Home
My Documents
Sitemap
About Us
Who We Are
Our Difference
IT Industry Secret
Refer a Colleague or Friend
Employment
IT Services
Managed IT Services
VMware
Outsourcing your IT
IT Consulting
Comprehensive IT Support
Remote Monitoring & Maintenance
IT Vendor Management
Security Services
Cisco-Certified Solutions
Network Security
Content Filtering
Spam Protection
Security Cameras
SOPHOS Security Solutions
Cloud Computing Services
Cloud IT Solutions
Hosted Microsoft Exchange
Hosted Server
Hosted Desktop
Hardware Virtualization
Dropbox Cloud Storage
Cloud Backup & File Sharing
Medical & Legal IT
Health Care IT
Electronic Medical Records
IT for Law
Data Services
BDR
Data Retrieval
Hardware Services
Hardware as a Service
Cabling and Wiring
Computer Repair
High-Speed Internet Consulting
HP Official Dealer
Printer Management
Official Dell Dealer
Apple Computer Repair
Software Services
Microsoft SQL Server
Microsoft Partner Network
CRM Sales Process
Microsoft Office 365
Document Management
Google Apps
Identity Management
Business Communication
VoIP
Fax Server
Conferencing
Mobile Device Management
VirtualTone
Digital Signage
Media & Internet Services
Website Design
InSite ID for Websites
Understanding IT
Understanding Network Security
Understanding SOx
Understanding BYOD
Understanding PCI DSS
Understanding HIPAA
Cloud Computing
News & Events
News & Press Releases
Blog
Contact Us
Support
How to Request Support
Help Desk
Join a Meeting
Remote Support Tool
You are here:
Blog
Josh Coppage
Stay Safe When Shopping Online
Voyage Technology Blog
Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Navigation
Home
Tags
Archived Posts
Subscribe to blog
Login
Username
Password
Forgot Password?
Remember me
Login
December, 2025
Switch to calendar view
How to Stop Time Theft and See Everything
Monday, 01 December 2025
The History, Pros, and Cons of Digital Design's Most Commonly-Used Icon
Wednesday, 03 December 2025
Is Your Backup Just an Expensive Paperweight?
Friday, 05 December 2025
Should Efficiency Get In the Way of Due Process?
Monday, 08 December 2025
Don't Sacrifice Your Holiday Productivity to a Slow Network!
Wednesday, 10 December 2025
All Business Owners Should Know How Helpful Software-as-a-Service Is
Friday, 12 December 2025
Start Treating Your IT as the Investment It Is
Monday, 15 December 2025
How to Use Simple Email Tips to Impress Your Boss
Wednesday, 17 December 2025
The Rise of Agentic AI Could Create a Crisis of Authenticity
Friday, 19 December 2025
4 Ways to Change the Way You Think About IT (For the Better)
Monday, 22 December 2025
Lessons About Shadow IT, Direct from the North Pole
Wednesday, 24 December 2025
You’ll Be Shocked By How Much Managed IT Helps SMBs
Monday, 29 December 2025
3 Questions You Should Ask About Your Current Backup and Disaster Recovery Strategy
Wednesday, 31 December 2025
Sign Up For Our Newsletter!
Email
First Name
Last Name
What is 1+7?
Blog Categories
Voyage Technology Blog
Uncategorized
Off Topic/Fun
Alerts
IT Blog
Miscellaneous
Cloud
How to
Tip of the Week
Best practices
Business
Security
Technology
Mobile? Grab this Article!
Tag Cloud
Security
Technology
Tip of the Week
Best Practices
Data
Business Computing
Business
Productivity
Software
Innovation
Hackers
Cloud
Efficiency
Hardware
Network Security
User Tips
Internet
IT Services
Malware
Phishing
IT Support
Privacy
Workplace Tips
Google
Email
Computer
Workplace Strategy
Hosted Solutions
Backup
Collaboration
Small Business
Users
Managed Service
Ransomware
AI
Mobile Device
Productivity
Microsoft
Saving Money
Quick Tips
Passwords
Communication
Cybersecurity
Data Backup
Smartphone
Disaster Recovery
Data Recovery
Android
VoIP
Upgrade
Smartphones
Business Management
Mobile Devices
communications
Windows
Social Media
Browser
Microsoft Office
Managed IT Services
Current Events
Network
Tech Term
Internet of Things
Remote
Miscellaneous
Information
Holiday
Automation
Artificial Intelligence
Facebook
Gadgets
Cloud Computing
Training
Covid-19
Compliance
Server
Managed Service Provider
IT Support
Outsourced IT
Remote Work
Employee/Employer Relationship
Encryption
Spam
Office
Windows 10
Government
Data Management
Business Continuity
Blockchain
Vendor
Wi-Fi
Business Technology
Windows 10
Bandwidth
Virtualization
Data Security
Apps
Managed Services
Two-factor Authentication
Mobile Office
App
Employer-Employee Relationship
BYOD
Voice over Internet Protocol
Mobile Device Management
Tip of the week
Chrome
Gmail
Budget
WiFi
Apple
Networking
How To
BDR
HIPAA
Computing
Hacker
Physical Security
Applications
Information Technology
Avoiding Downtime
Access Control
Marketing
Office 365
Conferencing
Password
Managed IT Services
2FA
Operating System
Computers
Router
Virtual Private Network
Healthcare
Risk Management
Website
Health
Help Desk
Analytics
Office Tips
Augmented Reality
Retail
Storage
Bring Your Own Device
Big Data
Social
Cooperation
Windows 11
Going Green
Patch Management
Save Money
Remote Monitoring
Vulnerability
Excel
End of Support
Customer Service
Vendor Management
Cybercrime
Remote Workers
Display
Printer
Paperless Office
Infrastructure
Free Resource
Monitoring
Project Management
Windows 7
Firewall
Document Management
Microsoft 365
Managed IT Service
Solutions
Telephone
The Internet of Things
Scam
Data loss
Holidays
Telephone System
Robot
Data Storage
Customer Relationship Management
Supply Chain
Cost Management
Settings
Video Conferencing
Printing
Wireless
Managed Services Provider
Virtual Machines
Professional Services
Content Filtering
Hacking
IT Management
Presentation
VPN
YouTube
Meetings
Cryptocurrency
Wireless Technology
User Tip
Modem
Processor
iPhone
Computer Repair
Mobile Security
Virtual Desktop
Data storage
Vulnerabilities
LiFi
Data Privacy
Word
Smart Technology
Outlook
Images 101
Machine Learning
Money
Saving Time
Mobility
Multi-Factor Authentication
Humor
Safety
Maintenance
Sports
Downloads
Antivirus
Mouse
Employees
Integration
Licensing
Entertainment
Administration
Surveillance
Virtual Assistant
Outsource IT
Application
Best Practice
Trends
Alert
Media
Buisness
File Sharing
Regulations
Dark Data
Google Calendar
Virtual Machine
Environment
Managed IT
Customer Resource management
IBM
Legal
Data Analysis
Medical IT
IT solutions
Star Wars
How To
Microsoft Excel
Reviews
Development
Transportation
Small Businesses
Business Growth
Gamification
Notifications
Staff
Travel
Social Networking
Legislation
Hypervisor
Displays
Optimization
Techology
Fileless Malware
PowerPoint
Google Maps
Cortana
Shopping
Wearable Technology
Employer/Employee Relationships
Outsourcing
Alt Codes
Content
Competition
Health IT
Navigation
Downtime
Unified Threat Management
Motherboard
Comparison
PCI DSS
Unified Threat Management
Directions
Workplace
Hosted Solution
Assessment
Permissions
Gig Economy
Internet Service Provider
Teamwork
Hiring/Firing
Typing
Evernote
Paperless
Network Congestion
Specifications
Regulations Compliance
Memes
Google Drive
User Error
Microchip
Co-managed IT
User
Internet Exlporer
Knowledge
Fraud
Net Neutrality
SQL Server
Technology Care
Username
Business Communications
Point of Sale
5G
Black Friday
Financial Data
History
IT
IP Address
Google Docs
Scams
Unified Communications
Database
Experience
Smartwatch
Running Cable
Tech Support
IT Technicians
Procurement
Azure
Hybrid Work
Bitcoin
Network Management
Google Wallet
Proxy Server
Tech
Human Resources
Cookies
Monitors
Cyber Monday
Telework
Cyber security
Communitications
Cables
Recovery
Tactics
Hotspot
CES
Laptop
Websites
Mirgation
Supply Chain Management
Hard Drives
Windows 8
Domains
Drones
Term
Google Apps
Nanotechnology
FinTech
IT Assessment
SharePoint
IT Maintenance
Addiction
Electronic Medical Records
Language
Halloween
Chatbots
Flexibility
Value
Business Intelligence
Refrigeration
Management
Public Speaking
Lenovo
Shortcuts
Screen Reader
Writing
Distributed Denial of Service
Organization
Smart Devices
Lithium-ion battery
Ransmoware
Service Level Agreement
Virtual Reality
Computing Infrastructure
Digital Security Cameras
Entrepreneur
Scary Stories
Private Cloud
Identity
Remote Working
Memory
Vendors
Hacks
Server Management
Superfish
Bookmark
Google Play
Be Proactive
Identity Theft
Smart Tech
Fun
Data Breach
Videos
Electronic Health Records
Workforce
Deep Learning
Download
Twitter
Alerts
Error
Wasting Time
Threats
Undo
Trend Micro
Browsers
Security Cameras
Workplace Strategies
Education
Connectivity
Social Engineering
Break Fix
Software as a Service
Meta
Upload
Remote Computing
Multi-Factor Security
Managing Costs
Amazon
Mobile Computing
Social Network
eCommerce
SSID
Tablet
IoT
Search
Dark Web
Blog Archive
2026
January
(12)
February
(12)
March
(13)
April
(13)
May
(6)
2025
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(11)
December
(13)
2024
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2023
January
(13)
February
(12)
March
(14)
April
(12)
May
(14)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(13)
December
(12)
2022
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(13)
October
(13)
November
(13)
December
(12)
2021
January
(13)
February
(12)
March
(14)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(14)
2020
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2019
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2018
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(12)
October
(15)
November
(13)
December
(13)
2017
January
(13)
February
(9)
March
(11)
April
(12)
May
(6)
June
(3)
July
(12)
August
(12)
September
(13)
October
(13)
November
(13)
December
(13)
2016
January
(13)
February
(10)
March
(12)
April
(13)
May
(13)
June
(13)
July
(13)
August
(15)
September
(13)
October
(13)
November
(13)
December
(13)
2015
February
(4)
March
(2)
May
(3)
June
(10)
July
(12)
August
(12)
September
(11)
October
(13)
November
(13)
December
(12)
Copyright Voyage Technology. All Rights Reserved.