Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Productivity Backup Small Business Quick Tips Passwords Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Smartphones Business Management Data Recovery VoIP Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips 2FA Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Customer Service Vendor Management Cybercrime Solutions Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Telephone Remote Workers The Internet of Things Scam Data loss Social Cooperation Data Privacy Robot Telephone System Images 101 Customer Relationship Management Cost Management Mobility Settings Multi-Factor Authentication Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Cryptocurrency Employees Modem Integration Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Outlook Data Storage Supply Chain Machine Learning Video Conferencing Money Saving Time Humor Managed Services Provider Virtual Machines Professional Services Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Licensing iPhone Entertainment Administration Vulnerabilities IBM Legal Data Analysis IT solutions Star Wars Supply Chain Management How To Microsoft Excel Term Google Apps Business Growth Gamification FinTech Notifications Staff Travel Social Networking IT Assessment Legislation IT Maintenance Techology Fileless Malware Google Maps Flexibility Cortana Value Business Intelligence Shortcuts Alt Codes Content Organization Wearable Technology Downtime Unified Threat Management Motherboard Smart Devices Comparison Ransmoware Competition Health IT Digital Security Cameras Unified Threat Management Directions Hosted Solution Assessment Remote Working Permissions Memory Vendors Google Play Be Proactive Typing Data Breach Electronic Health Records Network Congestion Specifications Workforce Videos Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Wasting Time Threats Security Cameras Workplace Strategies Username Trend Micro Point of Sale Software as a Service 5G Black Friday Meta IP Address Google Docs Unified Communications Database Experience Managing Costs Amazon SSID Bitcoin Network Management Running Cable Tech Support IT Technicians eCommerce Cookies Surveillance Monitors Cyber Monday Virtual Assistant Outsource IT Google Wallet Proxy Server Recovery Tactics Hotspot Virtual Machine Environment Media Medical IT Hard Drives Windows 8 Reviews Laptop Websites Mirgation Nanotechnology Development Transportation Small Businesses Domains Drones SharePoint Addiction Electronic Medical Records Language Hypervisor Displays PowerPoint Refrigeration Management Shopping Halloween Chatbots Optimization Screen Reader Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing Public Speaking Lenovo Lithium-ion battery Service Level Agreement PCI DSS Virtual Reality Computing Infrastructure Navigation Workplace Hacks Server Management Gig Economy Entrepreneur Scary Stories Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Fun Teamwork Hiring/Firing Evernote Paperless Deep Learning Download Regulations Compliance Twitter Alerts Error Memes Co-managed IT Undo Browsers Education Connectivity Net Neutrality Social Engineering Break Fix SQL Server Technology Care Business Communications Upload Financial Data Remote Computing History IT Multi-Factor Security Scams Mobile Computing Social Network Smartwatch Tablet IoT Procurement Search Dark Web Azure Hybrid Work Tech Human Resources Application Best Practice Trends Telework Alert Cyber security Buisness File Sharing Regulations Communitications Dark Data Google Calendar Cables Managed IT Customer Resource management CES

Blog Archive