Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Gmail Apple Networking App WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Voice over Internet Protocol Managed IT Services How To BDR Computing Physical Security Information Technology HIPAA Applications Hacker Access Control Office 365 Avoiding Downtime Marketing Conferencing Healthcare Big Data Operating System Virtual Private Network Risk Management Router Computers Health Office Tips Analytics Website 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Telephone The Internet of Things Going Green Patch Management Cooperation Free Resource Project Management Save Money Windows 7 Social Remote Monitoring Vulnerability End of Support Vendor Management Microsoft 365 Cybercrime Solutions Display Customer Service Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Scam Managed IT Service Remote Workers Data loss Administration Downloads iPhone Safety Licensing Vulnerabilities Entertainment Data Privacy Robot Settings Images 101 Printing Wireless Telephone System Multi-Factor Authentication Mobility Content Filtering Cost Management IT Management VPN YouTube Meetings Customer Relationship Management Cryptocurrency Computer Repair Employees Integration Hacking Virtual Desktop Presentation User Tip Data storage Modem LiFi Mobile Security Processor Wireless Technology Outlook Holidays Machine Learning Data Storage Money Smart Technology Supply Chain Humor Video Conferencing Word Managed Services Provider Professional Services Saving Time Virtual Machines Maintenance Antivirus Sports Mouse Entrepreneur Download Net Neutrality Mobile Computing Alerts SQL Server Technology Care Financial Data History Tablet Business Communications Search Break Fix Scams Alert Browsers Smartwatch Connectivity IT Best Practice Upload Procurement Managed IT Azure Hybrid Work Buisness File Sharing Dark Data Undo Social Network Telework Legal Cyber security IT solutions Multi-Factor Security Tech Human Resources How To Dark Web Cables Notifications CES IoT Communitications Business Growth Trends Supply Chain Management Travel Customer Resource management FinTech Techology Regulations Google Maps Google Calendar Term Google Apps Cortana Microsoft Excel IT Maintenance Application Data Analysis Star Wars IT Assessment Alt Codes Gamification Flexibility Staff Value Business Intelligence Downtime Unified Threat Management IBM Organization Unified Threat Management Social Networking Hosted Solution Legislation Shortcuts Smart Devices Typing Ransmoware Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Network Congestion Comparison Google Play Be Proactive Knowledge Health IT Google Drive User Error Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Directions Videos Wasting Time Threats Point of Sale 5G Competition Specifications Security Cameras Workplace Strategies Experience Google Docs Trend Micro Unified Communications Internet Exlporer Software as a Service Bitcoin Network Management Fraud Meta Running Cable Tech Support Microchip Username Google Wallet Managing Costs Amazon Monitors Black Friday SSID User eCommerce Database Surveillance Windows 8 Virtual Assistant Outsource IT Laptop Websites Drones IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Electronic Medical Records IP Address Proxy Server Reviews SharePoint Cookies Tactics Development Hotspot Transportation Small Businesses Halloween Lenovo Mirgation Hypervisor Displays Writing PowerPoint Virtual Reality Recovery Shopping Nanotechnology Optimization Addiction Hacks Server Management Language Employer/Employee Relationships Outsourcing Scary Stories Private Cloud Hard Drives Domains Management PCI DSS Superfish Chatbots Identity Theft Navigation Fun Distributed Denial of Service Workplace Twitter Gig Economy Screen Reader Deep Learning Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Error Refrigeration Public Speaking Regulations Compliance Identity Education Evernote Paperless Social Engineering Co-managed IT Remote Computing Lithium-ion battery Bookmark Smart Tech Memes

Blog Archive