Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

Continue reading
0 Comments

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

Continue reading
0 Comments

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Security is a hot-button issue for all types of businesses, but cyber security is such a complex subject that it’s difficult to jam-pack its many intricacies into one blog article. Sometimes understanding just a few ways to improve your business’s security practices can be a significant benefit for your organization.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Internet Business Computing Computer Network Security Business Data Hosted Solutions Software Efficiency Innovation IT Services User Tips Android Data Backup Mobile Devices Microsoft Hardware Smartphone Communication Browser Google Productivity Windows 10 Business Management Small Business Workplace Tips Productivity Data Recovery Ransomware Artificial Intelligence IT Support Managed Service Provider Backup Gmail Data Management Facebook Smartphones Internet of Things Social Media App Encryption Server Microsoft Office Two-factor Authentication Saving Money Collaboration Passwords communications Managed IT Services Upgrade Mobile Device Information Windows Office 365 Office Tips Applications Managed Service Bandwidth Miscellaneous Cloud Computing Business Technology Disaster Recovery Cybersecurity Windows 10 Spam Automation Phishing Paperless Office Going Green Government Scam BYOD Computing Website Holiday Mobile Device Management Outsourced IT Blockchain Firewall IT Support BDR The Internet of Things WiFi Printer Big Data Business Continuity Social Access Control Apps Employer-Employee Relationship Users VoIP Infrastructure Tip of the week Hacking Presentation Computers Hacker Network Office Settings Printing Wireless Technology Content Filtering Antivirus Cybercrime Document Management Maintenance Wi-Fi Data Security Risk Management Cost Management Data storage LiFi Vulnerability Robot HIPAA Router Safety Vendor Analytics End of Support Money Chrome Augmented Reality Modem Mobile Security Quick Tips Storage Sports Mouse Bring Your Own Device Apple Administration Saving Time Customer Service Bookmark Business Growth Superfish Smart Tech Tech Multi-Factor Security Download Alerts Writing Cortana Telephone Server Management User Browsers Alt Codes Connectivity Term Google Calendar Upload Downtime Managed IT Services Licensing Wireless Retail Compliance Operating System IP Address Social Network Hosted Solution Avoiding Downtime Entertainment Typing Networking IoT Dark Web Mobility Legislation Trends YouTube Cooperation Social Engineering Regulations Knowledge Marketing Google Drive Mobile Office Customer Resource management Recovery Data Analysis Cryptocurrency Hard Drives Star Wars Identity Theft Microsoft Excel Google Play Information Technology Comparison Domains Gamification Data loss Word Staff 5G Social Networking Experience Tech Support Google Docs Telephone System Unified Communications Patch Management Fileless Malware Bitcoin Techology Refrigeration Running Cable Dark Data Security Cameras Google Wallet Specifications Public Speaking Content Virtual Desktop Wearable Technology How To Motherboard Websites Lithium-ion battery Health IT Directions Windows 8 Unified Threat Management Assessment Laptop Tablet Entrepreneur Permissions SSID Drones Black Friday Remote Monitoring Save Money Machine Learning Outlook VPN Microchip User Error Undo Internet Exlporer Halloween Fraud Cyber Monday Username IT Management Vendor Management Error Humor User Tip Virtual Private Network Processor Hacks Virtualization Database Scary Stories Google Maps Network Congestion Budget Smart Technology IT Technicians Fun Electronic Medical Records Application Cookies Proxy Server Deep Learning Navigation Password Tactics Hotspot Display Gadgets Distributed Denial of Service IBM Monitoring Education Network Management Mirgation Virtual Reality Nanotechnology Travel Help Desk Evernote Mobile Computing SharePoint Addiction Language Monitors Remote Computing Managed IT Service Customer Relationship Management Management Chatbots Search Best Practice Lenovo Screen Reader Unified Threat Management Healthcare Current Events Downloads Competition Service Level Agreement Buisness Computing Infrastructure Identity Alert Legal Break Fix Conferencing IT solutions

Sign Up For Our Newsletter!