Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Compliance Cloud Computing Gadgets Training Server Outsourced IT Managed Service Provider Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Managed Services Apps Two-factor Authentication Budget Apple Networking Mobile Device Management App Gmail BYOD WiFi Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Conferencing Avoiding Downtime Marketing Managed IT Services How To BDR HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Hacker Retail Storage Password Website Bring Your Own Device 2FA Operating System Router Big Data Virtual Private Network Risk Management Healthcare Health Help Desk Office Tips Analytics Computers Augmented Reality Microsoft 365 Managed IT Service Telephone Solutions Scam Data loss Cooperation Firewall Going Green Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Cybercrime Excel Social Remote Workers Display Printer Paperless Office Infrastructure Monitoring Customer Service Free Resource Project Management Windows 7 Document Management Multi-Factor Authentication Mobility Wireless Technology Maintenance Antivirus Sports Downloads Mouse Licensing Employees Integration Word Entertainment Administration Telephone System Holidays Robot Cost Management Data Storage Safety Settings Printing Wireless Supply Chain Video Conferencing Content Filtering IT Management Managed Services Provider VPN YouTube Meetings Virtual Machines Professional Services Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop iPhone Customer Relationship Management Data storage LiFi Smart Technology Vulnerabilities Data Privacy Outlook Machine Learning Hacking Money Saving Time Images 101 Presentation Humor Hacks Server Management Organization Scary Stories Private Cloud Identity Shortcuts Ransmoware Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Remote Working IP Address Twitter Alerts Memory Vendors Deep Learning Download Error Data Breach Google Play Be Proactive Workforce Browsers Videos Education Connectivity Electronic Health Records Social Engineering Break Fix Remote Computing Wasting Time Threats Recovery Upload Mobile Computing Social Network Trend Micro Hard Drives Multi-Factor Security Security Cameras Workplace Strategies Meta Tablet IoT Software as a Service Domains Search Dark Web Alert Managing Costs Amazon Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations eCommerce Refrigeration Dark Data Google Calendar SSID Virtual Assistant Outsource IT Legal Data Analysis IT solutions Star Wars Surveillance Public Speaking How To Microsoft Excel Lithium-ion battery Notifications Staff Virtual Machine Environment Media Business Growth Gamification Reviews Travel Social Networking Legislation Medical IT Entrepreneur Transportation Small Businesses Techology Fileless Malware Google Maps Development Cortana Wearable Technology Hypervisor Displays Alt Codes Content Health IT Shopping Downtime Unified Threat Management Motherboard Optimization Undo Comparison PowerPoint Employer/Employee Relationships Outsourcing Unified Threat Management Directions Hosted Solution Assessment Permissions Typing PCI DSS Navigation Gig Economy Network Congestion Specifications Workplace Knowledge Fraud Teamwork Hiring/Firing Google Drive User Error Microchip Internet Exlporer Internet Service Provider Username Regulations Compliance Application Evernote Paperless Point of Sale Memes 5G Black Friday Co-managed IT Experience SQL Server Technology Care Google Docs Unified Communications Database Net Neutrality IBM Bitcoin Network Management Financial Data Running Cable Tech Support IT Technicians History Business Communications Google Wallet Proxy Server Smartwatch Cookies IT Monitors Cyber Monday Scams Hotspot Azure Hybrid Work Tactics Procurement Windows 8 Telework Laptop Websites Mirgation Cyber security Tech Human Resources Drones CES Nanotechnology Communitications Competition Cables Supply Chain Management Electronic Medical Records Language SharePoint Addiction Management FinTech Halloween Chatbots Term Google Apps IT Maintenance Lenovo Screen Reader IT Assessment Writing Distributed Denial of Service Flexibility Virtual Reality Computing Infrastructure Value Business Intelligence User Service Level Agreement

Blog Archive