Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

Continue reading
0 Comments

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

Continue reading
0 Comments

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android VoIP Business Management Smartphones Mobile Devices communications Upgrade Managed Service Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Facebook Current Events Covid-19 Gadgets Cloud Computing AI Server Managed Service Provider Remote Work Miscellaneous Holiday Information Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Training Business Continuity Data Management Government Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Two-factor Authentication Mobile Office Data Security Apps Vendor Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 IT Support Tip of the week Marketing Applications How To WiFi Conferencing BDR Virtual Private Network Risk Management Computers Health HIPAA Analytics Website Router Office Tips Augmented Reality Retail Storage Password Help Desk Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Cooperation Free Resource Project Management Physical Security Customer Service Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Document Management Firewall Windows 11 2FA Scam Monitoring Data loss Excel The Internet of Things Remote Workers Going Green Patch Management Social Save Money Telephone Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime VPN YouTube Meetings Data Privacy Images 101 Cryptocurrency Hacking Presentation Multi-Factor Authentication Computer Repair Mobility Telephone System Cost Management Virtual Desktop Wireless Technology Data storage LiFi Outlook Employees Machine Learning Integration Money User Tip Modem Word Humor Processor Mobile Security Maintenance Holidays Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Safety Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Managed IT Service Robot Downloads Settings iPhone Printing Licensing Wireless Content Filtering Entertainment IT Management Customer Relationship Management Vulnerabilities Trends Supply Chain Management Network Congestion Competition Regulations Knowledge Google Calendar Term Google Apps Google Drive User Error Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G Social Networking Experience Legislation Shortcuts Google Docs Organization Unified Communications Fileless Malware Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support User Ransmoware Google Wallet Content Remote Working Wearable Technology Memory Vendors Monitors Motherboard Data Breach Comparison Google Play Be Proactive Health IT Directions Videos Windows 8 IP Address Assessment Electronic Health Records Laptop Websites Permissions Workforce Drones Wasting Time Threats Trend Micro Electronic Medical Records Specifications Security Cameras Workplace Strategies SharePoint Microchip Internet Exlporer Software as a Service Halloween Recovery Fraud Meta Writing Lenovo Username Hard Drives Managing Costs Amazon Domains eCommerce Virtual Reality Black Friday SSID Hacks Server Management Database Surveillance Scary Stories Private Cloud Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Fun Media Superfish Identity Theft Refrigeration Proxy Server Reviews Deep Learning Public Speaking Cookies Twitter Cyber Monday Medical IT Lithium-ion battery Tactics Development Error Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Social Engineering Entrepreneur Education Shopping Nanotechnology Optimization Remote Computing PowerPoint Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Chatbots Search Navigation Management PCI DSS Tablet Undo Gig Economy Best Practice Screen Reader Alert Distributed Denial of Service Workplace Managed IT Service Level Agreement Internet Service Provider Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Identity How To Evernote Paperless Legal Regulations Compliance IT solutions Bookmark Business Growth Smart Tech Memes Notifications Co-managed IT Download Net Neutrality Travel Application Alerts SQL Server Technology Care History Cortana Business Communications Techology Financial Data Google Maps Browsers Smartwatch Alt Codes IBM Connectivity IT Break Fix Scams Upload Procurement Downtime Unified Threat Management Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Unified Threat Management Social Network Telework Hosted Solution CES Typing IoT Communitications Dark Web Cables

Blog Archive