Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Hosted Solutions IT Services Collaboration Users Mobile Device Ransomware Quick Tips Small Business Microsoft Cybersecurity Workplace Strategy Communication Passwords Data Backup Smartphone Saving Money Backup Business Management VoIP Smartphones Android Mobile Devices communications Upgrade Browser Disaster Recovery Data Recovery Managed Service Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Automation Facebook Current Events Productivity Artificial Intelligence Cloud Computing Covid-19 Miscellaneous Gadgets Server Remote Work Managed Service Provider Outsourced IT Information Holiday Encryption Spam AI Employee/Employer Relationship Windows 10 Data Management Business Continuity Compliance Office Government Training Bandwidth Business Technology Virtualization Wi-Fi Blockchain Windows 10 Apps Data Security Two-factor Authentication Mobile Office Gmail Budget Managed Services Voice over Internet Protocol Apple App Employer-Employee Relationship Networking Vendor Mobile Device Management Chrome Tip of the week WiFi Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime BYOD Marketing Applications Office 365 Access Control Help Desk Storage Password Bring Your Own Device Retail Big Data Healthcare Managed IT Services Operating System Computers Risk Management HIPAA Router Website Virtual Private Network Analytics Office Tips IT Support Augmented Reality Health 2FA Monitoring Excel Document Management The Internet of Things Remote Workers Social Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Customer Service Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Printer Firewall Paperless Office Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Safety Video Conferencing Sports Machine Learning Managed Services Provider Virtual Machines Professional Services Mouse Saving Time Administration Managed IT Service Maintenance Downloads Antivirus iPhone Licensing Vulnerabilities Customer Relationship Management Entertainment Settings Data Privacy Wireless Printing Images 101 Content Filtering Hacking Multi-Factor Authentication Robot Mobility Presentation Telephone System YouTube Cost Management Cryptocurrency Wireless Technology IT Management Meetings VPN Employees Virtual Desktop LiFi Physical Security Integration Data storage Modem User Tip Word Outlook Processor Computer Repair Mobile Security Holidays Money Humor Hacks Entrepreneur Scary Stories Websites Mirgation Hypervisor Displays Nanotechnology Optimization Fun PowerPoint Shopping SharePoint Deep Learning Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Undo Management PCI DSS Chatbots Education Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Mobile Computing Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Search Co-managed IT Superfish Bookmark Application Best Practice Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Buisness Error History IT solutions Connectivity IT Social Engineering Break Fix Scams IBM Legal Browsers Smartwatch Business Growth Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Cortana Dark Web Cables CES Alt Codes Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Competition Managed IT Customer Resource management FinTech Downtime File Sharing Regulations Data Analysis Hosted Solution Star Wars IT Assessment How To Microsoft Excel IT Maintenance Typing Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras User Google Maps Smart Devices Knowledge Ransmoware Google Drive Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach 5G Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Unified Communications Assessment Electronic Health Records Experience Permissions Workforce IP Address Google Docs Bitcoin Running Cable Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Wallet User Error Microchip Recovery Internet Exlporer Software as a Service Fraud Meta Hard Drives Windows 8 Username Laptop Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Domains Drones Database Surveillance Virtual Assistant Outsource IT Media Refrigeration Network Management Halloween Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Public Speaking Proxy Server Reviews Lithium-ion battery Tactics Development Hotspot Transportation Small Businesses

Blog Archive