Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

Continue reading
0 Comments

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Data Recovery AI Android Upgrade Disaster Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Tip of the week Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple How To BDR Computing Hacker HIPAA Information Technology Avoiding Downtime Applications Marketing Access Control Office 365 Conferencing Managed IT Services Operating System Computers Router Risk Management Virtual Private Network Website Health 2FA Analytics Office Tips Help Desk Augmented Reality Storage Retail Password Healthcare Bring Your Own Device Big Data Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring End of Support Vulnerability Cybercrime Vendor Management Solutions Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Telephone Scam Data loss Entertainment Vulnerabilities Data Privacy Images 101 Customer Relationship Management Multi-Factor Authentication Robot Mobility Telephone System Settings Cost Management Wireless Printing Content Filtering Hacking Presentation YouTube IT Management Meetings Cryptocurrency VPN Employees Wireless Technology Integration Modem User Tip Processor Virtual Desktop Computer Repair Mobile Security Data storage LiFi Holidays Word Outlook Data Storage Smart Technology Supply Chain Money Video Conferencing Humor Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Safety Sports Managed IT Service Mouse Maintenance Downloads Antivirus iPhone Administration Licensing Cyber security Multi-Factor Security Tech Human Resources Application Best Practice Social Network Telework CES Buisness Tablet IoT Communitications Dark Web Cables IBM Legal IT solutions Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Business Growth Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Gamification Flexibility Cortana Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Alt Codes Organization Techology Fileless Malware Digital Security Cameras Downtime Google Maps Smart Devices Ransmoware Competition Hosted Solution Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Typing Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Google Drive User Knowledge Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service 5G Fraud Meta IP Address Google Docs Unified Communications Username Experience Managing Costs Amazon Running Cable Point of Sale eCommerce Black Friday SSID Bitcoin Google Wallet Database Surveillance Virtual Assistant Outsource IT Media Recovery Network Management Tech Support IT Technicians Virtual Machine Environment Laptop Cookies Monitors Cyber Monday Medical IT Hard Drives Windows 8 Proxy Server Reviews Domains Drones Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Halloween Nanotechnology Optimization PowerPoint Refrigeration Shopping Public Speaking SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Lithium-ion battery Management PCI DSS Chatbots Entrepreneur Scary Stories Screen Reader Writing Distributed Denial of Service Workplace Hacks Lenovo Gig Economy Service Level Agreement Internet Service Provider Fun Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Deep Learning Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Undo Superfish Bookmark Education Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Mobile Computing Upload Procurement Search Remote Computing Azure Hybrid Work

Blog Archive