Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer IT Services Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management VoIP Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Training Covid-19 Gadgets Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications How To BDR Conferencing Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Big Data Managed IT Services 2FA Help Desk Operating System Telephone Physical Security Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Microsoft 365 Document Management Firewall Solutions Scam The Internet of Things Data loss Windows 11 Social Monitoring Going Green Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Remote Workers VPN YouTube Meetings Presentation Downloads iPhone Cryptocurrency Wireless Technology Licensing Computer Repair Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Machine Learning Money Humor Employees Maintenance Safety Sports Integration Antivirus Mouse User Tip Modem Mobile Security Processor Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Robot Customer Relationship Management Managed Services Provider Settings Professional Services Saving Time Virtual Machines Printing Wireless Content Filtering Hacking Managed IT Service IT Management Download Net Neutrality Alerts SQL Server Technology Care Network Congestion Google Drive User Error Financial Data History Knowledge User Business Communications Connectivity IT Break Fix Scams Browsers Smartwatch Upload Procurement Point of Sale Azure Hybrid Work 5G Multi-Factor Security Tech Human Resources Google Docs Social Network Telework Unified Communications IP Address Cyber security Experience IoT Communitications Running Cable Tech Support Dark Web Cables CES Bitcoin Network Management Google Wallet Trends Supply Chain Management Monitors Google Calendar Term Google Apps Customer Resource management FinTech Regulations Recovery Star Wars IT Assessment Laptop Websites Hard Drives Microsoft Excel IT Maintenance Data Analysis Windows 8 Drones Gamification Flexibility Domains Staff Value Business Intelligence Legislation Shortcuts SharePoint Organization Social Networking Electronic Medical Records Smart Devices Halloween Refrigeration Ransmoware Fileless Malware Digital Security Cameras Lenovo Content Remote Working Public Speaking Wearable Technology Memory Vendors Writing Comparison Google Play Be Proactive Health IT Lithium-ion battery Motherboard Data Breach Virtual Reality Assessment Electronic Health Records Scary Stories Private Cloud Permissions Workforce Entrepreneur Directions Videos Hacks Server Management Superfish Identity Theft Wasting Time Threats Fun Specifications Security Cameras Workplace Strategies Deep Learning Trend Micro Twitter Internet Exlporer Software as a Service Error Undo Fraud Meta Microchip Username Education Managing Costs Amazon Social Engineering Black Friday SSID eCommerce Remote Computing Database Surveillance Virtual Assistant Outsource IT Mobile Computing Tablet IT Technicians Virtual Machine Environment Search Media Application Cyber Monday Medical IT Proxy Server Reviews Best Practice Cookies Alert Tactics Development Buisness File Sharing Hotspot Transportation Small Businesses Dark Data Managed IT Legal IT solutions IBM Mirgation Hypervisor Displays How To PowerPoint Shopping Business Growth Nanotechnology Optimization Notifications Addiction Travel Language Employer/Employee Relationships Outsourcing Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Distributed Denial of Service Workplace Gig Economy Alt Codes Screen Reader Service Level Agreement Internet Service Provider Downtime Unified Threat Management Competition Computing Infrastructure Teamwork Hiring/Firing Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Co-managed IT Bookmark Typing Smart Tech Memes

Blog Archive