Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Google Workplace Tips Privacy Email Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware AI Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Training Covid-19 Compliance Remote Work Server Outsourced IT Managed Service Provider IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Virtualization Business Technology Wi-Fi Windows 10 Blockchain Bandwidth Vendor Apps Mobile Office Managed Services Two-factor Authentication Data Security BYOD Apple Employer-Employee Relationship App Tip of the week Mobile Device Management Networking Voice over Internet Protocol Gmail Chrome WiFi Budget Password HIPAA Physical Security Applications Access Control Hacker Conferencing Avoiding Downtime Computing Information Technology Marketing Managed IT Services How To Office 365 BDR Storage Big Data Router Bring Your Own Device Virtual Private Network Health Help Desk Computers Operating System 2FA Retail Website Risk Management Healthcare Office Tips Analytics Augmented Reality Vendor Management Windows 7 Social Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Customer Service Monitoring Going Green Document Management Windows 11 Cybercrime Managed IT Service Telephone Excel Scam Data loss Remote Workers Firewall Cooperation Patch Management Save Money Remote Monitoring Free Resource The Internet of Things Vulnerability Project Management End of Support Images 101 IT Management Sports VPN Multi-Factor Authentication Mouse Meetings Mobility User Tip Modem Administration Computer Repair Mobile Security Processor Customer Relationship Management Employees Integration Hacking Smart Technology Settings Presentation Printing Machine Learning Wireless Content Filtering Saving Time Holidays Wireless Technology Data Storage YouTube Supply Chain Maintenance Cryptocurrency Video Conferencing Antivirus Managed Services Provider Downloads Virtual Machines Professional Services Word Licensing Virtual Desktop Entertainment Data storage LiFi Outlook iPhone Safety Telephone System Money Robot Humor Cost Management Vulnerabilities Data Privacy Deep Learning Permissions Unified Threat Management Directions IT Assessment Assessment IT Maintenance Value Business Intelligence Flexibility Organization Application Shortcuts Education Network Congestion Specifications Fraud Digital Security Cameras User Error Microchip Smart Devices Internet Exlporer Ransmoware IBM Username Memory Vendors Mobile Computing Remote Working Search Data Breach Point of Sale Google Play Be Proactive Black Friday Best Practice Videos Electronic Health Records Database Workforce Network Management Wasting Time Threats Tech Support IT Technicians Buisness Proxy Server Trend Micro Legal Cookies Security Cameras Workplace Strategies IT solutions Monitors Cyber Monday Business Growth Hotspot Software as a Service Competition Tactics Meta Managing Costs Amazon Websites Mirgation Cortana eCommerce Nanotechnology SSID Alt Codes Electronic Medical Records Language SharePoint Surveillance Addiction Virtual Assistant Outsource IT Management Virtual Machine Environment User Chatbots Media Downtime Reviews Lenovo Screen Reader Medical IT Hosted Solution Writing Distributed Denial of Service Transportation Small Businesses Typing Virtual Reality Computing Infrastructure Development Service Level Agreement IP Address Server Management Hypervisor Displays Private Cloud Identity Knowledge Shopping Superfish Bookmark Optimization Google Drive Identity Theft Smart Tech PowerPoint Download Employer/Employee Relationships Outsourcing Twitter Alerts PCI DSS Recovery Error Navigation 5G Social Engineering Break Fix Experience Gig Economy Browsers Hard Drives Google Docs Connectivity Workplace Unified Communications Upload Teamwork Hiring/Firing Bitcoin Remote Computing Running Cable Internet Service Provider Domains Regulations Compliance Social Network Google Wallet Evernote Paperless Multi-Factor Security Dark Web Memes Refrigeration Tablet IoT Co-managed IT Trends SQL Server Technology Care Windows 8 Alert Laptop Net Neutrality Public Speaking Financial Data Lithium-ion battery Managed IT Customer Resource management History Drones File Sharing Regulations Business Communications Dark Data Google Calendar How To Microsoft Excel Smartwatch Data Analysis IT Star Wars Scams Entrepreneur Gamification Azure Hybrid Work Notifications Staff Halloween Procurement Telework Cyber security Travel Social Networking Tech Human Resources Legislation CES Techology Fileless Malware Communitications Undo Google Maps Cables Content Hacks Wearable Technology Scary Stories Supply Chain Management Fun FinTech Health IT Unified Threat Management Motherboard Term Google Apps Comparison

Blog Archive