Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Data Backup Managed Service Smartphone Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Facebook Information Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Wi-Fi Blockchain Apps Data Security Mobile Office Two-factor Authentication Vendor Gmail Chrome Budget Tip of the week Apple Employer-Employee Relationship App Networking Managed Services Voice over Internet Protocol BYOD Mobile Device Management Applications Access Control WiFi Conferencing How To BDR Hacker Computing Avoiding Downtime Information Technology Marketing HIPAA Office 365 Office Tips Analytics Augmented Reality Health Storage Password Help Desk Big Data Bring Your Own Device Retail Managed IT Services Operating System Computers Healthcare Risk Management Website 2FA Router Virtual Private Network Firewall Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring The Internet of Things Document Management Social Scam Telephone Data loss Going Green Customer Service Cooperation Remote Workers Cybercrime Patch Management Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Free Resource Project Management Physical Security Windows 7 Excel Display Computer Repair Multi-Factor Authentication Mobility Outlook Modem User Tip Processor Money Mobile Security Humor Safety Employees Machine Learning Smart Technology Sports Integration Mouse Saving Time Data Privacy Administration Holidays Maintenance Antivirus Managed IT Service Data Storage Downloads Customer Relationship Management Video Conferencing Managed Services Provider Licensing Settings Virtual Machines Professional Services Printing Hacking Wireless Entertainment Content Filtering Presentation YouTube Robot Wireless Technology Cryptocurrency Telephone System iPhone Cost Management Vulnerabilities IT Management VPN Meetings Virtual Desktop Word Supply Chain Data storage LiFi Images 101 Organization Username Workplace Public Speaking Network Management Lithium-ion battery Tech Support Black Friday Digital Security Cameras Halloween Smart Devices Hiring/Firing Memory Database Paperless Monitors Entrepreneur Remote Working Data Breach Google Play Co-managed IT IT Technicians Cookies Hacks Websites Cyber Monday Videos Scary Stories Electronic Health Records Proxy Server Technology Care Wasting Time Tactics Business Communications Hotspot Undo Fun Electronic Medical Records Trend Micro SharePoint Security Cameras Scams Mirgation Deep Learning Nanotechnology Software as a Service Hybrid Work Managing Costs Lenovo Addiction Human Resources Language Education Writing Virtual Reality eCommerce Management SSID Cables Chatbots Server Management Screen Reader Mobile Computing Private Cloud Distributed Denial of Service Application Surveillance Virtual Assistant Virtual Machine Superfish Service Level Agreement Google Apps Identity Theft Computing Infrastructure Search Twitter Reviews Medical IT IT Maintenance Identity IBM Best Practice Smart Tech Error Buisness Development Bookmark Transportation Business Intelligence Hypervisor Download Shortcuts Legal Alerts IT solutions Social Engineering Business Growth Remote Computing Shopping Optimization PowerPoint Ransmoware Connectivity Break Fix Browsers Employer/Employee Relationships Vendors Cortana Upload Navigation Be Proactive Tablet Competition PCI DSS Alt Codes Alert Multi-Factor Security Gig Economy Social Network Workforce Threats Managed IT IoT File Sharing Dark Web Downtime Dark Data Internet Service Provider Teamwork Trends Evernote Workplace Strategies Hosted Solution How To Regulations Compliance Typing Notifications Google Calendar User Memes Customer Resource management Meta Regulations Amazon Star Wars Travel Microsoft Excel Net Neutrality Data Analysis SQL Server Financial Data Knowledge History Techology Gamification Google Drive Google Maps Staff Legislation Smartwatch IT Outsource IT Social Networking IP Address Fileless Malware Azure Environment Media Unified Threat Management Procurement 5G Telework Experience Cyber security Unified Threat Management Content Tech Google Docs Wearable Technology Unified Communications Motherboard Bitcoin Comparison Recovery CES Running Cable Communitications Health IT Small Businesses Directions Displays Assessment Google Wallet Permissions Hard Drives Network Congestion Supply Chain Management FinTech User Error Term Domains Windows 8 Specifications Laptop IT Assessment Outsourcing Microchip Value Internet Exlporer Drones Point of Sale Fraud Refrigeration Flexibility

Blog Archive