Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Backup Communication Passwords Data Backup Saving Money Smartphone Android Managed Service VoIP Business Management Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services Current Events AI Tech Term Network Remote Internet of Things Facebook Automation Artificial Intelligence Gadgets Cloud Computing Holiday Covid-19 Miscellaneous Training Information Server Remote Work Managed Service Provider Outsourced IT Encryption Compliance Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Virtualization Wi-Fi Blockchain Business Technology IT Support Bandwidth Windows 10 Data Security Apps Two-factor Authentication Vendor Mobile Office Gmail Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget How To Conferencing WiFi BDR Computing Information Technology Hacker Access Control HIPAA Avoiding Downtime Office 365 Applications Marketing Tip of the week Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Risk Management Virtual Private Network Computers Health Router Analytics Office Tips Website Augmented Reality Retail Storage Help Desk Password Scam Excel Data loss The Internet of Things Remote Workers Telephone Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cooperation Free Resource Project Management Cybercrime Windows 7 Physical Security Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Document Management Windows 11 Firewall 2FA Monitoring Video Conferencing Mouse Managed Services Provider Saving Time Safety Virtual Machines Professional Services Administration Managed IT Service Downloads Robot iPhone Licensing Settings Entertainment Wireless Vulnerabilities Printing Content Filtering Data Privacy IT Management Customer Relationship Management YouTube Meetings Images 101 VPN Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Hacking Computer Repair Presentation Virtual Desktop Data storage LiFi Wireless Technology Employees Integration Outlook User Tip Modem Machine Learning Processor Mobile Security Money Word Humor Holidays Maintenance Data Storage Smart Technology Supply Chain Antivirus Sports Education Social Engineering Addiction Language Employer/Employee Relationships Outsourcing Entrepreneur Chatbots Navigation Remote Computing Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Tablet Search Service Level Agreement Internet Service Provider Undo Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Best Practice Alert Regulations Compliance Bookmark Dark Data Smart Tech Memes Co-managed IT Managed IT Buisness File Sharing Legal IT solutions How To Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Business Growth Notifications Financial Data Travel Browsers Smartwatch Connectivity IT Application Break Fix Scams Techology Google Maps Cortana Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework IBM Downtime Unified Threat Management CES IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Regulations Google Calendar Term Google Apps Typing Customer Resource management FinTech Data Analysis Network Congestion Star Wars IT Assessment Microsoft Excel IT Maintenance Google Drive User Error Knowledge Gamification Flexibility Competition Staff Value Business Intelligence Social Networking Legislation Shortcuts Organization Point of Sale Fileless Malware Digital Security Cameras 5G Smart Devices Ransmoware Google Docs Unified Communications Experience Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach User Comparison Google Play Be Proactive Bitcoin Network Management Running Cable Tech Support Health IT Directions Videos Monitors Assessment Electronic Health Records Permissions Workforce Google Wallet Wasting Time Threats IP Address Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 Laptop Websites Microchip Internet Exlporer Software as a Service Fraud Meta Drones Managing Costs Amazon SharePoint Electronic Medical Records Username eCommerce Recovery Black Friday SSID Halloween Writing Database Surveillance Hard Drives Virtual Assistant Outsource IT Lenovo IT Technicians Virtual Machine Environment Media Virtual Reality Domains Proxy Server Reviews Cookies Cyber Monday Medical IT Hacks Server Management Scary Stories Private Cloud Identity Theft Fun Tactics Development Refrigeration Hotspot Transportation Small Businesses Superfish Mirgation Hypervisor Displays Deep Learning Twitter Public Speaking Shopping Lithium-ion battery Nanotechnology Optimization PowerPoint Error

Blog Archive