Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google IT Services Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android Data Recovery Disaster Recovery Upgrade AI VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Information Automation Artificial Intelligence Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Vendor Apps Managed Services Networking Voice over Internet Protocol Apple Mobile Device Management App Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Avoiding Downtime How To Conferencing Marketing BDR Computing Information Technology HIPAA Access Control Applications Office 365 Hacker Storage Password Managed IT Services Bring Your Own Device Website Healthcare Operating System Virtual Private Network Big Data Risk Management Health Router Analytics Office Tips Augmented Reality 2FA Retail Computers Help Desk Scam Data loss Remote Workers Telephone Patch Management Save Money Free Resource Remote Monitoring Firewall Going Green End of Support Project Management Vulnerability Vendor Management Cooperation Windows 7 Physical Security Cybercrime Microsoft 365 The Internet of Things Display Printer Solutions Paperless Office Social Infrastructure Document Management Windows 11 Customer Service Monitoring Excel Virtual Machines Professional Services Wireless Technology Sports Saving Time Mouse Managed IT Service Administration iPhone Word Downloads Robot Licensing Vulnerabilities Data Privacy Entertainment Images 101 Settings Wireless IT Management Printing Multi-Factor Authentication Content Filtering Safety VPN Mobility Meetings Telephone System YouTube Cost Management Computer Repair Cryptocurrency Employees Integration Virtual Desktop LiFi Data storage Customer Relationship Management User Tip Machine Learning Modem Mobile Security Holidays Processor Outlook Money Data Storage Humor Hacking Supply Chain Presentation Maintenance Video Conferencing Managed Services Provider Antivirus Smart Technology Addiction Social Engineering Gig Economy Language Deep Learning Workplace Hiring/Firing Management Remote Computing Chatbots Internet Service Provider Teamwork Distributed Denial of Service Education IP Address Evernote Paperless Screen Reader Regulations Compliance Co-managed IT Service Level Agreement Computing Infrastructure Memes Tablet Technology Care Alert Identity Mobile Computing Net Neutrality SQL Server Financial Data History Search Managed IT Bookmark Recovery File Sharing Business Communications Smart Tech Dark Data Scams Download How To Smartwatch Alerts Best Practice IT Hard Drives Azure Domains Hybrid Work Notifications Procurement Buisness Telework Break Fix IT solutions Cyber security Tech Browsers Travel Human Resources Connectivity Legal Google Maps Cables Upload CES Business Growth Communitications Techology Refrigeration Public Speaking Social Network Supply Chain Management Multi-Factor Security FinTech Dark Web Cortana Lithium-ion battery Term Unified Threat Management Google Apps IoT IT Maintenance Trends Entrepreneur Alt Codes IT Assessment Unified Threat Management Value Business Intelligence Customer Resource management Regulations Flexibility Google Calendar Downtime Network Congestion Organization Microsoft Excel Hosted Solution Data Analysis Shortcuts Star Wars Ransmoware Gamification Digital Security Cameras Staff Typing Smart Devices User Error Undo Memory Vendors Social Networking Remote Working Legislation Data Breach Knowledge Google Play Fileless Malware Point of Sale Be Proactive Google Drive Workforce Content Videos Wearable Technology Electronic Health Records Wasting Time 5G Network Management Threats Health IT Tech Support Motherboard Comparison Monitors Permissions Unified Communications Trend Micro Experience Security Cameras Directions Application Workplace Strategies Assessment Google Docs Meta Bitcoin Software as a Service Running Cable Managing Costs IBM Amazon Websites Google Wallet Specifications Fraud eCommerce SSID Microchip Internet Exlporer Outsource IT Username Electronic Medical Records Windows 8 Surveillance Laptop SharePoint Virtual Assistant Virtual Machine Environment Media Drones Black Friday Writing Reviews Lenovo Medical IT Database Competition Small Businesses Virtual Reality IT Technicians Development Halloween Transportation Hypervisor Server Management Displays Proxy Server Private Cloud Cookies Cyber Monday Shopping Hotspot Optimization Superfish PowerPoint Identity Theft Tactics Outsourcing Twitter Mirgation Hacks Scary Stories Employer/Employee Relationships Fun Navigation User Error Nanotechnology PCI DSS

Blog Archive