Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Training Compliance Covid-19 Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Managed Services Mobile Office Data Security Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR Operating System Router 2FA Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Bring Your Own Device Big Data Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Customer Service Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Document Management Managed IT Service Free Resource Firewall Project Management Telephone Scam Windows 7 Data loss Microsoft 365 The Internet of Things Cooperation Solutions Social Going Green Patch Management Save Money Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Holidays YouTube Meetings Data Storage Cryptocurrency User Tip Modem Hacking Supply Chain Processor Video Conferencing Presentation Computer Repair Mobile Security Managed Services Provider Virtual Machines Virtual Desktop Professional Services Data storage LiFi Wireless Technology Smart Technology Outlook Machine Learning Money Saving Time iPhone Humor Word Vulnerabilities Maintenance Data Privacy Sports Downloads Antivirus Images 101 Mouse Licensing Multi-Factor Authentication Mobility Safety Entertainment Administration Robot Employees Telephone System Cost Management Integration Alt Codes Content IBM Managing Costs Amazon Wearable Technology eCommerce Downtime Unified Threat Management Motherboard SSID Comparison Health IT Unified Threat Management Directions Surveillance Hosted Solution Assessment Virtual Assistant Outsource IT Permissions Media Typing Virtual Machine Environment Medical IT Network Congestion Specifications Reviews Google Drive User Error Microchip Development Internet Exlporer Competition Transportation Small Businesses Knowledge Fraud Username Hypervisor Displays Optimization Point of Sale PowerPoint 5G Black Friday Shopping Google Docs Unified Communications Database Employer/Employee Relationships Outsourcing Experience Running Cable Tech Support IT Technicians User Navigation PCI DSS Bitcoin Network Management Google Wallet Proxy Server Cookies Workplace Monitors Cyber Monday Gig Economy Internet Service Provider Tactics Teamwork Hiring/Firing Hotspot Laptop Websites Mirgation Evernote Paperless Regulations Compliance Windows 8 IP Address Drones Memes Nanotechnology Co-managed IT SharePoint Net Neutrality Addiction SQL Server Technology Care Electronic Medical Records Language Halloween Chatbots Recovery Business Communications Financial Data Management History Lenovo IT Screen Reader Hard Drives Scams Writing Distributed Denial of Service Smartwatch Procurement Service Level Agreement Domains Azure Hybrid Work Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Tech Human Resources Telework Hacks Server Management Cyber security CES Superfish Bookmark Communitications Identity Theft Smart Tech Refrigeration Cables Fun Supply Chain Management Deep Learning Download Public Speaking Twitter Alerts Error Term Google Apps FinTech Lithium-ion battery Browsers IT Assessment Education Connectivity IT Maintenance Social Engineering Break Fix Entrepreneur Flexibility Upload Value Business Intelligence Remote Computing Shortcuts Multi-Factor Security Organization Mobile Computing Social Network Digital Security Cameras Smart Devices Tablet IoT Undo Ransmoware Search Dark Web Remote Working Best Practice Trends Memory Vendors Alert Data Breach Buisness File Sharing Regulations Google Play Be Proactive Dark Data Google Calendar Managed IT Customer Resource management Videos Legal Data Analysis Electronic Health Records IT solutions Star Wars Workforce How To Microsoft Excel Business Growth Gamification Wasting Time Threats Notifications Staff Trend Micro Travel Social Networking Application Security Cameras Workplace Strategies Legislation Techology Fileless Malware Software as a Service Google Maps Meta Cortana

Blog Archive