Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Continue reading
0 Comments

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

How to Turn a Security Risk into a Security Solution

How to Turn a Security Risk into a Security Solution

Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like ransomware, on the other hand, could be a business-ender. When a lack of engagement meets security issues, you create a whole other monster that could strike your business when you least expect it.

Continue reading
0 Comments

Tip of the Week: New Windows 10 Features

Tip of the Week: New Windows 10 Features

Windows 10 received its second update in 2018. While some experts believe that this second update is too much, others look at it and are happy that more features and functionality is being added. Today, we’re going to dig into the details about this update, as well as some of the helpful features that you can take advantage of.

Continue reading
0 Comments

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Tech Term Internet Computer Network Security Hosted Solutions Business Data Efficiency Innovation Software IT Services Mobile Devices User Tips Data Backup Android Microsoft Google Smartphone Hardware Communication Browser Workplace Tips Productivity Windows 10 Business Management Small Business Productivity Data Recovery Artificial Intelligence Ransomware Smartphones Social Media Managed Service Provider Internet of Things Backup Gmail Data Management Facebook IT Support Two-factor Authentication Server Microsoft Office Collaboration App Saving Money Encryption Spam Office 365 Windows Office Tips Phishing Managed IT Services Mobile Device Bandwidth Passwords Information Disaster Recovery Applications Upgrade Managed Service Cloud Computing Business Technology Cybersecurity Windows 10 Automation communications Miscellaneous Government Scam Apps Employer-Employee Relationship BYOD Users Holiday IT Support Outsourced IT Blockchain Business Continuity Website BDR VoIP Mobile Device Management Printer Firewall Access Control Going Green The Internet of Things WiFi Infrastructure Tip of the week Computing Big Data Paperless Office Social Risk Management Antivirus LiFi Data storage Document Management Maintenance Analytics Customer Service Data Security Hacking Augmented Reality Presentation Computers Money Chrome Hacker Office Wireless Technology Vulnerability Cost Management Robot Storage Sports Mouse Bring Your Own Device End of Support HIPAA Vendor Router Apple Administration Quick Tips Modem Mobile Security Network Settings Safety Printing Content Filtering Cybercrime Saving Time Wi-Fi Server Management Bookmark Information Technology Smart Tech 5G Unified Communications Alerts Experience IBM Tech Gadgets Google Docs Download Managed IT Services Telephone Bitcoin Retail Running Cable Google Calendar Browsers Google Wallet Connectivity Virtual Desktop Licensing Customer Relationship Management Networking Term Upload Social Network Windows 8 Social Engineering Compliance Laptop Legislation Competition Entertainment Drones IoT Dark Web Cooperation Mobility Outlook Identity Theft Trends Data loss Customer Resource management Regulations Halloween Comparison Patch Management Data Analysis Tech Support Star Wars Microsoft Excel Dark Data Staff User Techology Google Play Humor Gamification Telephone System Hacks How To Social Networking Scary Stories Specifications Fun Fileless Malware Budget Websites Deep Learning Wearable Technology IP Address Avoiding Downtime Unified Threat Management Security Cameras Tablet Content Remote Monitoring Health IT Password Save Money Motherboard Black Friday VPN Directions Machine Learning Assessment Education Permissions Mobile Office Recovery User Error SSID Marketing IT Management Mobile Computing Vendor Management Hard Drives Cyber Monday Fraud Search Domains Word Virtual Private Network Microchip Error Internet Exlporer Username Best Practice Network Congestion Google Maps User Tip Current Events Electronic Medical Records Buisness Refrigeration Smart Technology Public Speaking Processor Legal Database IT solutions Business Growth Display IT Technicians Lithium-ion battery Entrepreneur Network Management Proxy Server Virtual Reality Cookies Distributed Denial of Service Hotspot Cortana Navigation Travel Tactics Monitoring Alt Codes Monitors Mirgation SharePoint Help Desk Remote Computing Nanotechnology Downtime Wireless Undo Managed IT Service Language Lenovo Evernote Operating System Unified Threat Management Addiction Hosted Solution Management Typing Chatbots Downloads Break Fix Alert Screen Reader YouTube Virtualization Computing Infrastructure Knowledge Superfish Healthcare Google Drive Service Level Agreement Conferencing Cryptocurrency Writing Identity Application Multi-Factor Security

Sign Up For Our Newsletter!