Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Artificial Intelligence Information Automation Cloud Computing Training Gadgets Covid-19 Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Government Business Continuity Virtualization Blockchain Bandwidth Business Technology Wi-Fi Windows 10 Two-factor Authentication Apps Vendor Mobile Office Data Security Gmail BYOD WiFi Chrome Employer-Employee Relationship Managed Services Voice over Internet Protocol Budget Tip of the week Apple App Networking Mobile Device Management Information Technology Office 365 Access Control HIPAA Applications Hacker Avoiding Downtime Marketing Conferencing How To Computing BDR Risk Management Big Data Office Tips Analytics Virtual Private Network Augmented Reality 2FA Health Storage Router Password Healthcare Bring Your Own Device Computers Retail Help Desk Website Managed IT Services Operating System Patch Management Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Cooperation Vendor Management Physical Security Social Display Windows 11 Printer Paperless Office Remote Workers Infrastructure Excel Customer Service Document Management Free Resource Project Management Windows 7 Monitoring Going Green Scam Microsoft 365 Data loss Solutions Cybercrime Firewall Telephone Robot Cryptocurrency Licensing Safety Entertainment Virtual Desktop Holidays Data storage LiFi IT Management VPN Data Storage Meetings Video Conferencing Telephone System Outlook Managed Services Provider Cost Management Professional Services Money Virtual Machines Computer Repair Humor Customer Relationship Management Supply Chain Sports iPhone Mouse Machine Learning User Tip Modem Hacking Presentation Mobile Security Processor Vulnerabilities Administration Wireless Technology Images 101 Maintenance Smart Technology Antivirus Multi-Factor Authentication Mobility Settings Saving Time Data Privacy Printing Word Wireless Content Filtering Managed IT Service YouTube Employees Integration Downloads Break Fix Entrepreneur Travel Managing Costs Browsers Vendors Connectivity Upload Be Proactive Techology Google Maps 5G eCommerce SSID Virtual Assistant Social Network Google Docs Workforce Unified Communications Multi-Factor Security Experience Surveillance Bitcoin Dark Web Running Cable Unified Threat Management Virtual Machine Threats IoT Undo Trends Google Wallet Workplace Strategies Unified Threat Management Reviews Medical IT Development Transportation Customer Resource management Meta Regulations Google Calendar Windows 8 Microsoft Excel Laptop Hypervisor Network Congestion Data Analysis Amazon Star Wars PowerPoint Gamification Drones User Error Staff Shopping Optimization Employer/Employee Relationships Outsource IT Social Networking Application Legislation Media Halloween PCI DSS Point of Sale Fileless Malware Navigation Environment Content IBM Wearable Technology Gig Economy Internet Service Provider Tech Support Teamwork Health IT Small Businesses Motherboard Network Management Comparison Hacks Permissions Scary Stories Regulations Compliance Monitors Directions Evernote Displays Assessment Fun Memes Net Neutrality Websites SQL Server Outsourcing Deep Learning Specifications Competition Fraud Financial Data History Microchip Internet Exlporer Username Workplace SharePoint Education Smartwatch IT Electronic Medical Records Procurement Azure Hiring/Firing Black Friday Database Mobile Computing Paperless Lenovo Telework Cyber security Writing Tech Co-managed IT IT Technicians User CES Search Communitications Virtual Reality Cyber Monday Supply Chain Management Private Cloud Proxy Server Technology Care Cookies Best Practice Server Management Tactics Business Communications Superfish Hotspot Buisness FinTech Identity Theft Term IP Address Legal Scams Mirgation IT solutions IT Assessment Twitter Flexibility Error Value Hybrid Work Nanotechnology Business Growth Addiction Human Resources Language Organization Social Engineering Management Cables Chatbots Recovery Digital Security Cameras Cortana Smart Devices Remote Computing Distributed Denial of Service Remote Working Memory Screen Reader Hard Drives Alt Codes Service Level Agreement Domains Google Apps Computing Infrastructure Downtime Tablet Data Breach Google Play Alert IT Maintenance Identity Hosted Solution Videos Electronic Health Records Managed IT File Sharing Wasting Time Dark Data Bookmark Business Intelligence Smart Tech Refrigeration Typing Download Public Speaking Shortcuts Alerts Trend Micro How To Security Cameras Notifications Lithium-ion battery Google Drive Ransmoware Knowledge Software as a Service

Blog Archive