Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Smartphone Data Backup Managed Service Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Facebook Information Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget Networking Apple App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Mobile Device Management Conferencing WiFi How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Access Control Applications Marketing Office 365 Augmented Reality Help Desk Retail Storage Password Managed IT Services Bring Your Own Device Big Data Operating System Computers Virtual Private Network Risk Management Router Health 2FA Website Healthcare Analytics Office Tips Monitoring Firewall Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Telephone Social Patch Management Save Money Remote Monitoring Going Green Cooperation Vulnerability End of Support Vendor Management Customer Service Physical Security Cybercrime Display Printer Windows 11 Paperless Office Remote Workers Infrastructure Excel Document Management Money Smart Technology Humor Maintenance Images 101 Antivirus Multi-Factor Authentication Mobility Safety Saving Time Sports Mouse Managed IT Service Data Privacy Downloads Administration Employees Licensing Integration Robot Entertainment Customer Relationship Management Holidays Settings Wireless IT Management Printing Content Filtering VPN Meetings Telephone System Data Storage Hacking Cost Management Presentation Video Conferencing YouTube Managed Services Provider Computer Repair Cryptocurrency Virtual Machines Professional Services Wireless Technology Virtual Desktop Modem LiFi Supply Chain User Tip Data storage Processor Mobile Security iPhone Machine Learning Word Outlook Vulnerabilities Server Management Paperless Public Speaking Private Cloud Supply Chain Management Mirgation FinTech Nanotechnology Term Superfish Co-managed IT Lithium-ion battery Identity Theft Twitter Addiction Entrepreneur Hacks IT Assessment Language Scary Stories Technology Care Value Fun Business Communications Error Management Flexibility Chatbots Social Engineering Organization Screen Reader Deep Learning Distributed Denial of Service Scams Undo Remote Computing Digital Security Cameras Service Level Agreement Smart Devices Computing Infrastructure Hybrid Work Memory Human Resources Remote Working Identity Education Smart Tech Data Breach Google Play Cables Tablet Bookmark Alert Videos Download Mobile Computing Electronic Health Records Alerts Wasting Time Search Managed IT Google Apps File Sharing Dark Data How To Connectivity Best Practice Trend Micro Break Fix Security Cameras IT Maintenance Browsers Application Notifications Upload Software as a Service Buisness Business Intelligence Managing Costs Multi-Factor Security Shortcuts IBM Travel Social Network Legal IT solutions IoT Business Growth eCommerce Dark Web SSID Techology Ransmoware Google Maps Trends Surveillance Virtual Assistant Vendors Virtual Machine Google Calendar Cortana Be Proactive Unified Threat Management Customer Resource management Regulations Data Analysis Reviews Star Wars Alt Codes Microsoft Excel Medical IT Unified Threat Management Workforce Competition Gamification Development Staff Downtime Transportation Threats Social Networking Hosted Solution Hypervisor Legislation Workplace Strategies Network Congestion Fileless Malware Shopping Typing Optimization PowerPoint User Error Meta Content Wearable Technology Employer/Employee Relationships Amazon Motherboard Comparison Knowledge Navigation Point of Sale Health IT User Google Drive PCI DSS Directions Gig Economy Assessment Permissions Outsource IT 5G Network Management Media Tech Support Internet Service Provider Teamwork Environment Unified Communications Specifications Experience Evernote IP Address Google Docs Monitors Regulations Compliance Microchip Internet Exlporer Bitcoin Memes Fraud Running Cable Small Businesses Displays Websites Username Google Wallet Net Neutrality SQL Server History Black Friday Recovery Financial Data Hard Drives Electronic Medical Records Smartwatch Database Windows 8 IT Laptop SharePoint Outsourcing Domains Drones Procurement IT Technicians Azure Cookies Cyber security Cyber Monday Tech Lenovo Workplace Proxy Server Writing Telework Refrigeration Virtual Reality CES Tactics Communitications Hotspot Halloween Hiring/Firing

Blog Archive