Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Hacker Conferencing Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Access Control Office 365 Analytics Office Tips 2FA Augmented Reality Computers Retail Storage Password Website Bring Your Own Device Healthcare Managed IT Services Operating System Router Physical Security Big Data Virtual Private Network Risk Management Health Help Desk Customer Service Document Management Excel Remote Workers Telephone Scam Data loss Cooperation Free Resource Firewall Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management The Internet of Things Cybercrime Solutions Social Display Printer Paperless Office Infrastructure Monitoring Windows 11 Data Storage Outlook Hacking Machine Learning Supply Chain Presentation Money Saving Time Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Wireless Technology Maintenance Antivirus Sports Downloads Mouse Licensing iPhone Administration Entertainment Word Vulnerabilities Data Privacy Robot Images 101 Telephone System Cost Management Safety Multi-Factor Authentication Settings Mobility Wireless Printing Content Filtering IT Management VPN YouTube Meetings Employees Cryptocurrency User Tip Modem Integration Computer Repair Mobile Security Processor Virtual Desktop LiFi Customer Relationship Management Data storage Holidays Smart Technology Addiction Hypervisor Displays Electronic Medical Records Language SharePoint Shopping Management Optimization Halloween Chatbots PowerPoint Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Lenovo Screen Reader PCI DSS User Service Level Agreement Virtual Reality Computing Infrastructure Navigation Gig Economy Hacks Server Management Scary Stories Private Cloud Identity Workplace Teamwork Hiring/Firing Fun Superfish Bookmark Internet Service Provider Identity Theft Smart Tech Regulations Compliance Deep Learning Download Twitter Alerts Evernote Paperless IP Address Memes Error Co-managed IT Education Connectivity SQL Server Technology Care Social Engineering Break Fix Browsers Net Neutrality Financial Data Recovery Upload History Remote Computing Business Communications Multi-Factor Security Smartwatch Hard Drives Mobile Computing Social Network IT Scams Tablet IoT Azure Hybrid Work Search Dark Web Domains Procurement Telework Best Practice Trends Cyber security Alert Tech Human Resources Dark Data Google Calendar CES Refrigeration Managed IT Customer Resource management Communitications Buisness File Sharing Regulations Cables IT solutions Star Wars How To Microsoft Excel Public Speaking Legal Data Analysis Supply Chain Management FinTech Business Growth Gamification Notifications Staff Term Google Apps Lithium-ion battery Legislation IT Assessment Entrepreneur Travel Social Networking IT Maintenance Google Maps Value Business Intelligence Cortana Techology Fileless Malware Flexibility Organization Alt Codes Content Wearable Technology Shortcuts Comparison Digital Security Cameras Undo Health IT Smart Devices Downtime Unified Threat Management Motherboard Ransmoware Hosted Solution Assessment Memory Vendors Permissions Unified Threat Management Directions Remote Working Typing Data Breach Google Play Be Proactive Network Congestion Specifications Videos Electronic Health Records Workforce Internet Exlporer Wasting Time Threats Knowledge Fraud Google Drive User Error Microchip Application Username Trend Micro Security Cameras Workplace Strategies 5G Black Friday Software as a Service Point of Sale Meta Unified Communications Database Managing Costs Amazon Experience IBM Google Docs Bitcoin Network Management eCommerce Running Cable Tech Support IT Technicians SSID Monitors Cyber Monday Google Wallet Proxy Server Surveillance Cookies Virtual Assistant Outsource IT Tactics Virtual Machine Environment Hotspot Media Reviews Windows 8 Laptop Websites Mirgation Medical IT Transportation Small Businesses Competition Drones Development Nanotechnology

Blog Archive