Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Artificial Intelligence Information Facebook Gadgets Cloud Computing Training Compliance Covid-19 Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications How To BDR 2FA Help Desk Operating System Physical Security Risk Management Virtual Private Network Computers Healthcare Health Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Router Managed IT Services Big Data Social Going Green Patch Management Windows 11 Save Money Monitoring Remote Monitoring End of Support Vulnerability Vendor Management Excel Cybercrime Customer Service Display Remote Workers Printer Telephone Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Firewall Scam Solutions Data loss The Internet of Things Robot Holidays Data Storage Settings Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing Managed Services Provider IT Management Customer Relationship Management YouTube Meetings Saving Time Virtual Machines VPN Professional Services Cryptocurrency Hacking Managed IT Service Presentation Computer Repair Downloads iPhone Virtual Desktop Data storage Licensing LiFi Wireless Technology Vulnerabilities Entertainment Outlook Data Privacy Machine Learning Money Images 101 Humor Word Telephone System Multi-Factor Authentication Mobility Cost Management Maintenance Sports Antivirus Mouse Safety Employees Integration Administration User Tip Modem Mobile Security Processor Travel Application Proxy Server Reviews Cookies Cyber Monday Medical IT Techology Hotspot Transportation Small Businesses Google Maps Cortana Tactics Development Mirgation Hypervisor Displays Alt Codes IBM Downtime Unified Threat Management Shopping Nanotechnology Optimization PowerPoint Unified Threat Management Language Employer/Employee Relationships Outsourcing Hosted Solution Addiction Management PCI DSS Chatbots Typing Navigation Network Congestion Gig Economy Screen Reader Distributed Denial of Service Workplace Google Drive User Error Computing Infrastructure Teamwork Hiring/Firing Competition Knowledge Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Point of Sale 5G Bookmark Smart Tech Memes Co-managed IT Download Net Neutrality Google Docs Alerts SQL Server Technology Care Unified Communications Experience User Financial Data History Bitcoin Network Management Business Communications Running Cable Tech Support Break Fix Scams Monitors Browsers Smartwatch Connectivity IT Google Wallet Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Windows 8 Multi-Factor Security Tech Human Resources IP Address Laptop Websites Dark Web Cables CES IoT Communitications Drones Trends Supply Chain Management SharePoint Electronic Medical Records Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Halloween Lenovo Microsoft Excel IT Maintenance Hard Drives Writing Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Domains Virtual Reality Scary Stories Private Cloud Organization Social Networking Hacks Server Management Legislation Shortcuts Superfish Ransmoware Identity Theft Refrigeration Fun Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Deep Learning Public Speaking Twitter Lithium-ion battery Error Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Education Social Engineering Directions Videos Entrepreneur Assessment Electronic Health Records Wasting Time Threats Remote Computing Trend Micro Mobile Computing Specifications Security Cameras Workplace Strategies Fraud Meta Tablet Undo Search Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Best Practice Alert Buisness File Sharing Dark Data eCommerce Managed IT Black Friday SSID Legal Virtual Assistant Outsource IT IT solutions How To Database Surveillance IT Technicians Virtual Machine Environment Business Growth Media Notifications

Blog Archive