Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android AI Upgrade Disaster Recovery Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Remote Work Server Compliance Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Government Business Continuity Blockchain Bandwidth Virtualization Business Technology Wi-Fi Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Budget BYOD Apple App Employer-Employee Relationship Tip of the week Networking Mobile Device Management Chrome Managed Services Voice over Internet Protocol HIPAA WiFi Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR Healthcare Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health Help Desk Operating System Computers Retail Risk Management 2FA Website Managed IT Services Analytics Office Tips Augmented Reality Patch Management Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Free Resource Physical Security Project Management Social Windows 7 Display Printer Microsoft 365 Paperless Office Going Green Infrastructure Monitoring Solutions Customer Service Cybercrime Document Management Windows 11 Telephone Scam Data loss Excel Cooperation Firewall Remote Workers Telephone System Robot Cost Management Safety iPhone Sports Mouse IT Management Vulnerabilities Data Privacy VPN Meetings Administration Images 101 User Tip Modem Computer Repair Mobile Security Multi-Factor Authentication Mobility Processor Customer Relationship Management Settings Smart Technology Wireless Printing Employees Content Filtering Machine Learning Hacking Integration YouTube Saving Time Presentation Cryptocurrency Managed IT Service Wireless Technology Maintenance Holidays Antivirus Downloads Data Storage Virtual Desktop Data storage Licensing LiFi Supply Chain Video Conferencing Word Managed Services Provider Entertainment Outlook Virtual Machines Professional Services Money Humor SQL Server Technology Care Travel Social Networking Hacks Net Neutrality Legislation Entrepreneur Scary Stories Financial Data History Fun Business Communications Techology Fileless Malware Google Maps Content Smartwatch Wearable Technology Deep Learning IT Scams Azure Hybrid Work Health IT Unified Threat Management Motherboard Undo Procurement Comparison Telework Permissions Education Cyber security Tech Human Resources Unified Threat Management Directions Assessment CES Communitications Cables Mobile Computing Supply Chain Management Network Congestion Specifications Internet Exlporer FinTech Fraud Search Term Google Apps User Error Microchip Username Application Best Practice IT Assessment IT Maintenance Black Friday Buisness Value Business Intelligence Point of Sale Flexibility Database IBM Legal Organization IT solutions Shortcuts Network Management Digital Security Cameras Tech Support IT Technicians Business Growth Smart Devices Ransmoware Monitors Cyber Monday Memory Vendors Proxy Server Cookies Remote Working Tactics Hotspot Data Breach Cortana Google Play Be Proactive Videos Websites Mirgation Alt Codes Electronic Health Records Workforce Downtime Wasting Time Threats Nanotechnology Competition Addiction Electronic Medical Records Language Hosted Solution Trend Micro Security Cameras Workplace Strategies SharePoint Management Chatbots Typing Software as a Service Meta Writing Distributed Denial of Service Managing Costs Amazon Lenovo Screen Reader Service Level Agreement Google Drive Virtual Reality Computing Infrastructure User eCommerce Knowledge SSID Server Management Private Cloud Identity Surveillance Virtual Assistant Outsource IT Virtual Machine Environment 5G Media Superfish Bookmark Identity Theft Smart Tech Download IP Address Google Docs Reviews Twitter Alerts Unified Communications Experience Medical IT Error Bitcoin Development Running Cable Transportation Small Businesses Social Engineering Break Fix Hypervisor Displays Browsers Connectivity Google Wallet Upload Shopping Remote Computing Recovery Optimization PowerPoint Employer/Employee Relationships Outsourcing Social Network Hard Drives Windows 8 Multi-Factor Security Laptop PCI DSS Dark Web Navigation Tablet IoT Domains Drones Trends Gig Economy Alert Workplace Teamwork Hiring/Firing Managed IT Customer Resource management File Sharing Regulations Refrigeration Internet Service Provider Dark Data Google Calendar Halloween Regulations Compliance How To Microsoft Excel Evernote Paperless Data Analysis Star Wars Public Speaking Gamification Lithium-ion battery Notifications Staff Memes Co-managed IT

Blog Archive