Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

GoDaddy Demonstrated How Not to Educate Users About Phishing

GoDaddy Demonstrated How Not to Educate Users About Phishing

While phishing awareness is an important practice to teach to a business’ employees, some methods are better than others, as GoDaddy—the domain registrar and web-hosting company notorious for its run of risqué ads—is learning the hard way. On December 14, GoDaddy’s employees received an email that seemed to be a holiday bonus from the company… only to find out (the hard way) that it was a phishing test that their employer had run.

Continue reading
0 Comments

Tip of the Week: What to Do if Your Smartphone Goes Missing

Tip of the Week: What to Do if Your Smartphone Goes Missing

Uh oh—your mobile device is missing.

If you ever find yourself in this situation, time is of the essence… particularly if you have reason to believe that your device was stolen. To help prevent things from getting messy, we’ve put together a checklist for you to run down in case you suddenly can’t find your smartphone or tablet.

Continue reading
0 Comments

Tip of the Week: What to Do Before You Lose Your Phone

Tip of the Week: What to Do Before You Lose Your Phone

It isn’t like anyone actively means to lose their smartphone, but stuff happens. After all, many of us have our device in-hand for most of our waking hours, so there’s plenty of opportunities for it to be left behind somewhere. Fortunately, there are ways that you can set up your smartphone to help track it should it be lost, whether it’s an Apple device or on the Android platform.

Continue reading
0 Comments

Let’s Take a Look at a Few 2021 Business Trends

Let’s Take a Look at a Few 2021 Business Trends

With nearly everyone facing a recession in 2021, businesses are going to be looking to technology to keep their businesses afloat. The COVID-19 pandemic made businesses shift their priorities in 2020 and as the pandemic enters year two, these strategies will be equally important in 2021. Let’s take a look at three trends you will see businesses follow this year. 

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Hackers Software Data Cloud Network Security Privacy Email Innovation Hosted Solutions Computer Internet Hardware User Tips IT Support Collaboration Business Workplace Tips Efficiency Malware Google Small Business Data Backup Android IT Services Tech Term Microsoft Smartphone Communication Business Management Mobile Devices Phishing Cybersecurity communications Smartphones Data Recovery Mobile Device Social Media Backup Microsoft Office Covid-19 VoIP Upgrade Network Browser Managed Service Server Internet of Things Quick Tips Users Outsourced IT Artificial Intelligence Cloud Computing Data Management Managed IT Services Windows Productivity Ransomware Disaster Recovery Managed Service Provider Windows 10 Windows 10 Facebook Miscellaneous Two-factor Authentication Spam Automation Passwords Information Business Technology Wi-Fi Apps Bandwidth Saving Money App Government Gmail Encryption Holiday Computing Office 365 BDR Apple Blockchain Access Control Vendor Big Data Gadgets Employer-Employee Relationship Networking Office Tips Conferencing Augmented Reality Business Continuity Mobile Office Managed IT Services Remote Work Remote BYOD Applications WiFi Social Voice over Internet Protocol Display Risk Management Help Desk Scam Data loss Healthcare Customer Service Analytics IT Support Windows 7 Computers Chrome Data Security Hacker Patch Management Office Retail Storage Vulnerability Website Cooperation Mobile Device Management Firewall Printer Going Green Infrastructure Save Money Router Paperless Office End of Support The Internet of Things Operating System Vendor Management Cybercrime Tip of the week Professional Services Virtualization Mobile Security Processor Downloads Managed Services Document Management Information Technology Maintenance Monitoring Health Antivirus iPhone Virtual Desktop Customer Relationship Management Data storage LiFi Saving Time How To Managed IT Service Hacking Presentation Money Telephone Humor Wireless Technology Budget Licensing Remote Monitoring Avoiding Downtime Sports Solutions Mouse IT Management Bring Your Own Device Employees VPN Integration Administration Current Events Virtual Private Network Cost Management Employee/Employer Relationship Robot Holidays Meetings HIPAA Settings Safety Printing Video Conferencing Content Filtering Managed Services Provider Modem Database Network Congestion YouTube Gig Economy Virtual Machines Lenovo Knowledge Internet Service Provider Teamwork Google Drive Computer Repair IT Technicians Cryptocurrency Cyber Monday Regulations Compliance Server Management Proxy Server Tech Support Cookies Application Tactics Hotspot Smartwatch 5G Memes Superfish Navigation Experience Net Neutrality Multi-Factor Security SQL Server IBM Google Docs Mirgation Unified Communications Bitcoin Smart Technology Running Cable Financial Data History Websites Nanotechnology Identity Theft Addiction Google Wallet Monitors Language IT Evernote Procurement Google Calendar Azure Management Electronic Medical Records Chatbots Windows 8 Distributed Denial of Service Laptop Telework Cyber security Machine Learning Screen Reader Vulnerabilities Service Level Agreement Competition Drones Computing Infrastructure Communitications Supply Chain Management Legislation Free Resource Outlook Virtual Reality Identity Halloween FinTech Project Management Managed IT Bookmark Term Private Cloud Smart Tech Tablet Download Writing Alerts IT Assessment Tech Flexibility Value Twitter User Hacks Break Fix Scary Stories Organization Multi-Factor Authentication Browsers Mobility Error Connectivity Microsoft 365 Upload Fun Smart Devices Techology Remote Working Memory Social Network IP Address Remote Computing Compliance Deep Learning Password Dark Web AI Data Breach Entertainment Google Play IoT Google Maps Trends Social Engineering Education Electronic Health Records Unified Threat Management Wasting Time Customer Resource management Alert Regulations Recovery Marketing Hard Drives Mobile Computing Microsoft Excel Trend Micro Data Analysis Security Cameras Travel Star Wars Gamification Domains Staff Word Search Software as a Service User Error Managing Costs Telephone System Notifications Social Networking Best Practice Refrigeration Dark Data Buisness eCommerce Fileless Malware SSID Unified Threat Management Virtual Assistant Content Public Speaking Legal How To Wearable Technology IT solutions Surveillance Virtual Machine Network Management Health IT Lithium-ion battery Motherboard Business Growth Comparison Assessment Permissions Entrepreneur Reviews Directions Medical IT Transportation Cortana Development Specifications Data Storage Hypervisor Alt Codes Internet Exlporer Undo Fraud Downtime Shopping Wireless Optimization Microchip PowerPoint SharePoint Employer/Employee Relationships Username Hosted Solution Typing Black Friday PCI DSS User Tip