Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Hosted Solutions Collaboration Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Facebook Information Miscellaneous Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Compliance Managed Service Provider Remote Work Server IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Blockchain Business Technology Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Apps Data Security BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol Tip of the week WiFi Chrome Employer-Employee Relationship Budget Networking Apple App Marketing Computing Access Control Information Technology HIPAA Office 365 Applications How To BDR Hacker Conferencing Avoiding Downtime Website 2FA Operating System Virtual Private Network Risk Management Health Healthcare Router Big Data Analytics Office Tips Retail Augmented Reality Storage Help Desk Managed IT Services Password Bring Your Own Device Computers Vendor Management Windows 11 Going Green Physical Security Cooperation Display Excel Cybercrime Printer Firewall Paperless Office Remote Workers Infrastructure The Internet of Things Document Management Free Resource Social Project Management Windows 7 Scam Data loss Microsoft 365 Monitoring Customer Service Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Telephone Holidays IT Management Licensing Meetings VPN Settings Data Storage Entertainment Wireless Word Supply Chain Printing Content Filtering Video Conferencing Managed Services Provider YouTube Virtual Machines Computer Repair Professional Services Telephone System Cryptocurrency Cost Management Safety Virtual Desktop iPhone Data storage LiFi Machine Learning Vulnerabilities Data Privacy Outlook User Tip Modem Money Images 101 Processor Maintenance Mobile Security Humor Antivirus Multi-Factor Authentication Mobility Customer Relationship Management Sports Smart Technology Mouse Hacking Employees Saving Time Presentation Administration Integration Robot Wireless Technology Managed IT Service Downloads Unified Threat Management Reviews Browsers Connectivity Medical IT Break Fix Cortana Development Upload Recovery Transportation Small Businesses Social Network Hard Drives Hypervisor Displays Network Congestion Multi-Factor Security Alt Codes User Error Downtime Shopping Domains Optimization IoT PowerPoint Dark Web Hosted Solution Trends Employer/Employee Relationships Outsourcing PCI DSS Customer Resource management Point of Sale Refrigeration Regulations Navigation Google Calendar Typing Gig Economy Data Analysis Public Speaking Star Wars Workplace Microsoft Excel Teamwork Hiring/Firing Staff Google Drive Network Management Lithium-ion battery Knowledge Internet Service Provider Gamification Tech Support Regulations Compliance Social Networking Monitors Entrepreneur Evernote Paperless Legislation Fileless Malware 5G Memes Co-managed IT SQL Server Technology Care Wearable Technology Google Docs Unified Communications Experience Net Neutrality Content Websites Financial Data Health IT Undo History Motherboard Business Communications Comparison Bitcoin Running Cable SharePoint Smartwatch Directions IT Assessment Electronic Medical Records Scams Permissions Google Wallet Azure Hybrid Work Procurement Telework Cyber security Writing Tech Human Resources Specifications Windows 8 Lenovo Laptop Drones CES Microchip Communitications Internet Exlporer Virtual Reality Cables Fraud Server Management Supply Chain Management Username Private Cloud Application Halloween FinTech Identity Theft Term Google Apps Black Friday Superfish IBM IT Assessment Database Twitter IT Maintenance Value Business Intelligence IT Technicians Flexibility Error Scary Stories Organization Proxy Server Cookies Social Engineering Shortcuts Cyber Monday Hacks Digital Security Cameras Fun Smart Devices Tactics Remote Computing Ransmoware Hotspot Memory Vendors Mirgation Deep Learning Remote Working Tablet Competition Data Breach Nanotechnology Google Play Be Proactive Education Videos Electronic Health Records Addiction Alert Workforce Language Wasting Time Threats Chatbots Dark Data Managed IT Management File Sharing Trend Micro Screen Reader How To Security Cameras Workplace Strategies Distributed Denial of Service Mobile Computing Search Software as a Service Service Level Agreement Notifications User Meta Computing Infrastructure Managing Costs Amazon Identity Best Practice Travel Techology Buisness Bookmark Google Maps eCommerce Smart Tech SSID Legal IT solutions IP Address Surveillance Download Virtual Assistant Outsource IT Alerts Unified Threat Management Virtual Machine Environment Media Business Growth

Blog Archive