Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Productivity Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Blockchain Windows 10 Business Technology Vendor Apps Two-factor Authentication Data Security Mobile Office Tip of the week App Employer-Employee Relationship Networking Chrome BYOD Budget Mobile Device Management Managed Services Voice over Internet Protocol Apple Gmail HIPAA WiFi Applications Computing Information Technology How To BDR Conferencing Office 365 Hacker Avoiding Downtime Marketing Access Control Router Retail Big Data Operating System 2FA Risk Management Managed IT Services Help Desk Computers Analytics Office Tips Augmented Reality Website Storage Virtual Private Network Password Bring Your Own Device Healthcare Health Document Management The Internet of Things Free Resource Going Green Project Management Windows 7 Social Windows 11 Microsoft 365 Cybercrime Scam Data loss Solutions Monitoring Excel Customer Service Patch Management Save Money Remote Monitoring End of Support Vulnerability Telephone Vendor Management Physical Security Cooperation Display Printer Remote Workers Firewall Paperless Office Infrastructure Safety Vulnerabilities Machine Learning Images 101 Settings Modem Wireless Printing User Tip Multi-Factor Authentication Processor Mobility Maintenance Content Filtering Mobile Security Antivirus YouTube Supply Chain Cryptocurrency Customer Relationship Management Smart Technology Employees Integration Virtual Desktop Saving Time Data storage LiFi Hacking Robot Presentation Managed IT Service Holidays Outlook Wireless Technology Downloads Data Storage Money Humor IT Management Licensing Video Conferencing Data Privacy VPN Meetings Entertainment Managed Services Provider Virtual Machines Professional Services Word Sports Mouse Computer Repair Telephone System Administration Cost Management iPhone Cyber security SharePoint Legal Workplace Strategies Directions Tech IT solutions Assessment Electronic Medical Records Permissions Telework CES Undo Communitications Meta Business Growth Writing Specifications Supply Chain Management Amazon Lenovo Microchip Term Internet Exlporer Virtual Reality Cortana Fraud FinTech IT Assessment Outsource IT Server Management Alt Codes Username Private Cloud Identity Theft Downtime Black Friday Flexibility Environment Value Superfish Media Hosted Solution Database Twitter Organization Application Digital Security Cameras Smart Devices Small Businesses Typing Error IT Technicians Cookies Social Engineering IBM Cyber Monday Remote Working Displays Memory Proxy Server Data Breach Google Drive Google Play Tactics Remote Computing Knowledge Hotspot Videos Electronic Health Records Outsourcing Mirgation Tablet Nanotechnology 5G Wasting Time Trend Micro Google Docs Workplace Security Cameras Unified Communications Addiction Alert Experience Language Dark Data Competition Software as a Service Hiring/Firing Managed IT Bitcoin Management File Sharing Running Cable Chatbots Screen Reader How To Distributed Denial of Service Managing Costs Google Wallet Paperless eCommerce Co-managed IT SSID Service Level Agreement Notifications Computing Infrastructure Surveillance Technology Care Virtual Assistant Windows 8 Travel Laptop Identity Bookmark Google Maps Smart Tech User Virtual Machine Techology Drones Business Communications Scams Medical IT Download Alerts Reviews Development Hybrid Work Transportation Unified Threat Management Halloween Browsers Connectivity IP Address Break Fix Hypervisor Unified Threat Management Human Resources Optimization Cables PowerPoint Upload Shopping Network Congestion Multi-Factor Security Employer/Employee Relationships Hacks Social Network Scary Stories Google Apps Navigation IoT Fun Dark Web PCI DSS Recovery User Error Hard Drives IT Maintenance Deep Learning Trends Gig Economy Regulations Domains Google Calendar Internet Service Provider Business Intelligence Teamwork Customer Resource management Point of Sale Shortcuts Data Analysis Evernote Education Star Wars Microsoft Excel Regulations Compliance Refrigeration Memes Ransmoware Network Management Gamification Tech Support Staff Social Networking Monitors Public Speaking Legislation Net Neutrality Vendors SQL Server Mobile Computing Be Proactive Fileless Malware Search Lithium-ion battery Financial Data History Smartwatch IT Entrepreneur Workforce Best Practice Content Websites Wearable Technology Buisness Motherboard Comparison Procurement Threats Azure Health IT

Blog Archive