Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones Data Recovery AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Automation Artificial Intelligence Information Holiday Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Vendor Apps Two-factor Authentication Mobile Office Data Security Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD Applications WiFi Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Router Storage Password Bring Your Own Device Virtual Private Network 2FA Big Data Health Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Physical Security The Internet of Things Windows 11 Display Printer Paperless Office Social Infrastructure Excel Monitoring Going Green Document Management Customer Service Remote Workers Cybercrime Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Firewall Remote Monitoring End of Support Vulnerability Vendor Management Solutions Meetings Safety VPN Employees Sports Integration Mouse Modem User Tip Processor Computer Repair Mobile Security Administration Supply Chain Holidays Data Storage Smart Technology Video Conferencing Customer Relationship Management Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Content Filtering Managed IT Service Hacking YouTube Maintenance Presentation Downloads Antivirus Data Privacy iPhone Cryptocurrency Licensing Wireless Technology Entertainment Vulnerabilities Virtual Desktop Data storage LiFi Images 101 Word Multi-Factor Authentication Outlook Robot Mobility Telephone System Cost Management Money Humor IT Management Trend Micro Outsource IT Network Congestion Specifications Security Cameras Deep Learning User Error Microchip Internet Exlporer Software as a Service Environment Fraud Media Undo Education Username Managing Costs Point of Sale eCommerce Small Businesses Black Friday SSID Database Surveillance Displays Virtual Assistant Mobile Computing Search Network Management Tech Support IT Technicians Virtual Machine Cookies Outsourcing Monitors Cyber Monday Medical IT Application Best Practice Proxy Server Reviews Buisness Tactics Development Hotspot Transportation IBM Legal IT solutions Websites Mirgation Hypervisor Workplace Nanotechnology Optimization Hiring/Firing PowerPoint Business Growth Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Paperless Navigation Cortana Management PCI DSS Chatbots Co-managed IT Lenovo Gig Economy Screen Reader Technology Care Writing Distributed Denial of Service Alt Codes Downtime Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Business Communications Competition Private Cloud Identity Scams Evernote Hosted Solution Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Hybrid Work Typing Download Net Neutrality Twitter Alerts SQL Server Human Resources Error History Cables Google Drive User Knowledge Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix 5G Upload Procurement Remote Computing Azure Google Apps Cyber security IT Maintenance IP Address Google Docs Multi-Factor Security Tech Unified Communications Experience Social Network Telework CES Tablet IoT Communitications Business Intelligence Dark Web Bitcoin Running Cable Trends Supply Chain Management Alert Shortcuts Google Wallet File Sharing Regulations Ransmoware Dark Data Google Calendar Term Recovery Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Vendors How To Microsoft Excel Hard Drives Windows 8 Laptop Gamification Flexibility Notifications Staff Value Be Proactive Domains Drones Travel Social Networking Workforce Legislation Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Threats Refrigeration Halloween Content Remote Working Wearable Technology Memory Workplace Strategies Public Speaking Unified Threat Management Motherboard Data Breach Meta Lithium-ion battery Comparison Google Play Health IT Scary Stories Unified Threat Management Directions Videos Assessment Electronic Health Records Amazon Permissions Hacks Entrepreneur Fun Wasting Time

Blog Archive