Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Holiday Miscellaneous Automation Compliance Cloud Computing Covid-19 Gadgets Training Outsourced IT Managed Service Provider Remote Work Server IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Blockchain Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Networking Mobile Device Management Chrome Gmail Budget WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Voice over Internet Protocol Marketing Managed IT Services Office 365 How To BDR HIPAA Physical Security Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Website Office Tips Analytics Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health Help Desk Operating System Computers 2FA Retail Risk Management Healthcare Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Social Display Printer Going Green Paperless Office Infrastructure Monitoring Customer Service Cybercrime Windows 11 Document Management Managed IT Service Remote Workers Telephone Excel iPhone Virtual Desktop Licensing Data storage LiFi Vulnerabilities Entertainment Word Outlook Money Images 101 Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Data Privacy Safety Sports Mouse IT Management VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Processor Holidays Customer Relationship Management Data Storage Settings Printing Wireless Smart Technology Content Filtering Video Conferencing Hacking Machine Learning Managed Services Provider Presentation Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Supply Chain Wireless Technology Maintenance Antivirus Downloads Social Engineering Break Fix Workplace Google Wallet Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hiring/Firing Recovery Hard Drives Windows 8 Social Network Telework Laptop Cyber security Multi-Factor Security Tech Paperless Dark Web Co-managed IT Domains Drones CES Tablet IoT Communitications Trends Supply Chain Management Alert Technology Care Refrigeration Managed IT Customer Resource management FinTech Halloween File Sharing Regulations Dark Data Google Calendar Term Business Communications How To Microsoft Excel Scams Public Speaking Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Hybrid Work Lithium-ion battery Human Resources Hacks Organization Entrepreneur Scary Stories Travel Social Networking Legislation Fun Cables Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Deep Learning Content Remote Working Wearable Technology Memory Google Apps Undo Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions IT Maintenance Unified Threat Management Directions Videos Education Assessment Electronic Health Records Wasting Time Business Intelligence Shortcuts Mobile Computing Trend Micro Network Congestion Specifications Security Cameras Search Fraud Ransmoware User Error Microchip Internet Exlporer Software as a Service Application Best Practice Username Managing Costs Vendors Be Proactive Buisness Point of Sale eCommerce Black Friday SSID Virtual Assistant Workforce IBM Legal IT solutions Database Surveillance Business Growth Network Management Tech Support IT Technicians Virtual Machine Threats Workplace Strategies Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Cortana Hotspot Transportation Meta Tactics Development Alt Codes Websites Mirgation Hypervisor Amazon Competition Shopping Downtime Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsource IT SharePoint Hosted Solution Addiction Typing Management PCI DSS Chatbots Environment Navigation Media Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Service Level Agreement Internet Service Provider Knowledge Virtual Reality Computing Infrastructure Teamwork Small Businesses Google Drive User Server Management Regulations Compliance Private Cloud Identity Displays Evernote Superfish Bookmark Identity Theft Smart Tech Memes 5G Download Net Neutrality Experience Twitter Alerts SQL Server Outsourcing IP Address Google Docs Unified Communications Bitcoin Financial Data Running Cable Error History

Blog Archive