Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Information Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Business Technology Mobile Office Two-factor Authentication Data Security Apps Vendor Tip of the week Mobile Device Management Gmail Networking Chrome Budget Employer-Employee Relationship BYOD Apple App Managed Services Voice over Internet Protocol Marketing Computing Information Technology Conferencing Office 365 How To WiFi BDR HIPAA Applications Hacker Access Control Avoiding Downtime Operating System Website Healthcare Help Desk Risk Management Retail Managed IT Services 2FA Analytics Office Tips Augmented Reality Big Data Storage Password Bring Your Own Device Router Virtual Private Network Computers Health Monitoring Cybercrime Document Management Free Resource Firewall Project Management Windows 7 Scam Telephone Data loss Windows 11 Microsoft 365 The Internet of Things Solutions Cooperation Excel Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Customer Service Display Printer Paperless Office Going Green Infrastructure Remote Workers Content Filtering Machine Learning Smart Technology iPhone YouTube Word Cryptocurrency Saving Time Vulnerabilities Maintenance Managed IT Service Antivirus Virtual Desktop Images 101 Downloads Data storage LiFi Multi-Factor Authentication Safety Mobility Licensing Outlook Supply Chain Entertainment Money Humor Employees Robot Integration Telephone System Sports Cost Management Mouse Customer Relationship Management IT Management VPN Meetings Holidays Administration Data Storage Hacking Presentation Computer Repair Data Privacy Video Conferencing Modem Managed Services Provider User Tip Processor Mobile Security Virtual Machines Professional Services Wireless Technology Settings Wireless Printing Net Neutrality SQL Server SharePoint Hosted Solution Mirgation Electronic Medical Records Vendors Nanotechnology Financial Data Be Proactive History Typing Recovery Lenovo Hard Drives Addiction Smartwatch Language Writing Workforce IT Procurement Google Drive Azure Domains Management Knowledge Chatbots Virtual Reality Threats Screen Reader Private Cloud Telework Distributed Denial of Service Workplace Strategies Cyber security Tech Server Management Superfish Refrigeration Service Level Agreement Identity Theft 5G CES Computing Infrastructure Meta Communitications Supply Chain Management Google Docs Unified Communications Public Speaking Experience Identity Twitter Amazon Smart Tech Error FinTech Bitcoin Lithium-ion battery Term Bookmark Running Cable Download Entrepreneur Alerts Social Engineering Outsource IT IT Assessment Google Wallet Environment Flexibility Media Value Remote Computing Connectivity Organization Break Fix Windows 8 Browsers Laptop Drones Undo Upload Tablet Digital Security Cameras Small Businesses Smart Devices Displays Remote Working Multi-Factor Security Memory Social Network Alert Halloween IoT File Sharing Dark Web Dark Data Data Breach Google Play Managed IT Trends Videos How To Outsourcing Electronic Health Records Google Calendar Wasting Time Customer Resource management Regulations Notifications Scary Stories Application Star Wars Travel Microsoft Excel Workplace Trend Micro Hacks Security Cameras Data Analysis Techology Gamification Google Maps Fun Staff Hiring/Firing Software as a Service Legislation Paperless Managing Costs Deep Learning IBM Social Networking Fileless Malware Unified Threat Management Co-managed IT eCommerce SSID Virtual Assistant Unified Threat Management Education Content Wearable Technology Technology Care Surveillance Motherboard Comparison Business Communications Virtual Machine Health IT Directions Assessment Reviews Permissions Network Congestion Scams Mobile Computing Medical IT Transportation User Error Competition Search Hybrid Work Development Specifications Human Resources Hypervisor Best Practice Microchip Buisness Internet Exlporer Point of Sale Shopping Fraud Cables Optimization PowerPoint Legal Employer/Employee Relationships IT solutions Username Tech Support PCI DSS Black Friday Google Apps Business Growth Navigation Network Management User Database Gig Economy Monitors IT Maintenance Teamwork Cortana IT Technicians Business Intelligence Internet Service Provider Cookies Websites Regulations Compliance Cyber Monday Shortcuts Alt Codes IP Address Evernote Proxy Server Downtime Tactics Hotspot Ransmoware Memes

Blog Archive