Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Artificial Intelligence Automation Information Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Data Security Apps Two-factor Authentication Mobile Office Vendor Apple Gmail Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Budget Tip of the week Mobile Device Management Applications How To WiFi BDR Conferencing Computing Information Technology Office 365 Hacker Access Control Avoiding Downtime Marketing HIPAA Managed IT Services 2FA Help Desk Big Data Operating System Risk Management Healthcare Virtual Private Network Computers Analytics Office Tips Health Augmented Reality Website Storage Password Router Bring Your Own Device Retail Firewall Scam Data loss Windows 11 The Internet of Things Going Green Monitoring Excel Patch Management Social Save Money Cybercrime Remote Monitoring Vulnerability Remote Workers End of Support Vendor Management Telephone Physical Security Customer Service Display Cooperation Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Maintenance User Tip Administration Modem Antivirus Processor Mobile Security Safety Holidays Data Storage Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Robot Content Filtering Professional Services YouTube Managed IT Service Cryptocurrency Downloads Customer Relationship Management IT Management VPN Meetings iPhone Licensing Virtual Desktop Data storage Entertainment Hacking LiFi Vulnerabilities Data Privacy Presentation Computer Repair Outlook Images 101 Wireless Technology Money Telephone System Multi-Factor Authentication Mobility Humor Cost Management Machine Learning Sports Word Mouse Employees Integration Managing Costs Amazon Public Speaking Mobile Computing Username Twitter Error eCommerce Search Black Friday SSID Lithium-ion battery Best Practice Database Surveillance Entrepreneur Social Engineering Virtual Assistant Outsource IT Buisness IT Technicians Virtual Machine Environment Media Remote Computing Legal Proxy Server Reviews IT solutions Cookies Cyber Monday Medical IT Undo Tablet Business Growth Tactics Development Hotspot Transportation Small Businesses Alert Mirgation Hypervisor Displays Managed IT Shopping File Sharing Nanotechnology Optimization Dark Data Cortana PowerPoint Alt Codes Addiction How To Language Employer/Employee Relationships Outsourcing Management PCI DSS Notifications Downtime Chatbots Navigation Gig Economy Application Travel Hosted Solution Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Techology Google Maps Typing Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless IBM Google Drive Bookmark Unified Threat Management Smart Tech Memes Knowledge Co-managed IT Alerts SQL Server Technology Care Unified Threat Management Download Net Neutrality Financial Data History 5G Business Communications Google Docs Browsers Smartwatch Unified Communications Connectivity IT Network Congestion Experience Break Fix Scams Azure Hybrid Work User Error Competition Bitcoin Upload Procurement Running Cable Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Point of Sale IoT Communitications Dark Web Cables Laptop Windows 8 Trends Supply Chain Management Drones Customer Resource management FinTech User Tech Support Regulations Google Calendar Term Google Apps Network Management Data Analysis Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance Halloween Staff Value Business Intelligence Gamification Flexibility Organization Websites Social Networking Legislation Shortcuts IP Address Fileless Malware Digital Security Cameras Smart Devices Ransmoware Scary Stories Wearable Technology Memory Vendors SharePoint Hacks Content Remote Working Electronic Medical Records Health IT Recovery Motherboard Data Breach Fun Comparison Google Play Be Proactive Lenovo Directions Videos Hard Drives Deep Learning Assessment Electronic Health Records Writing Permissions Workforce Wasting Time Threats Domains Virtual Reality Private Cloud Education Trend Micro Specifications Security Cameras Workplace Strategies Server Management Superfish Microchip Refrigeration Identity Theft Internet Exlporer Software as a Service Fraud Meta

Blog Archive