Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Data Recovery Smartphones AI communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Facebook Miscellaneous Artificial Intelligence Information Gadgets Cloud Computing Covid-19 Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Data Security Two-factor Authentication Apps Vendor Apple Mobile Device Management Tip of the week App Gmail Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship Chrome BYOD Budget Access Control Marketing Conferencing Computing WiFi Information Technology How To BDR Office 365 HIPAA Hacker Applications Avoiding Downtime Website Health 2FA Help Desk Retail Operating System Healthcare Risk Management Managed IT Services Big Data Analytics Office Tips Augmented Reality Router Computers Storage Password Virtual Private Network Bring Your Own Device Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Going Green Firewall Remote Workers Telephone Cybercrime The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Physical Security Display Printer Holidays Administration Data Storage Smart Technology Supply Chain Word Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Settings Wireless Managed IT Service Printing Maintenance Content Filtering Safety Downloads Antivirus iPhone YouTube Licensing Cryptocurrency Entertainment Vulnerabilities Data Privacy Images 101 Virtual Desktop Data storage LiFi Multi-Factor Authentication Robot Mobility Telephone System Cost Management Customer Relationship Management Outlook Money Humor Hacking IT Management Meetings Presentation VPN Employees Integration Modem Wireless Technology User Tip Sports Processor Computer Repair Mobile Security Mouse Cookies Monitors Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Tactics Development Search Hotspot Transportation Small Businesses Recovery Hard Drives Best Practice Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Domains Shopping Buisness SharePoint IT solutions Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Legal Navigation Refrigeration Business Growth Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Public Speaking Lenovo Gig Economy Service Level Agreement Internet Service Provider Cortana Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Evernote Paperless Alt Codes Entrepreneur Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Downtime Hosted Solution Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Undo Typing Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Google Drive Upload Procurement Knowledge Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security CES Tablet IoT Communitications 5G Dark Web Cables Google Docs Application Unified Communications Trends Supply Chain Management Experience Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Bitcoin Managed IT Customer Resource management FinTech Running Cable Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance IBM Google Wallet Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Windows 8 Organization Laptop Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Drones Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Competition Health IT Halloween Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hacks Scary Stories User Error Microchip Internet Exlporer Software as a Service Fun Fraud Meta User Deep Learning Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Education Database Surveillance Virtual Assistant Outsource IT IP Address Media Network Management Tech Support IT Technicians Virtual Machine Environment

Blog Archive