Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Computer Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Automation Artificial Intelligence Holiday Compliance Gadgets Cloud Computing Training Covid-19 Remote Work IT Support Outsourced IT Server Managed Service Provider Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Managed Services Vendor Data Security Mobile Office WiFi Tip of the week Employer-Employee Relationship Chrome Budget Voice over Internet Protocol Networking Apple App Mobile Device Management BYOD Gmail Access Control Office 365 Password HIPAA Managed IT Services Hacker How To Avoiding Downtime BDR Applications Marketing Physical Security Computing Conferencing Information Technology Health Big Data Analytics Office Tips Augmented Reality Retail Storage Computers Bring Your Own Device Router Healthcare 2FA Website Help Desk Operating System Virtual Private Network Risk Management Paperless Office The Internet of Things Telephone Infrastructure Social Document Management Cooperation Customer Service Scam Data loss Remote Workers Windows 11 Patch Management Excel Save Money Going Green Remote Monitoring Free Resource Project Management End of Support Vulnerability Monitoring Vendor Management Windows 7 Firewall Cybercrime Microsoft 365 Display Printer Solutions Managed IT Service Data Privacy Employees Downloads Integration Virtual Desktop Licensing Data storage LiFi Entertainment Machine Learning Holidays Outlook Money Data Storage Customer Relationship Management Humor Telephone System Maintenance Video Conferencing Antivirus Cost Management Managed Services Provider Virtual Machines Professional Services Hacking Sports Presentation Mouse Wireless Technology Administration iPhone User Tip Supply Chain Modem Robot Processor Mobile Security Vulnerabilities Word Images 101 Settings Printing IT Management Smart Technology Wireless Meetings Multi-Factor Authentication Content Filtering Mobility VPN Saving Time YouTube Cryptocurrency Computer Repair Safety Alerts Trend Micro Experience Monitors Security Cameras Google Docs Download Unified Communications Google Apps Bitcoin Software as a Service Running Cable Browsers IT Maintenance Google Wallet Connectivity Websites Break Fix Managing Costs eCommerce SSID Business Intelligence Upload SharePoint Social Network Shortcuts Application Windows 8 Surveillance Laptop Electronic Medical Records Multi-Factor Security Virtual Assistant Ransmoware Drones IoT Dark Web Virtual Machine Writing Medical IT Vendors IBM Lenovo Trends Reviews Customer Resource management Be Proactive Regulations Development Halloween Virtual Reality Google Calendar Transportation Data Analysis Workforce Server Management Star Wars Private Cloud Microsoft Excel Hypervisor Identity Theft Staff Optimization PowerPoint Threats Superfish Gamification Shopping Workplace Strategies Hacks Social Networking Scary Stories Twitter Legislation Employer/Employee Relationships Fun Navigation Fileless Malware Meta Competition PCI DSS Error Deep Learning Wearable Technology Social Engineering Amazon Content Gig Economy Health IT Motherboard Internet Service Provider Remote Computing Comparison Teamwork Evernote Directions Outsource IT Assessment Regulations Compliance Education Permissions Media User Tablet Memes Environment Mobile Computing Net Neutrality Alert Specifications SQL Server History Search Dark Data Microchip Small Businesses Managed IT Internet Exlporer Financial Data File Sharing Fraud Smartwatch Best Practice IT How To Displays IP Address Username Procurement Buisness Notifications Black Friday Azure Cyber security Tech Outsourcing Legal Database Telework IT solutions Travel CES Recovery Business Growth Google Maps IT Technicians Communitications Techology Proxy Server Workplace Hard Drives Cookies Supply Chain Management Cyber Monday Cortana Term Hiring/Firing Domains Tactics FinTech Unified Threat Management Hotspot Unified Threat Management Paperless Alt Codes Mirgation IT Assessment Co-managed IT Refrigeration Nanotechnology Flexibility Downtime Value Language Network Congestion Technology Care Public Speaking Addiction Organization Hosted Solution User Error Management Digital Security Cameras Business Communications Typing Chatbots Smart Devices Lithium-ion battery Scams Screen Reader Remote Working Entrepreneur Distributed Denial of Service Memory Point of Sale Computing Infrastructure Data Breach Knowledge Google Play Hybrid Work Google Drive Service Level Agreement Videos Human Resources Identity Electronic Health Records Bookmark Cables Undo Network Management Smart Tech Tech Support Wasting Time 5G

Blog Archive