Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

Continue reading
0 Comments

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

Continue reading
0 Comments

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Phishing Email Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Quick Tips Ransomware Cybersecurity Mobile Device Microsoft Small Business Data Backup Workplace Strategy Communication Android Saving Money Smartphone Business Management VoIP Smartphones Mobile Devices communications Backup Data Recovery Passwords Managed IT Services Managed Service Social Media Microsoft Office Upgrade Browser Disaster Recovery Tech Term Network Internet of Things Automation Artificial Intelligence Remote Facebook Cloud Computing Covid-19 Server Managed Service Provider Windows Remote Work Miscellaneous Gadgets Information Outsourced IT Productivity Employee/Employer Relationship Current Events Encryption Spam Holiday Windows 10 Government Office Data Management Business Continuity Wi-Fi Compliance Training Business Technology Blockchain AI Windows 10 Virtualization Two-factor Authentication Mobile Office Bandwidth Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Chrome Vendor Gmail Budget Apple Networking App Employer-Employee Relationship Conferencing BYOD Computing Hacker Information Technology Avoiding Downtime Access Control Office 365 Tip of the week Applications WiFi How To BDR Operating System Healthcare Computers Virtual Private Network Risk Management Website Marketing Health Analytics Office Tips Augmented Reality HIPAA Router Retail Storage Password Bring Your Own Device Managed IT Services Big Data Help Desk Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Customer Service Cybercrime Telephone Display Printer Cooperation Free Resource Project Management Windows 7 Paperless Office Infrastructure Microsoft 365 IT Support Solutions Firewall Document Management The Internet of Things Scam Data loss Windows 11 2FA Social Monitoring Excel Going Green Patch Management Save Money Settings Wireless Printing Managed IT Service Content Filtering Hacking IT Management Downloads Presentation VPN iPhone YouTube Meetings Licensing Cryptocurrency Entertainment Wireless Technology Vulnerabilities Computer Repair Data Privacy Images 101 Virtual Desktop LiFi Data storage Telephone System Multi-Factor Authentication Mobility Cost Management Word Outlook Machine Learning Money Humor Employees Integration Maintenance Safety User Tip Modem Antivirus Sports Processor Mouse Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Customer Relationship Management Identity Alt Codes Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Competition Co-managed IT Downtime Unified Threat Management Hosted Solution Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care History Typing Business Communications Financial Data Network Congestion Browsers Smartwatch Connectivity IT Break Fix Scams User Knowledge Physical Security Upload Procurement Google Drive User Error Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework 5G CES IoT Communitications Dark Web Cables Point of Sale Unified Communications Experience Trends Supply Chain Management IP Address Google Docs Regulations Bitcoin Network Management Google Calendar Term Google Apps Running Cable Tech Support Customer Resource management FinTech Monitors Data Analysis Star Wars IT Assessment Google Wallet Microsoft Excel IT Maintenance Recovery Gamification Flexibility Staff Value Business Intelligence Organization Social Networking Hard Drives Windows 8 Legislation Shortcuts Laptop Websites Fileless Malware Digital Security Cameras Smart Devices Domains Drones Ransmoware Wearable Technology Memory Vendors Electronic Medical Records Content Remote Working SharePoint Health IT Motherboard Data Breach Refrigeration Comparison Google Play Be Proactive Halloween Writing Directions Videos Assessment Electronic Health Records Public Speaking Lenovo Permissions Workforce Wasting Time Threats Virtual Reality Lithium-ion battery Trend Micro Hacks Server Management Specifications Security Cameras Workplace Strategies Entrepreneur Scary Stories Private Cloud Fun Microchip Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Managing Costs Amazon Deep Learning Twitter Username eCommerce Undo Black Friday SSID Error Social Engineering Database Surveillance Virtual Assistant Outsource IT Education IT Technicians Virtual Machine Environment Media Remote Computing Proxy Server Reviews Cookies Mobile Computing Cyber Monday Medical IT Search Tactics Development Hotspot Transportation Small Businesses Tablet Mirgation Hypervisor Displays Application Best Practice Alert Shopping Nanotechnology Optimization Managed IT PowerPoint Buisness File Sharing Dark Data How To Addiction IBM Legal Language Employer/Employee Relationships Outsourcing IT solutions Chatbots Business Growth Navigation Notifications Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Travel Cortana Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps

Blog Archive