Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Mobile Device Ransomware Microsoft Small Business Quick Tips Cybersecurity Passwords Backup Communication Saving Money Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones Productivity Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Microsoft Office Managed IT Services AI Current Events Tech Term Network Remote Internet of Things Facebook Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Information Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government IT Support Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Gmail Budget WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk 2FA Analytics Office Tips Augmented Reality Retail Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Customer Service Vendor Management Cybercrime Solutions Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Safety Maintenance Sports Downloads Antivirus Mouse Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Images 101 Robot Telephone System Customer Relationship Management Cost Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Cryptocurrency Employees Modem Integration Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Outlook Data Storage Supply Chain Machine Learning Video Conferencing Money Saving Time Humor Managed Services Provider Virtual Machines Professional Services Managed IT Service Evernote Paperless Deep Learning Download Twitter Alerts Regulations Compliance Error Memes Co-managed IT Undo Browsers Education Connectivity Social Engineering Break Fix Net Neutrality SQL Server Technology Care History Business Communications Upload Remote Computing Financial Data Smartwatch Multi-Factor Security IT Scams Mobile Computing Social Network Tablet IoT Search Dark Web Procurement Azure Hybrid Work Cyber security Tech Human Resources Application Best Practice Trends Alert Telework Buisness File Sharing Regulations CES Dark Data Google Calendar Communitications Cables Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Supply Chain Management Term Google Apps Business Growth Gamification Notifications Staff FinTech Travel Social Networking Legislation IT Assessment IT Maintenance Techology Fileless Malware Google Maps Cortana Flexibility Value Business Intelligence Shortcuts Alt Codes Content Wearable Technology Organization Downtime Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Ransmoware Competition Health IT Unified Threat Management Directions Hosted Solution Assessment Permissions Remote Working Memory Vendors Data Breach Google Play Be Proactive Typing Videos Network Congestion Specifications Electronic Health Records Workforce Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Username Point of Sale 5G Black Friday Software as a Service Meta IP Address Google Docs Unified Communications Database Experience Managing Costs Amazon eCommerce SSID Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday Surveillance Virtual Assistant Outsource IT Google Wallet Proxy Server Media Recovery Tactics Hotspot Virtual Machine Environment Medical IT Hard Drives Windows 8 Laptop Websites Mirgation Reviews Nanotechnology Development Transportation Small Businesses Domains Drones SharePoint Addiction Electronic Medical Records Language Hypervisor Displays Optimization PowerPoint Refrigeration Management Halloween Chatbots Shopping Screen Reader Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing Public Speaking Lenovo Navigation Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure PCI DSS Gig Economy Workplace Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Fun Internet Service Provider Teamwork Hiring/Firing

Blog Archive