Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Productivity Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones VoIP AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Tech Term Current Events Network Internet of Things Remote Automation Artificial Intelligence Facebook Information Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Blockchain Wi-Fi Mobile Office Two-factor Authentication Apps Data Security Vendor Mobile Device Management Managed Services Voice over Internet Protocol Gmail Tip of the week Chrome Budget Apple Networking Employer-Employee Relationship App BYOD Information Technology Marketing Access Control Conferencing Office 365 WiFi How To BDR HIPAA Applications Hacker Avoiding Downtime Computing Website 2FA Virtual Private Network Risk Management Help Desk Health Office Tips Analytics Healthcare Augmented Reality Retail Storage Password Big Data Bring Your Own Device Managed IT Services Router Computers Operating System Monitoring Display Printer Excel Paperless Office Infrastructure Firewall Remote Workers Telephone Document Management The Internet of Things Cooperation Free Resource Project Management Windows 7 Scam Social Data loss Microsoft 365 Solutions Going Green Patch Management Customer Service Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 Physical Security Cryptocurrency Data Storage Smart Technology Supply Chain Computer Repair Video Conferencing Managed Services Provider Word Professional Services Virtual Desktop Saving Time Virtual Machines Data storage LiFi Managed IT Service Outlook Machine Learning Downloads Safety iPhone Money Licensing Humor Vulnerabilities Entertainment Data Privacy Maintenance Antivirus Sports Mouse Images 101 Mobility Telephone System Multi-Factor Authentication Cost Management Administration Customer Relationship Management Employees Robot Integration Hacking Settings Presentation Printing User Tip Wireless Modem Mobile Security Processor Content Filtering IT Management Wireless Technology VPN YouTube Meetings Holidays Mirgation Hypervisor Displays PowerPoint Recovery Point of Sale Shopping 5G Nanotechnology Optimization Experience Addiction Language Employer/Employee Relationships Outsourcing Hard Drives Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Management PCI DSS Chatbots Domains Navigation Distributed Denial of Service Workplace Google Wallet Gig Economy Monitors Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Refrigeration Windows 8 Laptop Websites Regulations Compliance Identity Public Speaking Evernote Paperless Lithium-ion battery Co-managed IT Drones Bookmark Smart Tech Memes Electronic Medical Records Download Net Neutrality Alerts SQL Server Technology Care SharePoint Entrepreneur Halloween Financial Data History Business Communications Break Fix Scams Lenovo Browsers Smartwatch Writing Connectivity IT Virtual Reality Upload Procurement Azure Hybrid Work Undo Hacks Server Management Scary Stories Private Cloud Social Network Telework Cyber security Multi-Factor Security Tech Human Resources IoT Communitications Dark Web Cables Superfish Identity Theft CES Fun Twitter Trends Supply Chain Management Deep Learning Google Calendar Term Google Apps Error Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Application Education Data Analysis Social Engineering Remote Computing Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Mobile Computing Organization Social Networking IBM Smart Devices Ransmoware Tablet Fileless Malware Digital Security Cameras Search Alert Content Remote Working Wearable Technology Memory Vendors Best Practice Comparison Google Play Be Proactive Managed IT Buisness File Sharing Health IT Dark Data Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Legal IT solutions Directions Videos How To Notifications Wasting Time Threats Competition Business Growth Specifications Security Cameras Workplace Strategies Travel Trend Micro Internet Exlporer Software as a Service Fraud Meta Techology Google Maps Microchip Cortana Username Managing Costs Amazon Alt Codes Black Friday SSID User Downtime Unified Threat Management eCommerce Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Hosted Solution Typing IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Network Congestion Cookies IP Address Knowledge Tactics Development Hotspot Transportation Small Businesses Google Drive User Error

Blog Archive