Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s Been Another Step Towards Passwordless Authentication

There’s Been Another Step Towards Passwordless Authentication

While at the moment, passwords are an important part of your security stack, it is important to acknowledge that the concept of the password was always a flawed system and is overdue to be replaced. This may become a widespread reality sooner than you may expect, too, especially with the buy-in that the big names in tech are demonstrating.

Continue reading
0 Comments

Tip of the Week: Understanding Your 2FA Options

Tip of the Week: Understanding Your 2FA Options

Regardless of how airtight your organization’s password policies are, relying on passwords as your exclusive security measure just isn’t enough to resist some of today’s threats. This is why we—along with most other industry and security experts—recommend that two-factor authentication (2FA) be put into place. Let’s review some of the options available for your 2FA, and the added security it can introduce, for this week’s tip.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Mobile Device Smartphones Workplace Strategy Business Management Mobile Devices communications Android Saving Money Smartphone VoIP Managed IT Services Microsoft Office Managed Service Data Recovery Browser Passwords Social Media Upgrade Backup Disaster Recovery Network Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Server Managed Service Provider Artificial Intelligence Remote Work Windows Facebook Miscellaneous Outsourced IT Gadgets Encryption Spam Windows 10 Information Employee/Employer Relationship Holiday Business Continuity Data Management Government Blockchain Business Technology Windows 10 Wi-Fi Productivity Two-factor Authentication Bandwidth Virtualization Current Events Data Security Apps Compliance Office Vendor Mobile Device Management Chrome Budget Gmail Networking Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Avoiding Downtime Access Control Office 365 Mobile Office Applications How To Conferencing BDR Computing Hacker Information Technology Training Health Website Marketing HIPAA Analytics Office Tips Router Augmented Reality Retail Storage Password Bring Your Own Device Help Desk WiFi Managed IT Services Big Data Operating System BYOD Computers Virtual Private Network Risk Management Printer Paperless Office Infrastructure Windows 11 Free Resource Project Management Windows 7 Tip of the week IT Support Document Management Excel Microsoft 365 Firewall AI Solutions Monitoring Scam Data loss The Internet of Things Social Patch Management Going Green Telephone Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Cooperation Customer Service Remote Workers Healthcare Display Computer Repair Telephone System iPhone Wireless Technology Cost Management Virtual Desktop LiFi Vulnerabilities Data storage 2FA Images 101 Outlook Machine Learning Supply Chain Word Mobility Money Multi-Factor Authentication User Tip Modem Humor Mobile Security Processor Maintenance Antivirus Sports Safety Employees Mouse Integration Smart Technology Administration Saving Time Holidays Data Privacy Managed IT Service Data Storage Robot Downloads Video Conferencing Settings Wireless Licensing Customer Relationship Management Printing Managed Services Provider Virtual Machines Professional Services Content Filtering IT Management Entertainment VPN Meetings YouTube Hacking Presentation Cryptocurrency IT Unified Communications Experience Social Networking Legislation Smartwatch Google Docs Amazon Network Management Tech Support Procurement Bitcoin Fileless Malware Azure Running Cable Content Tech Wearable Technology IP Address Telework Google Wallet Outsource IT Monitors Cyber security Communitications Media Health IT Motherboard Comparison CES Environment Permissions Websites Supply Chain Management Windows 8 Directions Laptop Assessment Term FinTech Drones Small Businesses Recovery Displays Electronic Medical Records Hard Drives IT Assessment SharePoint Specifications Fraud Domains Flexibility Microchip Value Halloween Internet Exlporer Username Lenovo Organization Outsourcing Writing Virtual Reality Refrigeration Smart Devices Black Friday Digital Security Cameras Server Management Private Cloud Public Speaking Remote Working Hacks Workplace Memory Scary Stories Database Google Play Fun IT Technicians Superfish Identity Theft Lithium-ion battery Hiring/Firing Data Breach Twitter Electronic Health Records Deep Learning Paperless Proxy Server Entrepreneur Cookies Cyber Monday Videos Hotspot Error Co-managed IT Wasting Time Tactics Education Security Cameras Mirgation Technology Care Social Engineering Trend Micro Remote Computing Undo Software as a Service Business Communications Nanotechnology Language Mobile Computing Scams Managing Costs Addiction eCommerce Management SSID Search Chatbots Tablet Hybrid Work Alert Surveillance Best Practice Human Resources Virtual Assistant Screen Reader Distributed Denial of Service Computing Infrastructure Managed IT File Sharing Cables Dark Data Virtual Machine Buisness Service Level Agreement Application IT solutions Medical IT Identity Reviews Legal How To Notifications Development Business Growth Google Apps Bookmark Transportation Smart Tech Alerts Travel IBM IT Maintenance Hypervisor Download Optimization PowerPoint Cortana Techology Google Maps Shopping Business Intelligence Alt Codes Shortcuts Browsers Employer/Employee Relationships Connectivity Break Fix Navigation Unified Threat Management PCI DSS Ransmoware Downtime Upload Hosted Solution Social Network Unified Threat Management Multi-Factor Security Gig Economy Vendors Competition Internet Service Provider Typing Be Proactive Teamwork IoT Dark Web Trends Evernote Regulations Compliance Workforce Network Congestion Physical Security Memes Customer Resource management Knowledge Regulations User Error Google Calendar Google Drive Threats Microsoft Excel Net Neutrality Workplace Strategies Data Analysis SQL Server Star Wars Gamification 5G Staff Point of Sale Financial Data Meta User History

Blog Archive