Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your In-House Email Server Worth It? Probably Not

Is Your In-House Email Server Worth It? Probably Not

If you’re like most businesses, you almost certainly rely on email on a daily basis. However, if your email is hosted on an in-house server, you are becoming less like many businesses, as they are moving their solutions to the cloud. Here’s why you should follow suit and make the switch yourself.

Continue reading
0 Comments

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Continue reading
0 Comments

Google Will No Longer Display Results As You Type--Here’s Why

Google Will No Longer Display Results As You Type--Here’s Why

If you hadn’t yet noticed, there’s been a change made to the Google search engine that will influence how search results are presented to users. Google’s ‘Instant’ feature, introduced in 2010, is no more.

Continue reading
0 Comments

Your Computer's Infected... What Do You Do Next?

Your Computer's Infected... What Do You Do Next?

It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that.

Continue reading
0 Comments

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Technology Email Privacy Malware Internet Business Windows 10 Hosted Solutions Productivity Business Computing Computer Microsoft Hardware Gmail Smartphone Google Workplace Tips Windows Office Tips Upgrade Backup Saving Money Data Facebook Internet of Things Small Business IT Services App Smartphones Mobile Devices Innovation User Tips Efficiency Microsoft Office Managed Service Provider IT Support Ransomware Data Management WiFi Miscellaneous Spam Social Media Wireless Technology Passwords Server Data storage LiFi Software Website Mobile Device Management Artificial Intelligence Firewall Business Continuity Safety Disaster Recovery Communication Bring Your Own Device The Internet of Things Browser Apple Administration Big Data Robot Social Going Green End of Support Network Security Network Settings Apps Employer-Employee Relationship Printing Content Filtering Phishing Customer Service Hacking Android Presentation Computers Hacker Office Bitcoin Running Cable Avoiding Downtime Google Wallet Virtual Desktop Two-factor Authentication IP Address Automation Windows 8 Laptop Recovery Drones Marketing Office 365 Mobile Office Writing Hard Drives Outlook Analytics Halloween Domains Word Money Chrome Augmented Reality Retail Refrigeration Humor Hacks Scary Stories Public Speaking Lithium-ion battery Budget Bandwidth Fun Social Engineering Storage Entrepreneur Deep Learning Password Sports Mouse Education Managed IT Services Undo Mobile Computing Search Dark Data VoIP How To Virtualization Business Management Best Practice Current Events Buisness Application Legal IT solutions Business Growth Save Money Gadgets Encryption IBM Cortana Alt Codes Alert Users Downtime Wireless Customer Relationship Management Network Congestion Operating System Hosted Solution Typing Cybercrime Unified Threat Management Competition Computing YouTube Wi-Fi Knowledge Display Google Drive communications Cryptocurrency User Information Technology Risk Management 5G Experience Monitors Google Docs Unified Communications

Blog Archive

Sign Up For Our Newsletter!