Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Backup Productivity Microsoft Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Facebook Miscellaneous Holiday Automation Information Covid-19 Cloud Computing Gadgets Training Managed Service Provider Remote Work Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Networking Chrome Gmail Budget WiFi BYOD Apple Managed Services App Voice over Internet Protocol Employer-Employee Relationship Tip of the week Office 365 How To BDR Conferencing Access Control Computing HIPAA Hacker Information Technology Applications Avoiding Downtime Marketing Analytics Office Tips Managed IT Services Help Desk Augmented Reality Storage Password Bring Your Own Device Big Data Virtual Private Network Healthcare Health Operating System 2FA Computers Router Risk Management Retail Website Solutions Scam Data loss Monitoring Firewall Patch Management Save Money The Internet of Things Remote Monitoring End of Support Telephone Vulnerability Vendor Management Social Physical Security Cooperation Remote Workers Display Printer Going Green Paperless Office Windows 11 Infrastructure Customer Service Cybercrime Free Resource Project Management Excel Document Management Windows 7 Microsoft 365 Word Outlook Employees Integration Smart Technology Data Privacy Money Humor Saving Time Robot Holidays Safety Sports Managed IT Service Mouse Data Storage Downloads Video Conferencing Administration Managed Services Provider Licensing IT Management Virtual Machines Professional Services VPN Meetings Entertainment Computer Repair Customer Relationship Management Telephone System Settings iPhone Wireless Printing Cost Management Content Filtering Supply Chain Vulnerabilities Hacking Presentation YouTube Machine Learning Images 101 Cryptocurrency Wireless Technology Multi-Factor Authentication Mobility User Tip Modem Mobile Security Maintenance Processor Virtual Desktop Data storage LiFi Antivirus Scams Videos Social Engineering Proxy Server Windows 8 Electronic Health Records Cookies Laptop Cyber Monday Hard Drives Wasting Time Hotspot Domains Hybrid Work Remote Computing Drones Tactics Human Resources Trend Micro Mirgation Security Cameras Tablet Cables Software as a Service Nanotechnology Halloween Refrigeration Managing Costs Language Public Speaking Alert Addiction Google Apps Dark Data Management eCommerce Chatbots Lithium-ion battery SSID Managed IT File Sharing Entrepreneur IT Maintenance How To Hacks Surveillance Screen Reader Scary Stories Virtual Assistant Distributed Denial of Service Virtual Machine Computing Infrastructure Fun Business Intelligence Notifications Service Level Agreement Shortcuts Reviews Deep Learning Identity Medical IT Travel Undo Google Maps Ransmoware Bookmark Development Smart Tech Transportation Techology Education Hypervisor Alerts Vendors Download Be Proactive Shopping Optimization PowerPoint Unified Threat Management Workforce Browsers Mobile Computing Connectivity Employer/Employee Relationships Break Fix Unified Threat Management Search Navigation Threats PCI DSS Upload Workplace Strategies Gig Economy Network Congestion Social Network Best Practice Multi-Factor Security Application Meta Internet Service Provider IoT Buisness Teamwork Dark Web User Error IT solutions IBM Evernote Amazon Legal Regulations Compliance Trends Customer Resource management Business Growth Memes Regulations Google Calendar Point of Sale Outsource IT Data Analysis Net Neutrality Star Wars SQL Server Microsoft Excel History Staff Cortana Network Management Environment Tech Support Media Financial Data Gamification Smartwatch Monitors Alt Codes IT Social Networking Legislation Competition Small Businesses Fileless Malware Procurement Downtime Azure Content Hosted Solution Cyber security Wearable Technology Tech Displays Websites Telework CES Health IT Typing Communitications Motherboard Comparison Permissions SharePoint Outsourcing Electronic Medical Records Directions Supply Chain Management Assessment FinTech Knowledge Term User Google Drive Workplace Writing IT Assessment Specifications Lenovo Value Fraud 5G Hiring/Firing Virtual Reality Microchip Flexibility Internet Exlporer Paperless Organization Username Unified Communications IP Address Experience Server Management Private Cloud Google Docs Identity Theft Co-managed IT Digital Security Cameras Bitcoin Smart Devices Running Cable Black Friday Superfish Memory Technology Care Twitter Google Wallet Remote Working Database Business Communications Data Breach IT Technicians Google Play Recovery Error

Blog Archive