Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Automation Facebook Artificial Intelligence Information Cloud Computing Miscellaneous Covid-19 Gadgets Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption IT Support Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Business Technology Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Mobile Office Two-factor Authentication Data Security Vendor Apps App Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Gmail Chrome BYOD Budget Employer-Employee Relationship Apple Access Control Hacker Avoiding Downtime Conferencing Marketing Computing Information Technology How To BDR Office 365 WiFi HIPAA Applications Health Computers Help Desk Website Operating System Retail Healthcare Risk Management Managed IT Services Analytics Office Tips Augmented Reality 2FA Big Data Storage Router Password Virtual Private Network Bring Your Own Device Paperless Office Customer Service Infrastructure Monitoring Going Green Document Management Remote Workers Cybercrime Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Windows 11 The Internet of Things Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Social Vendor Management Excel Physical Security Display Printer Holidays Hacking Data Storage Presentation Smart Technology Data Privacy Video Conferencing Machine Learning Managed Services Provider Wireless Technology Saving Time Settings Virtual Machines Professional Services Wireless Printing Content Filtering Managed IT Service Maintenance YouTube Antivirus Downloads Word Cryptocurrency iPhone Licensing Entertainment Vulnerabilities Virtual Desktop LiFi Data storage Images 101 Safety Outlook Telephone System Multi-Factor Authentication Robot Mobility Cost Management Money Humor Supply Chain IT Management VPN Employees Meetings Integration Sports Mouse User Tip Modem Customer Relationship Management Processor Computer Repair Mobile Security Administration Scams Proxy Server Best Practice Reviews Cookies Monitors Cyber Monday Medical IT Transportation Hybrid Work Tactics Buisness Development Hotspot IT solutions Websites Mirgation Hypervisor Legal Human Resources Cables Business Growth Shopping Nanotechnology Optimization PowerPoint User Language Employer/Employee Relationships SharePoint Addiction Electronic Medical Records Google Apps Management PCI DSS Chatbots Cortana Navigation Lenovo IT Maintenance Alt Codes Gig Economy Screen Reader Writing IP Address Distributed Denial of Service Computing Infrastructure Teamwork Business Intelligence Service Level Agreement Downtime Internet Service Provider Virtual Reality Shortcuts Hosted Solution Regulations Compliance Private Cloud Identity Evernote Server Management Recovery Superfish Ransmoware Bookmark Typing Identity Theft Smart Tech Memes Alerts SQL Server Hard Drives Vendors Download Net Neutrality Twitter Be Proactive Financial Data Error Knowledge History Domains Google Drive Workforce Browsers Smartwatch Connectivity IT Social Engineering Break Fix Remote Computing 5G Azure Refrigeration Threats Upload Procurement Workplace Strategies Social Network Unified Communications Telework Experience Cyber security Public Speaking Multi-Factor Security Tech Google Docs Meta Bitcoin CES Tablet IoT Running Cable Communitications Lithium-ion battery Dark Web Supply Chain Management Alert Entrepreneur Amazon Google Wallet Trends Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Outsource IT Data Analysis Windows 8 Star Wars Laptop IT Assessment How To Microsoft Excel Flexibility Notifications Staff Value Undo Environment Drones Media Gamification Organization Travel Social Networking Legislation Techology Small Businesses Fileless Malware Digital Security Cameras Google Maps Halloween Smart Devices Remote Working Wearable Technology Memory Displays Content Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Application Unified Threat Management Outsourcing Directions Hacks Videos Assessment Scary Stories Electronic Health Records Permissions Fun Wasting Time Workplace Deep Learning Trend Micro Network Congestion IBM Specifications Security Cameras User Error Hiring/Firing Microchip Internet Exlporer Software as a Service Fraud Education Managing Costs Paperless Username Co-managed IT Point of Sale eCommerce Black Friday SSID Virtual Assistant Technology Care Mobile Computing Database Surveillance Tech Support IT Technicians Search Virtual Machine Competition Network Management Business Communications

Blog Archive