Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

Continue reading
0 Comments

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

Continue reading
0 Comments

Tip of the Week: How to Grow Your Professional Network Using Facebook

b2ap3_thumbnail_social_media_networking_400.jpgFacebook is a powerful networking tool that can help you build relationships with new professionals and introduce your product or service to entirely new markets and groups of people. That is if you know how to use it. Here are five steps you can take to get started with Facebook and use it to build a professional network.

Continue reading
0 Comments

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Tech Term Internet Computer Network Security Hosted Solutions Business Data Efficiency Innovation Software IT Services Data Backup Android Mobile Devices User Tips Communication Browser Microsoft Google Hardware Smartphone Business Management Small Business Workplace Tips Productivity Windows 10 Productivity Artificial Intelligence Ransomware Data Recovery Facebook Smartphones IT Support Social Media Internet of Things Managed Service Provider Backup Gmail Data Management Collaboration Two-factor Authentication Server Microsoft Office Saving Money App Encryption Managed Service communications Cloud Computing Miscellaneous Business Technology Cybersecurity Windows 10 Automation Spam Windows Office 365 Office Tips Phishing Bandwidth Passwords Disaster Recovery Managed IT Services Mobile Device Upgrade Information Applications Printer The Internet of Things WiFi Computing Access Control Big Data Social Apps Employer-Employee Relationship Infrastructure Users Tip of the week Paperless Office IT Support Government Scam BYOD Business Continuity Holiday Website Blockchain Outsourced IT Mobile Device Management VoIP Firewall Going Green BDR Printing Content Filtering Quick Tips Cybercrime Wi-Fi Risk Management Saving Time Data storage LiFi Analytics Customer Service Hacking Chrome Presentation Augmented Reality Computers Money Hacker Office Antivirus Document Management Wireless Technology Storage Maintenance Sports Mouse Data Security Bring Your Own Device Cost Management Apple Administration HIPAA Vulnerability Vendor Robot Router Network End of Support Modem Mobile Security Safety Settings Downtime Error Undo Wireless IT Technicians Virtual Private Network Operating System Hosted Solution Google Maps Proxy Server Network Congestion Cookies Hotspot Smart Technology Typing Navigation Electronic Medical Records Tactics YouTube Virtualization Monitoring Mirgation Google Drive Help Desk Knowledge Display Nanotechnology Language Distributed Denial of Service Cryptocurrency Network Management Evernote Virtual Reality Application Addiction Travel Management 5G Chatbots Information Technology Google Docs SharePoint Unified Communications IBM Experience Monitors Screen Reader Gadgets Service Level Agreement Computing Infrastructure Managed IT Service Bitcoin Healthcare Running Cable Remote Computing Virtual Desktop Unified Threat Management Conferencing Identity Google Wallet Lenovo Downloads Customer Relationship Management Bookmark Smart Tech Download Alerts Break Fix Windows 8 Tech Laptop Alert Competition Telephone Drones Superfish Outlook Multi-Factor Security Browsers Writing Connectivity Upload Licensing Server Management Term Halloween Social Network Compliance Dark Web Humor Google Calendar Managed IT Services Entertainment Retail User IoT Trends Cooperation Hacks Mobility Scary Stories Budget Networking Customer Resource management Fun Regulations Microsoft Excel Legislation Deep Learning IP Address Data Analysis Social Engineering Avoiding Downtime Star Wars Gamification Staff Password Google Play Education Identity Theft Telephone System Social Networking Marketing Comparison Data loss Mobile Office Fileless Malware Recovery Tech Support Hard Drives Content Wearable Technology Mobile Computing Patch Management Security Cameras Techology Domains Health IT Search Dark Data Word Motherboard Permissions Specifications Best Practice Directions How To Assessment Buisness Websites Refrigeration Current Events SSID Legal Unified Threat Management IT solutions Tablet Public Speaking Fraud Black Friday Business Growth Remote Monitoring Lithium-ion battery Microchip Save Money Internet Exlporer Machine Learning Username Entrepreneur VPN User Error User Tip Cortana Cyber Monday Alt Codes IT Management Processor Vendor Management Database

Sign Up For Our Newsletter!