Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Passwords Saving Money Managed Service Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery Data Recovery Upgrade AI VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Information Automation Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Windows 10 Virtualization Wi-Fi Blockchain Business Technology Bandwidth Mobile Office Data Security Vendor Apps Two-factor Authentication Managed Services Apple Networking Voice over Internet Protocol Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Avoiding Downtime Marketing Conferencing How To BDR Computing Information Technology HIPAA Access Control Applications Office 365 Hacker Storage Password Website Bring Your Own Device Managed IT Services Healthcare Operating System Big Data Virtual Private Network Risk Management Router Health Office Tips Analytics Computers Augmented Reality 2FA Help Desk Retail Excel Scam Data loss Remote Workers Telephone Firewall Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource Vulnerability Project Management End of Support Vendor Management The Internet of Things Windows 7 Cybercrime Physical Security Microsoft 365 Social Display Printer Solutions Paperless Office Infrastructure Customer Service Document Management Windows 11 Monitoring Maintenance Video Conferencing Antivirus Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Word Administration Managed IT Service Downloads iPhone Licensing Robot Entertainment Vulnerabilities Data Privacy Settings Safety Printing Wireless Content Filtering Images 101 IT Management Telephone System VPN Multi-Factor Authentication YouTube Meetings Mobility Cost Management Cryptocurrency Computer Repair Employees Virtual Desktop Customer Relationship Management Data storage LiFi Integration User Tip Modem Processor Outlook Mobile Security Hacking Machine Learning Presentation Money Holidays Humor Data Storage Wireless Technology Smart Technology Supply Chain Deep Learning Language Employer/Employee Relationships Outsourcing Twitter IP Address Addiction Management PCI DSS Chatbots Error Navigation Social Engineering Gig Economy Screen Reader Education Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Recovery Regulations Compliance Hard Drives Mobile Computing Identity Evernote Paperless Search Bookmark Domains Smart Tech Memes Tablet Co-managed IT Best Practice Alerts SQL Server Technology Care Alert Download Net Neutrality Financial Data Refrigeration Managed IT History Buisness File Sharing Business Communications Dark Data How To Browsers Smartwatch Public Speaking Legal Connectivity IT IT solutions Break Fix Scams Business Growth Azure Hybrid Work Notifications Lithium-ion battery Upload Procurement Social Network Telework Cyber security Entrepreneur Travel Multi-Factor Security Tech Human Resources Cortana CES Techology IoT Communitications Google Maps Dark Web Cables Alt Codes Trends Supply Chain Management Customer Resource management FinTech Undo Regulations Downtime Unified Threat Management Google Calendar Term Google Apps Data Analysis Unified Threat Management Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance Typing Staff Value Business Intelligence Gamification Flexibility Organization Social Networking Legislation Shortcuts Network Congestion Knowledge Fileless Malware Digital Security Cameras Google Drive User Error Smart Devices Ransmoware Application Wearable Technology Memory Vendors Content Remote Working Health IT Motherboard Data Breach Point of Sale Comparison Google Play Be Proactive 5G Experience Directions Videos IBM Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Monitors Microchip Internet Exlporer Software as a Service Fraud Meta Windows 8 Managing Costs Amazon Laptop Websites Username Competition Drones eCommerce Black Friday SSID Electronic Medical Records SharePoint Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Halloween Media Proxy Server Reviews Lenovo Cookies Cyber Monday Medical IT Writing Hotspot Transportation Small Businesses Virtual Reality Tactics Development User Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Shopping Superfish Nanotechnology Optimization Identity Theft PowerPoint Fun

Blog Archive