Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Data Recovery VoIP Business Management Smartphones AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Automation Gadgets Cloud Computing Covid-19 Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Tip of the week Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Conferencing WiFi How To BDR Computing HIPAA Information Technology Applications Hacker Avoiding Downtime Office 365 Access Control Marketing Augmented Reality Storage Retail Password Bring Your Own Device Healthcare Managed IT Services Big Data 2FA Operating System Router Risk Management Computers Virtual Private Network Health Analytics Website Office Tips Help Desk Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Going Green Windows 11 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Cybercrime Excel Vendor Management Solutions Customer Service Physical Security Display Printer Paperless Office Infrastructure Monitoring Video Conferencing Money Humor Word Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Sports Maintenance Mouse Antivirus Downloads iPhone Safety Administration Licensing Vulnerabilities Entertainment Images 101 Robot Mobility Telephone System Settings Multi-Factor Authentication Cost Management Wireless Printing Supply Chain Content Filtering Customer Relationship Management YouTube IT Management Cryptocurrency VPN Employees Meetings Hacking Integration Presentation User Tip Modem Virtual Desktop Computer Repair Mobile Security Processor Data storage LiFi Wireless Technology Holidays Outlook Data Privacy Data Storage Smart Technology IT Maintenance Hard Drives Addiction Electronic Medical Records Language Employer/Employee Relationships SharePoint Business Intelligence Domains Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Hacks Lenovo Gig Economy Scary Stories Shortcuts Screen Reader Ransmoware Refrigeration Service Level Agreement Internet Service Provider Fun Virtual Reality Computing Infrastructure Teamwork Deep Learning Vendors Public Speaking Server Management Regulations Compliance Private Cloud Identity Evernote Lithium-ion battery Superfish Bookmark Be Proactive Identity Theft Smart Tech Memes Education Workforce Download Net Neutrality Entrepreneur Twitter Alerts SQL Server Threats Financial Data Error History Social Engineering Break Fix Mobile Computing Browsers Smartwatch Workplace Strategies Connectivity IT Meta Undo Upload Procurement Search Remote Computing Azure Best Practice Amazon Social Network Telework Cyber security Multi-Factor Security Tech Tablet IoT Communitications Dark Web CES Buisness IT solutions Outsource IT Trends Supply Chain Management Alert Legal Dark Data Google Calendar Term Business Growth Environment Managed IT Customer Resource management FinTech Media File Sharing Regulations Application Star Wars IT Assessment How To Microsoft Excel Data Analysis Small Businesses Gamification Flexibility Cortana Notifications Staff Value Legislation Alt Codes Displays IBM Organization Travel Social Networking Google Maps Smart Devices Techology Fileless Malware Digital Security Cameras Downtime Hosted Solution Outsourcing Content Remote Working Wearable Technology Memory Comparison Google Play Typing Health IT Unified Threat Management Motherboard Data Breach Workplace Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Google Drive Hiring/Firing Competition Knowledge Wasting Time Network Congestion Specifications Security Cameras Paperless Trend Micro Co-managed IT Internet Exlporer Software as a Service 5G Fraud User Error Microchip Google Docs Unified Communications Technology Care Username Experience Managing Costs Black Friday SSID Bitcoin Running Cable Business Communications User Point of Sale eCommerce Scams Database Surveillance Virtual Assistant Google Wallet Hybrid Work Network Management Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Windows 8 IP Address Proxy Server Reviews Laptop Human Resources Cookies Cables Tactics Development Hotspot Transportation Drones Websites Mirgation Hypervisor PowerPoint Shopping Halloween Google Apps Recovery Nanotechnology Optimization

Blog Archive