Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade VoIP AI Business Management Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Virtualization Blockchain Bandwidth Mobile Office Two-factor Authentication Data Security Apps Vendor Apple BYOD App Mobile Device Management Tip of the week Gmail Managed Services Voice over Internet Protocol Networking Chrome Budget Employer-Employee Relationship Applications Hacker Avoiding Downtime Marketing Access Control Conferencing Computing Information Technology Office 365 WiFi How To BDR HIPAA Computers Virtual Private Network Help Desk Website Health Operating System Risk Management Retail Analytics Office Tips Managed IT Services Big Data Augmented Reality 2FA Healthcare Storage Password Router Bring Your Own Device Vendor Management Customer Service Windows 7 Physical Security Microsoft 365 Display Solutions Going Green Monitoring Printer Paperless Office Infrastructure Cybercrime Document Management Firewall Telephone Cooperation The Internet of Things Scam Data loss Windows 11 Remote Workers Social Excel Patch Management Save Money Remote Monitoring Free Resource End of Support Vulnerability Project Management Images 101 User Tip Administration Modem IT Management Hacking Multi-Factor Authentication Presentation Mobility Processor VPN Mobile Security Meetings Wireless Technology Data Privacy Computer Repair Smart Technology Employees Settings Wireless Integration Printing Saving Time Content Filtering Word YouTube Managed IT Service Machine Learning Holidays Cryptocurrency Downloads Data Storage Licensing Virtual Desktop Maintenance Video Conferencing Safety Data storage Entertainment LiFi Antivirus Managed Services Provider Virtual Machines Professional Services Outlook Money Telephone System Supply Chain Humor Cost Management iPhone Robot Sports Customer Relationship Management Vulnerabilities Mouse IT Assessment Technology Care Mobile Computing Username Unified Threat Management Flexibility Search Black Friday Value Business Communications Scams Network Congestion Best Practice Database Organization Digital Security Cameras Buisness IT Technicians Smart Devices Hybrid Work User User Error Legal Proxy Server IT solutions Cookies Remote Working Cyber Monday Memory Human Resources Data Breach Cables Google Play Business Growth Tactics Hotspot Point of Sale Videos Mirgation Electronic Health Records IP Address Nanotechnology Network Management Cortana Tech Support Wasting Time Google Apps Trend Micro IT Maintenance Monitors Security Cameras Alt Codes Addiction Language Management Downtime Chatbots Software as a Service Business Intelligence Recovery Hard Drives Hosted Solution Screen Reader Distributed Denial of Service Websites Managing Costs Shortcuts Computing Infrastructure eCommerce Ransmoware Domains SSID Typing Service Level Agreement SharePoint Identity Surveillance Vendors Electronic Medical Records Virtual Assistant Refrigeration Google Drive Bookmark Smart Tech Knowledge Virtual Machine Be Proactive Alerts Workforce Writing Public Speaking Medical IT Download Lenovo Reviews Development 5G Threats Virtual Reality Lithium-ion battery Transportation Workplace Strategies Google Docs Browsers Entrepreneur Unified Communications Connectivity Server Management Experience Break Fix Private Cloud Hypervisor Identity Theft Optimization Meta PowerPoint Bitcoin Upload Superfish Shopping Running Cable Social Network Amazon Multi-Factor Security Twitter Employer/Employee Relationships Google Wallet Undo Navigation IoT PCI DSS Dark Web Error Outsource IT Social Engineering Windows 8 Trends Gig Economy Laptop Customer Resource management Regulations Internet Service Provider Environment Google Calendar Remote Computing Teamwork Media Drones Evernote Data Analysis Star Wars Regulations Compliance Microsoft Excel Staff Tablet Memes Small Businesses Gamification Halloween Social Networking Net Neutrality Displays Legislation Alert SQL Server Application Dark Data Fileless Malware Managed IT Financial Data File Sharing History Scary Stories Wearable Technology IT Outsourcing How To IBM Hacks Content Smartwatch Health IT Motherboard Procurement Fun Comparison Notifications Azure Workplace Tech Directions Deep Learning Assessment Telework Permissions Travel Cyber security Google Maps Communitications Hiring/Firing Techology CES Education Supply Chain Management Specifications Paperless Co-managed IT Competition Term Microchip Internet Exlporer FinTech Fraud Unified Threat Management

Blog Archive