Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips IT Services Internet Malware Privacy Workplace Tips IT Support Phishing Google Email Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Managed Service AI Users Ransomware Productivity Mobile Device Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Facebook Training Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Outsourced IT Compliance Remote Work Server IT Support Managed Service Provider Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Bandwidth Blockchain Windows 10 Vendor Virtualization Business Technology Wi-Fi Apps Tip of the week Managed Services Two-factor Authentication Mobile Office Data Security Mobile Device Management Budget Gmail BYOD Apple WiFi App Employer-Employee Relationship Voice over Internet Protocol Networking Chrome Password HIPAA Physical Security Applications Access Control Computing Conferencing Information Technology Hacker Avoiding Downtime Managed IT Services Office 365 How To Marketing BDR Storage Bring Your Own Device Router Virtual Private Network Big Data Health 2FA Help Desk Operating System Risk Management Retail Computers Healthcare Analytics Website Office Tips Augmented Reality Patch Management Save Money Microsoft 365 Remote Monitoring Firewall End of Support Vulnerability Vendor Management Solutions The Internet of Things Display Printer Windows 11 Social Going Green Paperless Office Infrastructure Monitoring Cybercrime Excel Document Management Customer Service Managed IT Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Sports Mouse IT Management VPN Employees Meetings Safety Administration Integration User Tip Modem Computer Repair Mobile Security Processor Holidays Data Storage Settings Smart Technology Supply Chain Wireless Printing Video Conferencing Content Filtering Machine Learning Managed Services Provider Customer Relationship Management YouTube Professional Services Saving Time Virtual Machines Cryptocurrency Hacking Maintenance Presentation Antivirus Downloads Virtual Desktop iPhone Data storage LiFi Licensing Wireless Technology Vulnerabilities Entertainment Outlook Data Privacy Money Images 101 Humor Word Scary Stories Legislation Shortcuts Organization Hacks Travel Social Networking Google Maps Smart Devices Ransmoware Refrigeration Fun Techology Fileless Malware Digital Security Cameras Content Remote Working Deep Learning Wearable Technology Memory Vendors Public Speaking Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Lithium-ion battery Assessment Electronic Health Records Education Permissions Workforce Entrepreneur Unified Threat Management Directions Videos Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Mobile Computing Trend Micro Internet Exlporer Software as a Service Fraud Meta Undo Search User Error Microchip Username Best Practice Managing Costs Amazon Buisness Black Friday SSID Point of Sale eCommerce Legal Database Surveillance IT solutions Virtual Assistant Outsource IT Network Management Business Growth Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Application Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Cortana Alt Codes Websites Mirgation Hypervisor Displays IBM Downtime PowerPoint Shopping Nanotechnology Optimization Addiction Hosted Solution Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Typing Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Google Drive Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Competition Knowledge Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT 5G Superfish Bookmark Identity Theft Smart Tech Memes Google Docs Download Net Neutrality Unified Communications Twitter Alerts SQL Server Technology Care Experience User Financial Data Bitcoin Error History Running Cable Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Google Wallet Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Windows 8 Cyber security IP Address Laptop Multi-Factor Security Tech Human Resources Dark Web Cables CES Drones Tablet IoT Communitications Trends Supply Chain Management Alert Recovery Managed IT Customer Resource management FinTech File Sharing Regulations Halloween Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hard Drives Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Domains

Blog Archive