Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Artificial Intelligence Automation Covid-19 Cloud Computing Gadgets Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Virtualization Bandwidth Business Technology Windows 10 Data Security Two-factor Authentication Vendor Apps Mobile Office WiFi BYOD Employer-Employee Relationship Chrome Budget Managed Services Voice over Internet Protocol Tip of the week Apple App Mobile Device Management Gmail Networking How To Computing BDR Information Technology HIPAA Office 365 Applications Hacker Access Control Avoiding Downtime Conferencing Marketing Risk Management Big Data Router Analytics Office Tips Augmented Reality Virtual Private Network Computers Storage Health Password Help Desk Bring Your Own Device Healthcare Website 2FA Retail Operating System Managed IT Services Solutions The Internet of Things Patch Management Save Money Social Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Display Customer Service Printer Monitoring Paperless Office Infrastructure Remote Workers Windows 11 Document Management Excel Telephone Going Green Free Resource Project Management Windows 7 Firewall Scam Data loss Cooperation Microsoft 365 Cybercrime Safety YouTube Cryptocurrency Telephone System Cost Management Robot Data Privacy Employees Integration Virtual Desktop LiFi Data storage IT Management VPN Meetings Outlook Holidays Modem Customer Relationship Management User Tip Processor Data Storage Money Mobile Security Humor Video Conferencing Computer Repair Hacking Managed Services Provider Professional Services Presentation Virtual Machines Smart Technology Sports Mouse Wireless Technology Saving Time Machine Learning Administration iPhone Managed IT Service Supply Chain Downloads Vulnerabilities Word Maintenance Antivirus Licensing Settings Images 101 Entertainment Printing Wireless Mobility Content Filtering Multi-Factor Authentication Data Analysis Star Wars Remote Working Alert Microsoft Excel Memory Scams Dark Data Hybrid Work Google Play Undo Knowledge Managed IT Gamification File Sharing Google Drive Staff Data Breach Social Networking Electronic Health Records How To Legislation Human Resources Videos 5G Fileless Malware Notifications Wasting Time Cables Unified Communications Security Cameras Experience Content Travel Google Docs Wearable Technology Trend Micro Google Maps Motherboard Software as a Service Bitcoin Comparison Running Cable Google Apps Techology Health IT Directions Assessment Google Wallet Permissions Managing Costs IT Maintenance Application Business Intelligence SSID Unified Threat Management eCommerce Surveillance Windows 8 Specifications Virtual Assistant IBM Laptop Shortcuts Unified Threat Management Microchip Internet Exlporer Drones Fraud Virtual Machine Ransmoware Network Congestion Vendors Medical IT Username Reviews Development Black Friday Transportation Halloween Be Proactive User Error Database Hypervisor Workforce Threats PowerPoint Competition Shopping Point of Sale IT Technicians Optimization Cookies Hacks Cyber Monday Employer/Employee Relationships Scary Stories Workplace Strategies Proxy Server Fun Network Management Tactics PCI DSS Tech Support Hotspot Meta Navigation Monitors Deep Learning Amazon Gig Economy Mirgation Nanotechnology Internet Service Provider Teamwork User Addiction Regulations Compliance Websites Language Education Outsource IT Evernote Environment Media Management Chatbots Memes Screen Reader Net Neutrality Electronic Medical Records Mobile Computing Distributed Denial of Service SQL Server IP Address SharePoint Search Service Level Agreement Financial Data Computing Infrastructure History Small Businesses Writing Best Practice Displays Lenovo Smartwatch Identity IT Smart Tech Procurement Virtual Reality Azure Buisness Recovery Bookmark Hard Drives Server Management Download Telework Private Cloud Legal Alerts Cyber security IT solutions Outsourcing Tech Business Growth Domains Superfish CES Identity Theft Communitications Browsers Connectivity Supply Chain Management Twitter Break Fix Workplace Refrigeration Cortana Upload FinTech Error Hiring/Firing Term IT Assessment Social Engineering Alt Codes Multi-Factor Security Public Speaking Paperless Social Network IoT Flexibility Remote Computing Dark Web Value Lithium-ion battery Downtime Co-managed IT Hosted Solution Technology Care Entrepreneur Trends Organization Tablet Regulations Smart Devices Typing Google Calendar Business Communications Customer Resource management Digital Security Cameras

Blog Archive