Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi How To BDR HIPAA Computing Hacker Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Healthcare Computers Router Display Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Monitoring Microsoft 365 Solutions Firewall Document Management Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation Excel Going Green Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Customer Service Cybercrime Physical Security Cryptocurrency Wireless Technology User Tip Vulnerabilities Modem Data Privacy Computer Repair Mobile Security Processor Images 101 Virtual Desktop LiFi Data storage Multi-Factor Authentication Mobility Smart Technology Word Outlook Machine Learning Money Saving Time Humor Employees Managed IT Service Integration Safety Maintenance Downloads Antivirus Sports Mouse Licensing Holidays Administration Entertainment Data Storage Supply Chain Video Conferencing Managed Services Provider Robot Virtual Machines Telephone System Professional Services Cost Management Customer Relationship Management Settings Wireless Printing Content Filtering Hacking IT Management Presentation VPN iPhone YouTube Meetings Telework Cyber security Username Tech Human Resources 5G Black Friday CES Communitications Cables Point of Sale Unified Communications Database Experience Supply Chain Management IP Address Google Docs FinTech Bitcoin Network Management Term Google Apps Running Cable Tech Support IT Technicians Monitors Cyber Monday IT Assessment Google Wallet Proxy Server IT Maintenance Cookies Value Business Intelligence Recovery Tactics Hotspot Flexibility Organization Hard Drives Windows 8 Shortcuts Laptop Websites Mirgation Digital Security Cameras Smart Devices Domains Drones Ransmoware Nanotechnology Memory Vendors Addiction Electronic Medical Records Language Remote Working SharePoint Data Breach Refrigeration Management Google Play Be Proactive Halloween Chatbots Writing Distributed Denial of Service Videos Electronic Health Records Public Speaking Lenovo Workforce Screen Reader Wasting Time Threats Service Level Agreement Virtual Reality Computing Infrastructure Lithium-ion battery Trend Micro Hacks Server Management Security Cameras Workplace Strategies Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Software as a Service Superfish Bookmark Meta Managing Costs Amazon Deep Learning Download Twitter Alerts eCommerce Undo SSID Error Education Connectivity Social Engineering Break Fix Surveillance Browsers Virtual Assistant Outsource IT Virtual Machine Environment Upload Media Remote Computing Multi-Factor Security Reviews Mobile Computing Social Network Medical IT Tablet IoT Search Dark Web Development Transportation Small Businesses Hypervisor Displays Application Best Practice Trends Alert Dark Data Google Calendar Shopping Optimization Managed IT Customer Resource management PowerPoint Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel IBM Legal Data Analysis Employer/Employee Relationships Outsourcing Business Growth Gamification Navigation Notifications Staff PCI DSS Legislation Gig Economy Workplace Travel Social Networking Google Maps Cortana Internet Service Provider Techology Fileless Malware Teamwork Hiring/Firing Alt Codes Content Evernote Paperless Wearable Technology Regulations Compliance Comparison Memes Competition Health IT Co-managed IT Downtime Unified Threat Management Motherboard Hosted Solution Assessment Permissions Net Neutrality Unified Threat Management Directions SQL Server Technology Care History Typing Business Communications Financial Data Network Congestion Specifications Smartwatch IT Scams User Internet Exlporer Knowledge Fraud Procurement Google Drive User Error Microchip Azure Hybrid Work

Blog Archive