Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management AI Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Facebook Information Automation Cloud Computing Holiday Miscellaneous Training Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Windows 10 Bandwidth Blockchain Virtualization Business Technology Wi-Fi Data Security Vendor Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Budget Gmail BYOD Apple App Employer-Employee Relationship Tip of the week Networking Managed Services Voice over Internet Protocol BDR WiFi HIPAA Applications Access Control Computing Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 How To Augmented Reality Healthcare Storage Password Bring Your Own Device Router Virtual Private Network Big Data Health 2FA Operating System Help Desk Computers Risk Management Retail Website Managed IT Services Office Tips Analytics Cooperation Firewall Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 The Internet of Things Physical Security Microsoft 365 Display Printer Social Going Green Solutions Windows 11 Paperless Office Infrastructure Monitoring Excel Cybercrime Customer Service Document Management Scam Data loss Telephone Remote Workers Money Humor iPhone Robot Telephone System Vulnerabilities Sports Cost Management Safety Mouse IT Management VPN Meetings Images 101 Administration Mobility Multi-Factor Authentication Computer Repair Modem User Tip Processor Mobile Security Settings Employees Customer Relationship Management Printing Integration Supply Chain Wireless Content Filtering Machine Learning Smart Technology YouTube Hacking Cryptocurrency Saving Time Presentation Holidays Data Storage Maintenance Antivirus Managed IT Service Wireless Technology Video Conferencing Virtual Desktop Downloads Data storage Managed Services Provider LiFi Professional Services Virtual Machines Licensing Outlook Data Privacy Entertainment Word How To Net Neutrality SQL Server IT Maintenance Trends Regulations Notifications Google Calendar Financial Data Refrigeration History Business Intelligence Customer Resource management IT Hacks Data Analysis Shortcuts Scary Stories Star Wars Travel Microsoft Excel Smartwatch Public Speaking Lithium-ion battery Procurement Azure Ransmoware Techology Gamification Google Maps Fun Staff Tech Social Networking Legislation Telework Cyber security Vendors Deep Learning Entrepreneur Communitications Fileless Malware Be Proactive Unified Threat Management CES Supply Chain Management Workforce Unified Threat Management Education Content Wearable Technology Term Motherboard Comparison FinTech Undo Threats Health IT IT Assessment Mobile Computing Directions Workplace Strategies Assessment Permissions Network Congestion Flexibility Value Meta User Error Search Specifications Organization Amazon Best Practice Smart Devices Microchip Buisness Internet Exlporer Point of Sale Fraud Digital Security Cameras Remote Working Legal Application Memory Outsource IT IT solutions Username Google Play Media Network Management Tech Support Black Friday Data Breach Environment Business Growth IBM Electronic Health Records Database Videos Monitors Wasting Time Small Businesses Cortana IT Technicians Proxy Server Security Cameras Cookies Websites Cyber Monday Trend Micro Displays Alt Codes Software as a Service Downtime Tactics Hotspot Mirgation Electronic Medical Records Managing Costs Outsourcing SharePoint Hosted Solution Typing SSID Nanotechnology Competition eCommerce Surveillance Virtual Assistant Workplace Lenovo Addiction Language Writing Knowledge Chatbots Virtual Reality Google Drive Virtual Machine Hiring/Firing Management Medical IT Paperless Server Management Screen Reader Private Cloud Distributed Denial of Service Reviews Development User Transportation Co-managed IT Superfish Service Level Agreement Identity Theft 5G Computing Infrastructure Experience Identity Twitter Google Docs Hypervisor Technology Care Unified Communications Bitcoin Bookmark PowerPoint Business Communications Running Cable Smart Tech Error Shopping Optimization IP Address Google Wallet Employer/Employee Relationships Scams Download Alerts Social Engineering Remote Computing PCI DSS Hybrid Work Navigation Windows 8 Browsers Human Resources Laptop Connectivity Break Fix Gig Economy Internet Service Provider Drones Recovery Teamwork Cables Upload Tablet Alert Multi-Factor Security Regulations Compliance Hard Drives Social Network Evernote Memes Google Apps Managed IT Halloween IoT File Sharing Dark Web Dark Data Domains

Blog Archive