Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Tech Term Internet Computer Network Security Hosted Solutions Business Data Innovation IT Services Software Efficiency Mobile Devices User Tips Data Backup Android Google Microsoft Smartphone Hardware Communication Browser Small Business Workplace Tips Productivity Windows 10 Business Management Artificial Intelligence Ransomware Data Recovery Productivity Smartphones Social Media Internet of Things Managed Service Provider Backup Gmail Data Management IT Support Facebook App Encryption Server Microsoft Office Collaboration Saving Money Two-factor Authentication Miscellaneous Bandwidth Managed IT Services Spam Mobile Device Disaster Recovery Phishing Passwords Cloud Computing Business Technology Cybersecurity Upgrade communications Windows 10 Automation Information Applications Office 365 Managed Service Windows Office Tips IT Support Big Data Social Holiday Business Continuity Apps Employer-Employee Relationship Outsourced IT Users VoIP BDR Going Green Printer Website Access Control Blockchain Mobile Device Management Computing Firewall Infrastructure Tip of the week Paperless Office Government Scam The Internet of Things WiFi BYOD Document Management Chrome Augmented Reality Maintenance Money Data Security Saving Time Storage Sports Mouse Bring Your Own Device Vulnerability Robot Customer Service Administration Hacking Apple Presentation Computers Hacker End of Support Office Wireless Technology Network Quick Tips Settings Printing Content Filtering Cost Management Cybercrime Wi-Fi HIPAA Risk Management Router Vendor Safety Modem LiFi Data storage Mobile Security Analytics Antivirus Navigation Tactics Hotspot Halloween Networking Legislation Application Social Engineering Monitoring Mirgation Help Desk Humor Nanotechnology Identity Theft Evernote Gadgets Addiction Hacks Language Scary Stories IBM Chatbots Comparison Fun Data loss Management Budget Screen Reader Deep Learning Patch Management Tech Support Healthcare Dark Data Service Level Agreement Password Computing Infrastructure Techology Customer Relationship Management Identity Education Specifications How To Conferencing Bookmark Smart Tech Competition Websites Tablet Tech Download Mobile Computing Alerts Unified Threat Management Black Friday Search Remote Monitoring Save Money Telephone Browsers Connectivity Best Practice VPN Machine Learning User Term Upload Current Events Licensing Buisness User Error Compliance IT solutions Cyber Monday IT Management Vendor Management Social Network Legal Entertainment IoT Business Growth Dark Web Virtual Private Network Error IP Address Google Maps Avoiding Downtime Mobility Network Congestion Trends Cooperation Regulations Smart Technology Cortana Electronic Medical Records Customer Resource management Data Analysis Star Wars Alt Codes Microsoft Excel Mobile Office Wireless Recovery Google Play Display Marketing Gamification Staff Downtime Social Networking Hosted Solution Distributed Denial of Service Network Management Hard Drives Virtual Reality Telephone System Operating System Word Fileless Malware Typing Domains Travel Security Cameras Monitors Content Wearable Technology YouTube SharePoint Motherboard Managed IT Service Knowledge Refrigeration Remote Computing Health IT Google Drive Directions Assessment Cryptocurrency Permissions Lenovo Public Speaking Unified Threat Management Lithium-ion battery 5G SSID Information Technology Downloads Unified Communications Break Fix Experience Alert Entrepreneur Google Docs Microchip Internet Exlporer Bitcoin Fraud Running Cable Superfish Writing Username Google Wallet Virtual Desktop Multi-Factor Security Server Management Undo User Tip Processor Database Windows 8 Laptop Google Calendar Managed IT Services Retail Drones IT Technicians Outlook Cookies Virtualization Proxy Server

Sign Up For Our Newsletter!