Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

Continue reading
0 Comments

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

Continue reading
0 Comments

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Training Compliance Covid-19 Gadgets Cloud Computing Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Managed Services Mobile Office Data Security Apps Vendor Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Managed IT Services How To BDR HIPAA Computing Physical Security 2FA Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Big Data Operating System Router Customer Service Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Document Management Managed IT Service Free Resource Firewall Project Management Telephone Scam Windows 7 Data loss Microsoft 365 The Internet of Things Cooperation Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Data Storage Cryptocurrency User Tip Supply Chain Modem Hacking Presentation Computer Repair Mobile Security Video Conferencing Processor Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Wireless Technology Data storage Smart Technology Outlook Machine Learning Money Saving Time iPhone Word Humor Vulnerabilities Data Privacy Maintenance Antivirus Sports Downloads Images 101 Mouse Licensing Multi-Factor Authentication Safety Mobility Administration Entertainment Robot Employees Telephone System Cost Management Integration Settings Wireless Printing Content Filtering IT Management Customer Relationship Management Holidays VPN YouTube Meetings Hypervisor Displays Username 5G Black Friday Shopping Optimization PowerPoint Point of Sale Employer/Employee Relationships Outsourcing Unified Communications Database Experience Google Docs PCI DSS Bitcoin Network Management Navigation Running Cable Tech Support IT Technicians User Monitors Cyber Monday Gig Economy Google Wallet Proxy Server Workplace Cookies Teamwork Hiring/Firing Tactics Hotspot Internet Service Provider Regulations Compliance Windows 8 IP Address Evernote Paperless Laptop Websites Mirgation Memes Drones Co-managed IT Nanotechnology SQL Server Technology Care Addiction Electronic Medical Records Language Net Neutrality SharePoint Financial Data History Management Business Communications Halloween Chatbots Recovery Hard Drives Writing Distributed Denial of Service Smartwatch IT Lenovo Scams Screen Reader Azure Hybrid Work Service Level Agreement Domains Virtual Reality Computing Infrastructure Procurement Telework Cyber security Hacks Server Management Tech Human Resources Scary Stories Private Cloud Identity Refrigeration Fun CES Communitications Superfish Bookmark Cables Identity Theft Smart Tech Deep Learning Download Public Speaking Twitter Alerts Supply Chain Management FinTech Lithium-ion battery Term Google Apps Error Social Engineering Break Fix Entrepreneur IT Assessment Browsers IT Maintenance Education Connectivity Value Business Intelligence Upload Remote Computing Flexibility Organization Mobile Computing Social Network Shortcuts Multi-Factor Security Tablet IoT Undo Search Dark Web Digital Security Cameras Smart Devices Ransmoware Memory Vendors Best Practice Trends Alert Remote Working Dark Data Google Calendar Data Breach Managed IT Customer Resource management Google Play Be Proactive Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Videos Electronic Health Records Legal Data Analysis Workforce Wasting Time Threats Business Growth Gamification Notifications Staff Legislation Trend Micro Security Cameras Workplace Strategies Travel Social Networking Application Google Maps Cortana Software as a Service Techology Fileless Malware Meta Managing Costs Amazon Alt Codes Content IBM Wearable Technology Comparison eCommerce Health IT SSID Downtime Unified Threat Management Motherboard Hosted Solution Assessment Permissions Surveillance Unified Threat Management Directions Virtual Assistant Outsource IT Virtual Machine Environment Typing Media Network Congestion Specifications Reviews Medical IT Internet Exlporer Competition Knowledge Fraud Development Google Drive User Error Microchip Transportation Small Businesses

Blog Archive