Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Internet Business Computing Computer Network Security Business Data Hosted Solutions Software IT Services Efficiency Innovation User Tips Android Data Backup Mobile Devices Google Microsoft Hardware Smartphone Communication Browser Windows 10 Business Management Small Business Workplace Tips Productivity Data Recovery Artificial Intelligence Ransomware Productivity Internet of Things Managed Service Provider Backup Gmail Data Management Facebook Smartphones IT Support Social Media Server Microsoft Office App Encryption Saving Money Collaboration Two-factor Authentication Disaster Recovery Passwords Managed IT Services Mobile Device Upgrade Information communications Applications Cloud Computing Managed Service Miscellaneous Business Technology Cybersecurity Windows 10 Windows Office 365 Office Tips Automation Spam Phishing Bandwidth BYOD Holiday Website VoIP Outsourced IT Mobile Device Management Going Green Blockchain Firewall BDR Computing The Internet of Things Printer WiFi Big Data Access Control Social Apps Employer-Employee Relationship Infrastructure IT Support Users Tip of the week Paperless Office Government Scam Business Continuity Sports Hacker Mouse Antivirus Office Wireless Technology Bring Your Own Device Document Management Maintenance Apple Administration Data Security Cost Management Vulnerability Network Robot Settings Printing Content Filtering End of Support HIPAA Cybercrime Wi-Fi Safety Vendor Quick Tips Risk Management Mobile Security Data storage LiFi Analytics Money Chrome Augmented Reality Saving Time Customer Service Hacking Presentation Storage Computers Managed IT Services Retail Telephone User Google Calendar Password Connectivity Education Browsers Term Upload Licensing Networking Social Engineering IP Address Social Network Avoiding Downtime Compliance Legislation Mobile Computing IoT Dark Web Search Entertainment Mobility Trends Cooperation Best Practice Identity Theft Marketing Data loss Buisness Mobile Office Customer Resource management Recovery Regulations Comparison Current Events Hard Drives Star Wars Legal Microsoft Excel Patch Management IT solutions Tech Support Data Analysis Dark Data Google Play Domains Gamification Word Staff Techology Business Growth How To Telephone System Social Networking Specifications Refrigeration Websites Cortana Fileless Malware Security Cameras Public Speaking Content Wearable Technology Unified Threat Management Alt Codes Tablet Remote Monitoring Downtime Save Money Wireless Lithium-ion battery Health IT Motherboard Black Friday Assessment Operating System Entrepreneur Permissions VPN Hosted Solution Machine Learning Directions User Error Typing Cyber Monday IT Management YouTube Vendor Management Router Microchip Undo Internet Exlporer Google Drive Fraud Virtual Private Network Error Knowledge Google Maps Network Congestion Username Cryptocurrency Modem Smart Technology Information Technology Electronic Medical Records 5G User Tip Processor Virtualization Database Google Docs Unified Communications Experience Running Cable Display IT Technicians Bitcoin Cookies Distributed Denial of Service Google Wallet Network Management Virtual Desktop Virtual Reality Proxy Server Application Navigation Tactics Hotspot Travel Laptop Monitors IBM Monitoring Mirgation SharePoint Windows 8 Gadgets Nanotechnology Managed IT Service Drones Remote Computing Help Desk Evernote Addiction Outlook Language Lenovo Unified Threat Management Halloween Customer Relationship Management Management Chatbots Downloads Screen Reader Break Fix Alert Healthcare Competition Service Level Agreement Humor Computing Infrastructure Superfish Scary Stories Writing Conferencing Identity Multi-Factor Security Hacks Smart Tech Budget Server Management Fun Bookmark Tech Download Alerts Deep Learning

Sign Up For Our Newsletter!