Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade Business Management Smartphones VoIP AI Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Government Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Blockchain Vendor Data Security Two-factor Authentication Apps Mobile Office Mobile Device Management Networking Gmail BYOD Chrome Managed Services Budget Voice over Internet Protocol Employer-Employee Relationship Apple Tip of the week App HIPAA Computing Applications How To Information Technology BDR WiFi Office 365 Conferencing Access Control Hacker Avoiding Downtime Marketing Operating System Router Managed IT Services Risk Management Help Desk Analytics Office Tips Big Data Augmented Reality Virtual Private Network Storage Healthcare Password Bring Your Own Device Health 2FA Computers Retail Website Scam Solutions Data loss Cybercrime Firewall Patch Management Save Money Monitoring The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Social Physical Security Display Remote Workers Printer Telephone Paperless Office Windows 11 Infrastructure Customer Service Cooperation Free Resource Excel Project Management Document Management Windows 7 Going Green Microsoft 365 Content Filtering Word YouTube Employees Integration Cryptocurrency Data Privacy User Tip Modem Mobile Security Processor Holidays Virtual Desktop Robot Safety Data storage LiFi Data Storage Smart Technology Outlook Video Conferencing IT Management Managed Services Provider Money Virtual Machines Meetings Professional Services Saving Time VPN Humor Managed IT Service Computer Repair Sports Customer Relationship Management Downloads Mouse iPhone Licensing Hacking Administration Vulnerabilities Entertainment Supply Chain Presentation Machine Learning Images 101 Wireless Technology Mobility Telephone System Multi-Factor Authentication Cost Management Maintenance Settings Wireless Antivirus Printing Videos Permissions Hard Drives Electronic Health Records Hosted Solution Social Engineering Directions Scams Assessment Domains Typing Wasting Time Remote Computing Hybrid Work Trend Micro Security Cameras Human Resources Specifications Fraud Google Drive Refrigeration Software as a Service Tablet Microchip Cables Knowledge Internet Exlporer Username Public Speaking Managing Costs Alert eCommerce File Sharing SSID Dark Data Google Apps 5G Lithium-ion battery Managed IT Black Friday Google Docs Surveillance Unified Communications Entrepreneur Virtual Assistant How To IT Maintenance Experience Database IT Technicians Bitcoin Virtual Machine Notifications Business Intelligence Running Cable Google Wallet Travel Medical IT Proxy Server Shortcuts Cookies Reviews Cyber Monday Techology Hotspot Undo Development Google Maps Transportation Ransmoware Tactics Laptop Mirgation Windows 8 Hypervisor Vendors Drones Optimization Unified Threat Management PowerPoint Be Proactive Nanotechnology Shopping Unified Threat Management Language Employer/Employee Relationships Workforce Addiction Halloween Navigation Management Chatbots PCI DSS Threats Application Network Congestion Workplace Strategies Screen Reader Gig Economy Distributed Denial of Service User Error Computing Infrastructure Internet Service Provider Teamwork Meta Service Level Agreement Scary Stories Evernote Identity IBM Regulations Compliance Hacks Amazon Memes Point of Sale Bookmark Fun Smart Tech Alerts Net Neutrality Deep Learning SQL Server Outsource IT Download Environment Media Financial Data Network Management History Tech Support IT Education Monitors Browsers Connectivity Smartwatch Break Fix Upload Competition Procurement Azure Small Businesses Displays Tech Social Network Telework Multi-Factor Security Mobile Computing Cyber security Websites Dark Web Communitications Search IoT CES Trends SharePoint Supply Chain Management Best Practice Electronic Medical Records Outsourcing Buisness Term Customer Resource management Regulations FinTech Google Calendar User Lenovo Microsoft Excel Legal IT Assessment IT solutions Writing Data Analysis Workplace Star Wars Gamification Staff Flexibility Business Growth Value Virtual Reality Hiring/Firing Private Cloud Paperless Social Networking IP Address Organization Server Management Legislation Superfish Smart Devices Identity Theft Fileless Malware Co-managed IT Cortana Digital Security Cameras Content Wearable Technology Remote Working Alt Codes Memory Twitter Technology Care Error Downtime Google Play Health IT Business Communications Motherboard Comparison Recovery Data Breach

Blog Archive