strategies Cortana Meta Techology Fileless Malware Google Maps Software as a Service Alt Codes Content Wearable Technology Managing Costs Amazon Competition Health IT Unified Threat Management Motherboard Downtime eCommerce Comparison SSID Permissions Virtual Assistant Outsource IT Unified Threat Management Directions Assessment Hosted Solution Surveillance Typing Virtual Machine Environment Media Reviews Network Congestion Specifications Medical IT Fraud Knowledge Transportation Small Businesses Google Drive User Error Microchip User Internet Exlporer Development Username Hypervisor Displays Shopping Point of Sale Optimization Black Friday 5G PowerPoint Experience Employer/Employee Relationships Outsourcing IP Address Google Docs Database Unified Communications Bitcoin Network Management PCI DSS Tech Support IT Technicians Running Cable Navigation Google Wallet Proxy Server Gig Economy Cookies Monitors Cyber Monday Workplace Hotspot Teamwork Hiring/Firing Recovery Tactics Internet Service Provider Hard Drives Windows 8 Regulations Compliance Websites Mirgation Laptop Evernote Paperless Domains Drones Nanotechnology Memes Co-managed IT Electronic Medical Records Language SQL Server Technology Care SharePoint Addiction Net Neutrality Refrigeration Management Financial Data Chatbots Halloween History Business Communications

Blog Archive