Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Automation Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Two-factor Authentication Data Security Mobile Office Vendor Employer-Employee Relationship Networking Chrome BYOD Budget Mobile Device Management Apple Gmail App WiFi Tip of the week Managed Services Voice over Internet Protocol Computing Information Technology How To BDR Hacker Office 365 Avoiding Downtime HIPAA Marketing Applications Access Control Conferencing Healthcare Risk Management Managed IT Services Computers Analytics Office Tips Augmented Reality Website Router Storage Password Virtual Private Network Bring Your Own Device Health 2FA Help Desk Big Data Operating System Retail Telephone Scam Data loss Cooperation Free Resource Customer Service Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Firewall Printer Paperless Office Windows 11 Infrastructure Monitoring The Internet of Things Going Green Excel Document Management Social Remote Workers Cybercrime YouTube Maintenance Antivirus Downloads iPhone Cryptocurrency Licensing Customer Relationship Management Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Hacking Images 101 Presentation Telephone System Multi-Factor Authentication Outlook Robot Mobility Cost Management Wireless Technology Money Humor IT Management VPN Employees Meetings Sports Word Integration Mouse User Tip Modem Processor Computer Repair Mobile Security Administration Holidays Safety Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Settings Wireless Printing Content Filtering Managed IT Service IBM Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History Google Drive Business Communications Knowledge Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work 5G Upload Procurement Social Network Telework Cyber security Google Docs Multi-Factor Security Tech Human Resources Unified Communications Experience Running Cable CES Tablet IoT Communitications Dark Web Cables Bitcoin Competition Alert Google Wallet Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Laptop Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Windows 8 Notifications Staff Value Business Intelligence Drones User Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Halloween Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors IP Address Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Scary Stories Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Hacks Wasting Time Threats Recovery Fun Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Deep Learning Hard Drives User Error Microchip Internet Exlporer Software as a Service Fraud Meta Domains Managing Costs Amazon Education Username Point of Sale eCommerce Black Friday SSID Refrigeration Public Speaking Database Surveillance Virtual Assistant Outsource IT Mobile Computing Tech Support IT Technicians Virtual Machine Environment Lithium-ion battery Media Search Network Management Entrepreneur Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Best Practice Buisness Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Legal IT solutions Shopping Nanotechnology Optimization PowerPoint Business Growth Undo SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Cortana Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Alt Codes Downtime Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Hosted Solution Application Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Typing

Blog Archive