Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Voice over Internet Protocol Budget Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Bring Your Own Device Big Data Operating System 2FA Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Solutions Customer Service Cybercrime Excel Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Managed IT Service Remote Workers Telephone iPhone Mouse Licensing Administration Vulnerabilities Entertainment Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Customer Relationship Management Settings Wireless Printing Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Supply Chain Integration Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Data Privacy Safety Maintenance Downloads Antivirus Sports Education Connectivity IT Shortcuts Social Engineering Break Fix Browsers Smartwatch Upload Procurement Ransmoware Remote Computing Azure Multi-Factor Security Tech Mobile Computing Social Network Telework Vendors Cyber security Tablet IoT Communitications Be Proactive Search Dark Web CES Application Best Practice Trends Supply Chain Management Workforce Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Threats Buisness File Sharing Regulations IT solutions Star Wars IT Assessment Workplace Strategies How To Microsoft Excel IBM Legal Data Analysis Business Growth Gamification Flexibility Meta Notifications Staff Value Legislation Organization Amazon Travel Social Networking Google Maps Smart Devices Cortana Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Outsource IT Wearable Technology Memory Media Comparison Google Play Competition Health IT Environment Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Typing Small Businesses Wasting Time Network Congestion Specifications Security Cameras Displays Trend Micro Google Drive User Error Microchip User Internet Exlporer Software as a Service Knowledge Fraud Username Outsourcing Managing Costs Point of Sale eCommerce 5G Black Friday SSID IP Address Google Docs Unified Communications Database Surveillance Workplace Experience Virtual Assistant Bitcoin Network Management Hiring/Firing Running Cable Tech Support IT Technicians Virtual Machine Cookies Paperless Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Recovery Tactics Development Co-managed IT Hotspot Transportation Hard Drives Windows 8 Technology Care Laptop Websites Mirgation Hypervisor Nanotechnology Optimization Business Communications PowerPoint Domains Drones Shopping SharePoint Addiction Scams Electronic Medical Records Language Employer/Employee Relationships Navigation Refrigeration Management PCI DSS Hybrid Work Halloween Chatbots Screen Reader Human Resources Writing Distributed Denial of Service Public Speaking Lenovo Gig Economy Lithium-ion battery Service Level Agreement Internet Service Provider Cables Virtual Reality Computing Infrastructure Teamwork Evernote Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Google Apps Fun Superfish Bookmark Deep Learning Download Net Neutrality IT Maintenance Twitter Alerts SQL Server Undo Financial Data Business Intelligence Error History

Blog Archive