Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Google Workplace Tips Computer Privacy Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Small Business Communication Smartphones Mobile Device Workplace Strategy Business Management Mobile Devices communications Android Smartphone VoIP Saving Money Managed IT Services Microsoft Office Browser Managed Service Data Recovery Social Media Passwords Disaster Recovery Network Upgrade Backup Tech Term Internet of Things Automation Cloud Computing Covid-19 Remote Artificial Intelligence Remote Work Server Managed Service Provider Facebook Miscellaneous Gadgets Spam Encryption Windows Holiday Employee/Employer Relationship Windows 10 Information Outsourced IT Government Data Management Business Continuity Blockchain Business Technology Productivity Wi-Fi Windows 10 Bandwidth Compliance Virtualization Current Events Apps Two-factor Authentication Data Security Chrome Gmail Budget Apple Employer-Employee Relationship App Vendor Managed Services Voice over Internet Protocol Office Networking Mobile Device Management Conferencing Access Control Hacker Applications Computing Avoiding Downtime Information Technology Mobile Office How To BDR Office 365 Augmented Reality BYOD Storage Password WiFi Bring Your Own Device Big Data Virtual Private Network Training Health Computers Router Operating System Retail Risk Management Website Managed IT Services Marketing Help Desk Office Tips Analytics Remote Monitoring AI Vulnerability End of Support Solutions Vendor Management Telephone The Internet of Things Windows 11 Display Cooperation Printer Social Excel Paperless Office Infrastructure Going Green Tip of the week Customer Service Document Management HIPAA Cybercrime Remote Workers Healthcare Scam Data loss Monitoring Free Resource Project Management Windows 7 Firewall Patch Management Microsoft 365 Save Money IT Support Money Humor Managed IT Service Safety IT Management Downloads Employees VPN Meetings Integration Licensing Sports Mouse 2FA Entertainment Supply Chain Computer Repair Administration Holidays Data Storage Telephone System Customer Relationship Management Cost Management Video Conferencing Managed Services Provider Machine Learning Settings Virtual Machines Professional Services Printing Hacking Wireless Presentation Content Filtering Maintenance Data Privacy YouTube Wireless Technology Antivirus User Tip Modem Mobile Security Cryptocurrency Processor iPhone Vulnerabilities Virtual Desktop Word Data storage Smart Technology LiFi Images 101 Saving Time Multi-Factor Authentication Outlook Mobility Robot Remote Working Entrepreneur Memory Amazon Identity Bookmark Data Breach Unified Threat Management Smart Tech Google Play Outsource IT Alerts Hacks Scary Stories Videos Unified Threat Management Electronic Health Records Download Fun Wasting Time Environment Media Undo Deep Learning Browsers Trend Micro Connectivity Security Cameras Network Congestion Break Fix Physical Security Small Businesses User Error Software as a Service Upload Social Network Managing Costs Displays Multi-Factor Security Education eCommerce Point of Sale IoT SSID Dark Web Trends Virtual Assistant Outsourcing Mobile Computing Application Surveillance Search Network Management Customer Resource management Virtual Machine Tech Support Regulations Google Calendar Workplace Microsoft Excel Best Practice IBM Reviews Data Analysis Star Wars Medical IT Monitors Gamification Transportation Hiring/Firing Staff Buisness Development Hypervisor Websites Social Networking Legal Paperless Legislation IT solutions Co-managed IT Business Growth Shopping Fileless Malware Optimization PowerPoint Content Employer/Employee Relationships Electronic Medical Records Technology Care Wearable Technology SharePoint Competition Cortana PCI DSS Health IT Motherboard Navigation Business Communications Comparison Writing Scams Permissions Alt Codes Gig Economy Lenovo Directions Assessment Teamwork Virtual Reality Hybrid Work Downtime Internet Service Provider Regulations Compliance Server Management Private Cloud Evernote Human Resources Specifications Hosted Solution Cables Fraud Typing User Superfish Microchip Memes Identity Theft Internet Exlporer Username SQL Server Twitter Net Neutrality Knowledge Financial Data History Error Google Drive Google Apps Black Friday Social Engineering IT Maintenance IP Address Smartwatch IT Database Procurement Azure Remote Computing Business Intelligence IT Technicians 5G Experience Telework Proxy Server Cyber security Cookies Google Docs Tech Shortcuts Cyber Monday Unified Communications Ransmoware Hotspot Bitcoin Running Cable CES Recovery Communitications Tablet Tactics Supply Chain Management Alert Vendors Mirgation Google Wallet Hard Drives Domains FinTech Managed IT File Sharing Nanotechnology Term Dark Data Be Proactive How To Workforce Language Windows 8 Laptop IT Assessment Addiction Flexibility Management Value Notifications Threats Chatbots Drones Refrigeration Public Speaking Organization Travel Screen Reader Workplace Strategies Distributed Denial of Service Meta Computing Infrastructure Lithium-ion battery Halloween Digital Security Cameras Techology Smart Devices Google Maps Service Level Agreement

Blog Archive