Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Secret (and Dangerous) Tools Your Team Is Hiding From You

The Secret (and Dangerous) Tools Your Team Is Hiding From You

Let’s assume that, as a responsible business owner, you’ve established standard operating procedures for your employees to follow—including the tools they can officially use in the course of their tasks. That said, there is always the chance that someone encountered an issue and independently investigated and “fixed” it.

If anyone is using an unapproved tool or an external account to access and manipulate your business data, you have a problem… a problem known as shadow IT.

Continue reading

Don’t Skimp on the Antivirus. Here’s Why

Don’t Skimp on the Antivirus. Here’s Why

Antivirus is great and all, but it’s important in business to acknowledge that not all solutions you implement are equal. What seems like a good deal could actually put your business at risk. If your antivirus isn’t reliable, you can’t continue with business with the assurance that everything will be okay.

Continue reading

Illuminating the Concept of the Dark Web

Illuminating the Concept of the Dark Web

Let’s say, for a moment, that somewhere out there is a diligent employee—John—who works for a small business. While John means well, he has the unfortunate habit of using the same password for everything… including the marketing tool his employer has him sign up to use.

A year or two goes by. The company hasn’t touched that marketing tool in months. John has completely forgotten he has an account with it. Meanwhile, that tool experiences a significant data breach, and suddenly, the credentials to almost everything John has ever accessed are now available on the dark web.

Continue reading

A Small Business Owner's Guide to Understanding and Preventing Ransomware

A Small Business Owner's Guide to Understanding and Preventing Ransomware

How much would you be willing to pay to keep all of your business’ records from being locked away, or to keep them off the dark web? Hundreds? Thousands? More?

This is precisely what cybercriminals rely on when they infect businesses just like yours with ransomware. Let’s talk about ransomware a bit: what it is, why it’s so effective, and (most importantly) how to keep it from dragging your business down.

Continue reading

3 Signs You’re Dealing with a Phishing Scam

3 Signs You’re Dealing with a Phishing Scam

Here’s a fun thought experiment; can your team identify phishing scams and respond to them appropriately? It’s a skill that must be learned if you want your organization to be successful and safe. Today, we’re taking a look at the three big signs you’re looking at a phishing scam (and what to do about it).

Continue reading

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Smartphones Data Recovery AI Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Miscellaneous Information Artificial Intelligence Automation Facebook Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Vendor Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Gmail Budget Tip of the week Apple Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime Marketing HIPAA Office 365 Applications Access Control WiFi Retail Healthcare 2FA Managed IT Services Operating System Computers Risk Management Website Router Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Help Desk Bring Your Own Device Big Data Social Remote Workers Telephone Scam Windows 11 Going Green Data loss Customer Service Cooperation Free Resource Excel Project Management Cybercrime Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Printer Firewall Paperless Office Infrastructure Monitoring The Internet of Things Document Management Managed IT Service Maintenance Downloads Antivirus iPhone Customer Relationship Management Licensing Settings Entertainment Supply Chain Printing Vulnerabilities Wireless Content Filtering Hacking Images 101 Presentation YouTube Multi-Factor Authentication Cryptocurrency Robot Mobility Telephone System Cost Management Wireless Technology Virtual Desktop LiFi IT Management Data storage Meetings VPN Employees Integration Word Data Privacy Outlook Modem User Tip Processor Money Computer Repair Mobile Security Humor Holidays Data Storage Safety Smart Technology Sports Video Conferencing Mouse Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Administration Application Best Practice Evernote Amazon Server Management Regulations Compliance Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Memes Buisness Outsource IT Download Net Neutrality IBM Legal Twitter Alerts SQL Server IT solutions Error History Business Growth Environment Financial Data Media Browsers Smartwatch Connectivity IT Social Engineering Break Fix Cortana Small Businesses Upload Procurement Remote Computing Azure Cyber security Alt Codes Multi-Factor Security Tech Displays Social Network Telework CES Tablet IoT Communitications Competition Dark Web Downtime Hosted Solution Outsourcing Trends Supply Chain Management Alert File Sharing Regulations Typing Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Data Analysis Workplace Star Wars IT Assessment How To Microsoft Excel User Knowledge Hiring/Firing Gamification Flexibility Google Drive Notifications Staff Value Paperless Travel Social Networking Legislation Organization 5G Techology Fileless Malware Digital Security Cameras Co-managed IT Google Maps Smart Devices Unified Communications Experience Technology Care Content Remote Working IP Address Google Docs Wearable Technology Memory Business Communications Unified Threat Management Motherboard Data Breach Bitcoin Comparison Google Play Running Cable Health IT Unified Threat Management Directions Videos Scams Assessment Electronic Health Records Google Wallet Permissions Recovery Hybrid Work Wasting Time Human Resources Trend Micro Hard Drives Windows 8 Network Congestion Specifications Security Cameras Laptop User Error Microchip Cables Internet Exlporer Software as a Service Domains Drones Fraud Username Managing Costs Google Apps Point of Sale eCommerce Refrigeration Black Friday SSID Halloween IT Maintenance Database Surveillance Public Speaking Virtual Assistant Business Intelligence Network Management Lithium-ion battery Tech Support IT Technicians Virtual Machine Shortcuts Cookies Hacks Monitors Cyber Monday Medical IT Entrepreneur Scary Stories Proxy Server Reviews Fun Ransmoware Tactics Development Hotspot Transportation Deep Learning Vendors Websites Mirgation Hypervisor Be Proactive Nanotechnology Optimization Undo PowerPoint Shopping SharePoint Workforce Addiction Electronic Medical Records Language Employer/Employee Relationships Education Navigation Threats Management PCI DSS Chatbots Workplace Strategies Screen Reader Mobile Computing Writing Distributed Denial of Service Lenovo Gig Economy Search Meta Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork

Blog Archive