Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Gadgets Training Compliance Covid-19 Cloud Computing Server Outsourced IT Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Managed Services Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Networking Apple Gmail App WiFi BYOD Physical Security Computing Applications Information Technology Access Control Hacker Office 365 Conferencing Avoiding Downtime Marketing Password Managed IT Services How To BDR HIPAA Operating System Router Virtual Private Network Risk Management Health Help Desk Computers Healthcare 2FA Analytics Office Tips Augmented Reality Retail Website Storage Bring Your Own Device Big Data Social Cybercrime Display Printer Paperless Office Infrastructure Monitoring Customer Service Remote Workers Windows 11 Document Management Managed IT Service Excel Free Resource Telephone Project Management Windows 7 Scam Data loss Microsoft 365 Cooperation Firewall Solutions Patch Management Save Money The Internet of Things Remote Monitoring Going Green End of Support Vulnerability Vendor Management Holidays VPN Content Filtering Meetings Data Storage YouTube User Tip Modem Mobile Security Computer Repair Cryptocurrency Processor Video Conferencing Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Virtual Desktop Smart Technology Data storage LiFi Hacking Presentation Machine Learning Outlook Saving Time iPhone Wireless Technology Supply Chain Money Humor Vulnerabilities Maintenance Antivirus Downloads Images 101 Sports Licensing Word Mouse Multi-Factor Authentication Mobility Entertainment Administration Robot Data Privacy Employees Telephone System Safety Cost Management Integration Settings Printing IT Management Wireless Specifications Network Congestion Vendors Reviews Hosted Solution Application Medical IT Internet Exlporer Transportation Fraud Be Proactive Typing Microchip Development User Error Username IBM Hypervisor Workforce Black Friday Threats Google Drive Shopping Optimization Knowledge PowerPoint Point of Sale Database Employer/Employee Relationships Workplace Strategies PCI DSS Network Management 5G IT Technicians Navigation Tech Support Meta Cyber Monday Monitors Amazon Google Docs Gig Economy Unified Communications Proxy Server Experience Cookies Running Cable Tactics Competition Teamwork Hotspot Bitcoin Internet Service Provider Outsource IT Google Wallet Regulations Compliance Mirgation Evernote Websites Environment Media Memes Nanotechnology SharePoint Laptop Addiction SQL Server Language Electronic Medical Records Windows 8 Net Neutrality Small Businesses Drones Financial Data Management History Chatbots User Distributed Denial of Service Writing Displays Smartwatch IT Lenovo Screen Reader Halloween Service Level Agreement Azure Computing Infrastructure Virtual Reality Procurement Outsourcing Telework IP Address Cyber security Server Management Identity Tech Private Cloud Identity Theft CES Bookmark Communitications Superfish Smart Tech Supply Chain Management Scary Stories Download Alerts Twitter Workplace Hacks Hiring/Firing FinTech Fun Recovery Term Error Break Fix Social Engineering Paperless Deep Learning Browsers IT Assessment Connectivity Hard Drives Flexibility Upload Domains Value Remote Computing Co-managed IT Technology Care Organization Education Social Network Multi-Factor Security Refrigeration Tablet Dark Web Digital Security Cameras Business Communications Smart Devices IoT Remote Working Trends Public Speaking Memory Alert Scams Mobile Computing Dark Data Hybrid Work Customer Resource management Lithium-ion battery Data Breach Managed IT Search Regulations Google Play File Sharing Google Calendar Microsoft Excel Entrepreneur How To Videos Human Resources Best Practice Data Analysis Electronic Health Records Star Wars Buisness Gamification Wasting Time Staff Notifications Cables Legal IT solutions Trend Micro Social Networking Security Cameras Travel Legislation Undo Google Maps Google Apps Business Growth Fileless Malware Software as a Service Techology Content Managing Costs Wearable Technology IT Maintenance Comparison Business Intelligence Health IT eCommerce Cortana Motherboard SSID Unified Threat Management Assessment Virtual Assistant Permissions Shortcuts Alt Codes Directions Surveillance Unified Threat Management Downtime Virtual Machine Ransmoware

Blog Archive