Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tale of Krampus and the Cyberattack

The Tale of Krampus and the Cyberattack

Most people are familiar with Santa Claus, the jolly gift-giver who delivers presents to all the children who have kept the Christmas spirit in their hearts all year. Lately, many people have also become aware of Krampus, Santa’s dark shadow who—as the legend goes—takes a similar trip to visit the naughty children and turn the worst into a midnight snack.

However, one has to wonder: what about all the adults who might also be naughty?

Continue reading

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The History of Internet Speeds Tells You a Lot About How Far We’ve Come

The Internet has become an indispensable part of our lives. Those who have been online since the mid-90s have witnessed a dramatic transformation in how we use it. Today's lightning-fast, always-on connectivity has replaced yesteryear's slow, dial-up connections. Let's explore how Internet speeds have evolved over the past three decades.

Continue reading
0 Comments

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Continue reading
0 Comments

How Cool is Data? Part II

How Cool is Data? Part II

Your typical book holds a lot of data, but now that we have stoked your curiosity and amazement with how much data is held by the Library of Congress, we’d like to put this number into perspective with some everyday explorations. Let’s take a look.

Continue reading
0 Comments

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service AI Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Holiday Facebook Automation Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Compliance Managed Service Provider IT Support Remote Work Outsourced IT Server Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Managed Services Vendor Two-factor Authentication Apps Data Security Mobile Office Mobile Device Management Voice over Internet Protocol BYOD Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking App HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Password Hacker Managed IT Services How To Avoiding Downtime BDR Marketing Operating System Healthcare Router Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Computers Bring Your Own Device 2FA Website Going Green Patch Management Save Money Remote Monitoring Vulnerability Remote Workers End of Support Firewall Vendor Management Cybercrime Display Free Resource Printer The Internet of Things Project Management Paperless Office Windows 7 Infrastructure Social Monitoring Microsoft 365 Document Management Solutions Managed IT Service Customer Service Telephone Scam Data loss Windows 11 Cooperation Excel Telephone System Virtual Machines Robot Professional Services Cost Management Word Settings Printing Wireless Content Filtering IT Management VPN YouTube Meetings iPhone Safety Cryptocurrency User Tip Modem Vulnerabilities Data Privacy Processor Computer Repair Mobile Security Images 101 Virtual Desktop Data storage LiFi Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Money Saving Time Humor Customer Relationship Management Employees Integration Maintenance Antivirus Hacking Sports Downloads Mouse Presentation Licensing Holidays Entertainment Wireless Technology Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Hard Drives Gig Economy Travel Social Networking Legislation Workplace Teamwork Hiring/Firing Techology Fileless Malware Domains Google Maps Internet Service Provider Cortana Regulations Compliance Wearable Technology Evernote Paperless Alt Codes Content Health IT Refrigeration Downtime Unified Threat Management Motherboard Memes Comparison Co-managed IT SQL Server Technology Care Unified Threat Management Directions Public Speaking Hosted Solution Assessment Net Neutrality Permissions Financial Data History Business Communications Lithium-ion battery Typing Smartwatch Entrepreneur IT Network Congestion Specifications Scams Azure Hybrid Work Google Drive User Error Microchip Internet Exlporer Procurement Knowledge Fraud Telework Cyber security Tech Human Resources Username Undo CES Point of Sale Communitications 5G Black Friday Cables Google Docs Unified Communications Database Supply Chain Management Experience FinTech Running Cable Tech Support IT Technicians Term Google Apps Bitcoin Network Management Google Wallet Proxy Server Cookies IT Assessment Monitors Cyber Monday IT Maintenance Value Business Intelligence Tactics Flexibility Hotspot Organization Laptop Websites Mirgation Shortcuts Windows 8 Application Drones Digital Security Cameras Nanotechnology Smart Devices Ransmoware Memory Vendors SharePoint IBM Addiction Remote Working Electronic Medical Records Language Halloween Chatbots Data Breach Google Play Be Proactive Management Lenovo Videos Screen Reader Electronic Health Records Writing Distributed Denial of Service Workforce Wasting Time Threats Service Level Agreement Virtual Reality Computing Infrastructure Hacks Server Management Scary Stories Private Cloud Identity Trend Micro Security Cameras Workplace Strategies Superfish Bookmark Competition Identity Theft Smart Tech Software as a Service Fun Meta Twitter Alerts Managing Costs Amazon Deep Learning Download Error eCommerce SSID Browsers Education Connectivity Surveillance Social Engineering Break Fix Virtual Assistant Outsource IT Remote Computing Virtual Machine Environment Media Upload User Mobile Computing Social Network Reviews Multi-Factor Security Medical IT Tablet IoT Development Search Dark Web Transportation Small Businesses Alert Hypervisor Displays IP Address Best Practice Trends Managed IT Customer Resource management Shopping Buisness File Sharing Regulations Optimization Dark Data Google Calendar PowerPoint Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Employer/Employee Relationships Outsourcing PCI DSS Notifications Staff Navigation Business Growth Gamification Recovery

Blog Archive