Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Automation Facebook Information Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Managed Services Chrome Voice over Internet Protocol Budget Tip of the week Apple Mobile Device Management App Gmail Networking Employer-Employee Relationship BYOD Hacker Applications Access Control Avoiding Downtime Marketing Conferencing How To WiFi Computing BDR Information Technology Office 365 HIPAA Augmented Reality Computers Router Healthcare Health Storage Password Website Bring Your Own Device 2FA Help Desk Retail Managed IT Services Operating System Big Data Risk Management Analytics Office Tips Virtual Private Network Printer Remote Workers Paperless Office Infrastructure Windows 11 Monitoring Free Resource Document Management Project Management Windows 7 Excel Firewall Microsoft 365 Going Green Scam Data loss Solutions Telephone The Internet of Things Cybercrime Social Patch Management Cooperation Save Money Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Customer Service Display Computer Repair Presentation Money Humor Wireless Technology User Tip Modem iPhone Mobile Security Processor Sports Mouse Vulnerabilities Machine Learning Smart Technology Supply Chain Word Administration Images 101 Maintenance Mobility Saving Time Multi-Factor Authentication Antivirus Managed IT Service Settings Safety Downloads Printing Wireless Content Filtering Employees Integration Licensing YouTube Entertainment Cryptocurrency Data Privacy Robot Holidays Data Storage Telephone System Virtual Desktop LiFi Cost Management IT Management Customer Relationship Management Data storage Video Conferencing VPN Meetings Managed Services Provider Virtual Machines Professional Services Outlook Hacking Evernote Specifications Workplace Strategies Regulations Compliance Memes Internet Exlporer Network Management Fraud Tech Support Meta Microchip User Monitors Net Neutrality Hacks Username SQL Server Scary Stories Amazon Fun Black Friday Financial Data History IT Deep Learning Database Websites Outsource IT IP Address Smartwatch Media Procurement Azure IT Technicians Environment Tech Cyber Monday Electronic Medical Records Telework Proxy Server SharePoint Cyber security Education Cookies Recovery Communitications Tactics Hotspot Small Businesses CES Writing Hard Drives Supply Chain Management Mobile Computing Lenovo Mirgation Displays Term Search Virtual Reality Domains FinTech Nanotechnology IT Assessment Best Practice Addiction Server Management Language Private Cloud Outsourcing Refrigeration Flexibility Management Superfish Value Buisness Chatbots Identity Theft Screen Reader Distributed Denial of Service Twitter Workplace Public Speaking Organization Legal IT solutions Smart Devices Business Growth Service Level Agreement Computing Infrastructure Error Hiring/Firing Lithium-ion battery Digital Security Cameras Social Engineering Paperless Remote Working Entrepreneur Memory Identity Smart Tech Google Play Cortana Remote Computing Co-managed IT Bookmark Data Breach Electronic Health Records Alt Codes Download Alerts Technology Care Videos Business Communications Undo Wasting Time Downtime Tablet Hosted Solution Connectivity Security Cameras Break Fix Alert Scams Browsers Trend Micro Software as a Service Typing Upload Managed IT File Sharing Hybrid Work Dark Data Multi-Factor Security How To Human Resources Social Network Managing Costs eCommerce IoT SSID Knowledge Dark Web Notifications Cables Google Drive Application Surveillance Trends Virtual Assistant Travel 5G Google Calendar Google Apps Customer Resource management Techology Virtual Machine Regulations Google Maps Unified Communications Star Wars Medical IT Experience Microsoft Excel IT Maintenance IBM Reviews Google Docs Data Analysis Development Bitcoin Gamification Transportation Running Cable Staff Unified Threat Management Business Intelligence Legislation Shortcuts Google Wallet Unified Threat Management Hypervisor Social Networking Optimization PowerPoint Ransmoware Shopping Fileless Malware Windows 8 Content Employer/Employee Relationships Laptop Wearable Technology Vendors Network Congestion Navigation Comparison Be Proactive Competition PCI DSS Drones Health IT User Error Motherboard Assessment Permissions Workforce Gig Economy Directions Internet Service Provider Teamwork Halloween Point of Sale Threats

Blog Archive