Home
My Documents
Sitemap
About Us
Who We Are
Our Difference
IT Industry Secret
Refer a Colleague or Friend
Employment
IT Services
Managed IT Services
VMware
Outsourcing your IT
IT Consulting
Comprehensive IT Support
Remote Monitoring & Maintenance
IT Vendor Management
Security Services
Cisco-Certified Solutions
Network Security
Content Filtering
Spam Protection
Security Cameras
SOPHOS Security Solutions
Cloud Computing Services
Cloud IT Solutions
Hosted Microsoft Exchange
Hosted Server
Hosted Desktop
Hardware Virtualization
Dropbox Cloud Storage
Cloud Backup & File Sharing
Medical & Legal IT
Health Care IT
Electronic Medical Records
IT for Law
Data Services
BDR
Data Retrieval
Hardware Services
Hardware as a Service
Cabling and Wiring
Computer Repair
High-Speed Internet Consulting
HP Official Dealer
Printer Management
Official Dell Dealer
Apple Computer Repair
Software Services
Microsoft SQL Server
Microsoft Partner Network
CRM Sales Process
Microsoft Office 365
Document Management
Google Apps
Identity Management
Business Communication
VoIP
Fax Server
Conferencing
Mobile Device Management
VirtualTone
Digital Signage
Media & Internet Services
Website Design
InSite ID for Websites
Understanding IT
Understanding Network Security
Understanding SOx
Understanding BYOD
Understanding PCI DSS
Understanding HIPAA
Cloud Computing
News & Events
News & Press Releases
Blog
Contact Us
Support
How to Request Support
Help Desk
Join a Meeting
Remote Support Tool
You are here:
Blog
Miscellaneous
Voyage Technology Blog
Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Navigation
Home
Tags
Archived Posts
Subscribe to blog
Login
Username
Password
Forgot Password?
Remember me
Login
September, 2019
Switch to calendar view
Ransomware Revisited
Monday, 02 September 2019
Tip of the Week: Reduce Your Costs with Managed IT Services
Wednesday, 04 September 2019
You Need to Have Your Software Licenses in Check
Friday, 06 September 2019
No Free Wi-Fi For You!
Monday, 09 September 2019
Patch Procedure Insight
Wednesday, 11 September 2019
Your Computer May be Older than You
Friday, 13 September 2019
Is Big Tech Getting Too Big?
Monday, 16 September 2019
Tip of the Week: Network Security Basics
Wednesday, 18 September 2019
Delivering Efficiency with Managed IT, Part I
Friday, 20 September 2019
Delivering Efficiency with Managed IT, Part II
Monday, 23 September 2019
Delivering Efficiency with Managed IT, Part III
Wednesday, 25 September 2019
Delivering Efficiency with Managed IT, Part IV
Friday, 27 September 2019
Delivering Efficiency with Managed IT, Part V
Monday, 30 September 2019
Sign Up For Our Newsletter!
Email
First Name
Last Name
What is 2+3?
Blog Categories
Voyage Technology Blog
Uncategorized
Off Topic/Fun
Alerts
IT Blog
Miscellaneous
Cloud
How to
Tip of the Week
Best practices
Business
Security
Technology
Mobile? Grab this Article!
Tag Cloud
Security
Technology
Tip of the Week
Best Practices
Data
Business Computing
Business
Productivity
Software
Innovation
Cloud
Hackers
Hardware
Efficiency
Network Security
User Tips
Internet
Malware
IT Support
IT Services
Privacy
Email
Workplace Tips
Computer
Google
Phishing
Collaboration
Hosted Solutions
Users
Workplace Strategy
Ransomware
Mobile Device
Small Business
Microsoft
Backup
Productivity
Managed Service
Quick Tips
Passwords
Saving Money
Communication
Cybersecurity
Smartphone
Data Backup
AI
Android
Disaster Recovery
Upgrade
Data Recovery
Business Management
Smartphones
VoIP
Mobile Devices
communications
Windows
Browser
Social Media
Microsoft Office
Managed IT Services
Network
Current Events
Tech Term
Remote
Internet of Things
Facebook
Miscellaneous
Artificial Intelligence
Holiday
Automation
Information
Covid-19
Gadgets
Cloud Computing
Training
Remote Work
Compliance
Server
Managed Service Provider
IT Support
Outsourced IT
Employee/Employer Relationship
Spam
Encryption
Office
Windows 10
Government
Business Continuity
Data Management
Virtualization
Bandwidth
Business Technology
Wi-Fi
Blockchain
Windows 10
Vendor
Two-factor Authentication
Data Security
Apps
Mobile Office
WiFi
Chrome
Budget
BYOD
Employer-Employee Relationship
Apple
Managed Services
App
Voice over Internet Protocol
Tip of the week
Mobile Device Management
Gmail
Networking
How To
Applications
BDR
Office 365
Conferencing
Access Control
Hacker
Avoiding Downtime
Marketing
Computing
Information Technology
HIPAA
Router
Analytics
Office Tips
Big Data
Augmented Reality
Help Desk
Storage
Password
Bring Your Own Device
Virtual Private Network
Computers
Health
Healthcare
Website
Operating System
Retail
2FA
Risk Management
Managed IT Services
The Internet of Things
Solutions
Patch Management
Save Money
Social
Remote Monitoring
End of Support
Vulnerability
Vendor Management
Monitoring
Physical Security
Display
Printer
Customer Service
Paperless Office
Telephone
Infrastructure
Remote Workers
Going Green
Cooperation
Document Management
Windows 11
Cybercrime
Free Resource
Project Management
Scam
Windows 7
Firewall
Excel
Data loss
Microsoft 365
Virtual Desktop
Safety
Data storage
LiFi
User Tip
Modem
Employees
Robot
Processor
Outlook
Mobile Security
Integration
Money
Humor
Data Privacy
IT Management
Smart Technology
Meetings
Holidays
VPN
Sports
Customer Relationship Management
Saving Time
Mouse
Data Storage
Computer Repair
Video Conferencing
Managed Services Provider
Hacking
Administration
Managed IT Service
Virtual Machines
Presentation
Professional Services
Downloads
Licensing
Wireless Technology
Entertainment
Machine Learning
Settings
iPhone
Printing
Wireless
Content Filtering
Vulnerabilities
Word
Telephone System
YouTube
Maintenance
Supply Chain
Cost Management
Antivirus
Images 101
Cryptocurrency
Multi-Factor Authentication
Mobility
Memory
Google Wallet
Paperless
Specifications
Alert
Remote Working
File Sharing
Dark Data
Data Breach
Undo
Microchip
Co-managed IT
Google Play
Internet Exlporer
Managed IT
Fraud
Laptop
Videos
How To
Electronic Health Records
Technology Care
Username
Windows 8
Wasting Time
Drones
Business Communications
Black Friday
Notifications
Travel
Trend Micro
Scams
Security Cameras
Database
Techology
IT Technicians
Halloween
Google Maps
Software as a Service
Hybrid Work
Managing Costs
Application
Proxy Server
Human Resources
Cookies
Cyber Monday
Unified Threat Management
eCommerce
Cables
SSID
Tactics
Hotspot
Unified Threat Management
Mirgation
Scary Stories
Surveillance
IBM
Virtual Assistant
Hacks
Virtual Machine
Google Apps
Nanotechnology
Fun
Reviews
Network Congestion
IT Maintenance
Medical IT
Addiction
Deep Learning
Language
User Error
Chatbots
Development
Business Intelligence
Transportation
Management
Hypervisor
Shortcuts
Screen Reader
Education
Distributed Denial of Service
Point of Sale
Shopping
Optimization
Competition
Ransmoware
PowerPoint
Service Level Agreement
Computing Infrastructure
Mobile Computing
Identity
Vendors
Employer/Employee Relationships
Bookmark
Be Proactive
Navigation
Smart Tech
Network Management
Search
Tech Support
PCI DSS
Alerts
Gig Economy
Monitors
Workforce
Download
Best Practice
Buisness
Internet Service Provider
Threats
Teamwork
User
Browsers
Legal
Workplace Strategies
Evernote
Connectivity
IT solutions
Break Fix
Websites
Regulations Compliance
Memes
Meta
Upload
Business Growth
Social Network
SharePoint
Multi-Factor Security
Electronic Medical Records
Net Neutrality
IP Address
Amazon
SQL Server
Financial Data
History
IoT
Dark Web
Cortana
Smartwatch
Writing
IT
Outsource IT
Trends
Alt Codes
Lenovo
Azure
Recovery
Customer Resource management
Media
Regulations
Downtime
Google Calendar
Virtual Reality
Procurement
Environment
Telework
Cyber security
Hard Drives
Data Analysis
Tech
Star Wars
Hosted Solution
Server Management
Microsoft Excel
Private Cloud
Superfish
Staff
Identity Theft
CES
Communitications
Domains
Small Businesses
Gamification
Typing
Social Networking
Legislation
Twitter
Supply Chain Management
Displays
Error
FinTech
Refrigeration
Fileless Malware
Google Drive
Term
Knowledge
Wearable Technology
Social Engineering
IT Assessment
Public Speaking
Outsourcing
Content
Value
Health IT
Motherboard
Comparison
5G
Remote Computing
Flexibility
Lithium-ion battery
Organization
Directions
Google Docs
Workplace
Entrepreneur
Assessment
Unified Communications
Permissions
Experience
Running Cable
Tablet
Digital Security Cameras
Smart Devices
Hiring/Firing
Bitcoin
Blog Archive
2026
January
(11)
2025
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(11)
December
(13)
2024
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2023
January
(13)
February
(12)
March
(14)
April
(12)
May
(14)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(13)
December
(12)
2022
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(13)
October
(13)
November
(13)
December
(12)
2021
January
(13)
February
(12)
March
(14)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(14)
2020
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2019
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2018
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(12)
October
(15)
November
(13)
December
(13)
2017
January
(13)
February
(9)
March
(11)
April
(12)
May
(6)
June
(3)
July
(12)
August
(12)
September
(13)
October
(13)
November
(13)
December
(13)
2016
January
(13)
February
(10)
March
(12)
April
(13)
May
(13)
June
(13)
July
(13)
August
(15)
September
(13)
October
(13)
November
(13)
December
(13)
2015
February
(4)
March
(2)
May
(3)
June
(10)
July
(12)
August
(12)
September
(11)
October
(13)
November
(13)
December
(12)
Copyright Voyage Technology. All Rights Reserved.