Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Holiday Miscellaneous Covid-19 Cloud Computing Training Gadgets Server Compliance Managed Service Provider Remote Work IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Budget Networking Mobile Device Management Apple Gmail App WiFi BYOD Managed Services Voice over Internet Protocol Information Technology Access Control Hacker Office 365 Conferencing Avoiding Downtime Marketing How To BDR HIPAA Applications Computing Risk Management Health Help Desk Computers Analytics Office Tips Retail Augmented Reality Website Storage Password Managed IT Services Bring Your Own Device 2FA Router Big Data Physical Security Operating System Virtual Private Network Healthcare Paperless Office Infrastructure Monitoring Customer Service Free Resource Project Management Document Management Windows 7 Microsoft 365 Telephone Scam Solutions Data loss Cooperation Firewall Windows 11 Patch Management Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Going Green Vendor Management Excel Social Cybercrime Display Remote Workers Printer iPhone Cryptocurrency Customer Relationship Management Vulnerabilities Smart Technology Virtual Desktop Data Privacy Machine Learning Data storage Hacking LiFi Saving Time Images 101 Presentation Mobility Outlook Multi-Factor Authentication Managed IT Service Wireless Technology Money Maintenance Downloads Humor Antivirus Licensing Employees Entertainment Word Sports Integration Mouse Administration Holidays Robot Telephone System Cost Management Safety Data Storage Supply Chain Video Conferencing IT Management Managed Services Provider VPN Virtual Machines Settings Meetings Professional Services Printing Wireless Content Filtering User Tip Modem Processor YouTube Computer Repair Mobile Security Proxy Server IT Cookies Scams Monitors Cyber Monday Smartwatch Procurement Tactics Azure Hybrid Work 5G Hotspot Websites Mirgation Tech Human Resources Google Docs Telework Unified Communications Cyber security Experience Communitications Running Cable Nanotechnology Cables CES Competition Bitcoin Google Wallet SharePoint Supply Chain Management Addiction Electronic Medical Records Language Chatbots Term Google Apps FinTech Management Lenovo IT Assessment Laptop Screen Reader IT Maintenance Writing Distributed Denial of Service Windows 8 Drones Flexibility User Service Level Agreement Value Business Intelligence Virtual Reality Computing Infrastructure Private Cloud Identity Shortcuts Organization Server Management Superfish Bookmark Smart Devices Halloween Identity Theft Smart Tech Ransmoware Digital Security Cameras IP Address Remote Working Download Memory Vendors Twitter Alerts Error Google Play Be Proactive Data Breach Browsers Electronic Health Records Scary Stories Connectivity Workforce Social Engineering Break Fix Videos Hacks Recovery Upload Wasting Time Threats Fun Remote Computing Security Cameras Workplace Strategies Multi-Factor Security Hard Drives Deep Learning Social Network Trend Micro Software as a Service Tablet IoT Meta Dark Web Domains Education Trends Managing Costs Amazon Alert File Sharing Regulations SSID Dark Data Google Calendar Refrigeration Managed IT Customer Resource management eCommerce Public Speaking Mobile Computing Data Analysis Surveillance Star Wars Virtual Assistant Outsource IT How To Microsoft Excel Lithium-ion battery Gamification Virtual Machine Environment Search Notifications Staff Media Entrepreneur Travel Social Networking Medical IT Legislation Reviews Best Practice Techology Fileless Malware Development Buisness Google Maps Transportation Small Businesses Legal IT solutions Content Hypervisor Displays Wearable Technology Optimization Unified Threat Management Motherboard PowerPoint Comparison Shopping Undo Business Growth Health IT Unified Threat Management Directions Assessment Employer/Employee Relationships Outsourcing Permissions Navigation PCI DSS Cortana Workplace Network Congestion Specifications Gig Economy Alt Codes User Error Microchip Internet Service Provider Downtime Internet Exlporer Teamwork Hiring/Firing Fraud Evernote Paperless Regulations Compliance Application Hosted Solution Username Memes Point of Sale Co-managed IT Black Friday Typing IBM Net Neutrality Database SQL Server Technology Care Tech Support IT Technicians Business Communications Google Drive Financial Data Network Management History Knowledge

Blog Archive