Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

Continue reading
0 Comments

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

Continue reading
0 Comments

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Information Artificial Intelligence Facebook Cloud Computing Gadgets Compliance Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Vendor Mobile Office Data Security Managed Services BYOD Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi Voice over Internet Protocol Computing Physical Security Information Technology Access Control Hacker Office 365 Avoiding Downtime HIPAA Marketing Applications Managed IT Services How To BDR Conferencing Operating System Healthcare Virtual Private Network Risk Management Health Computers Office Tips Analytics Augmented Reality Router Website Retail Storage Password Bring Your Own Device 2FA Help Desk Big Data Vendor Management Social Telephone Cybercrime Display Cooperation Free Resource Printer Project Management Paperless Office Customer Service Windows 7 Infrastructure Microsoft 365 Document Management Solutions Scam Data loss Windows 11 Firewall Monitoring Excel Going Green Patch Management The Internet of Things Save Money Remote Monitoring Remote Workers Vulnerability Managed IT Service End of Support Content Filtering IT Management Downloads VPN YouTube Meetings iPhone Licensing Cryptocurrency Entertainment Customer Relationship Management Vulnerabilities Computer Repair Data Privacy Images 101 Virtual Desktop Hacking Data storage LiFi Telephone System Multi-Factor Authentication Presentation Mobility Cost Management Outlook Machine Learning Wireless Technology Money Humor Employees Integration Maintenance User Tip Antivirus Modem Sports Word Processor Mouse Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Safety Managed Services Provider Saving Time Virtual Machines Professional Services Robot Settings Printing Wireless Alerts SQL Server Technology Care Application Unified Threat Management Download Net Neutrality Hosted Solution Financial Data Typing History Business Communications Browsers Smartwatch Connectivity IT IBM Break Fix Network Congestion Scams Azure Knowledge Hybrid Work Google Drive User Error Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES IoT Communitications Point of Sale Dark Web 5G Cables Experience Google Docs Trends Supply Chain Management Unified Communications Customer Resource management FinTech Bitcoin Network Management Regulations Running Cable Tech Support Competition Google Calendar Term Google Apps Data Analysis Google Wallet Star Wars IT Assessment Microsoft Excel Monitors IT Maintenance Staff Value Business Intelligence Gamification Flexibility Organization Windows 8 Social Networking Laptop Websites Legislation Shortcuts Fileless Malware Digital Security Cameras Drones Smart Devices Ransmoware User Wearable Technology Memory Electronic Medical Records Vendors SharePoint Content Remote Working Health IT Motherboard Data Breach Halloween Comparison Google Play Be Proactive Directions Videos Lenovo Assessment Electronic Health Records IP Address Permissions Writing Workforce Wasting Time Virtual Reality Threats Hacks Server Management Trend Micro Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Recovery Microchip Superfish Internet Exlporer Software as a Service Identity Theft Fraud Fun Meta Managing Costs Twitter Amazon Hard Drives Username Deep Learning eCommerce Error Domains Black Friday SSID Database Surveillance Education Virtual Assistant Social Engineering Outsource IT IT Technicians Virtual Machine Remote Computing Environment Refrigeration Media Proxy Server Reviews Mobile Computing Cookies Public Speaking Cyber Monday Medical IT Small Businesses Tactics Development Tablet Lithium-ion battery Hotspot Transportation Search Best Practice Mirgation Hypervisor Alert Displays Entrepreneur Shopping Managed IT Nanotechnology Optimization Buisness File Sharing PowerPoint Dark Data How To Outsourcing Legal Addiction IT solutions Language Employer/Employee Relationships Business Growth Chatbots Notifications Undo Navigation Management PCI DSS Gig Economy Screen Reader Travel Distributed Denial of Service Workplace Cortana Hiring/Firing Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Alt Codes Identity Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Downtime Unified Threat Management Co-managed IT

Blog Archive