Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Facebook Holiday Automation Compliance Cloud Computing Covid-19 Gadgets Training Outsourced IT Managed Service Provider IT Support Remote Work Server Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Bandwidth Blockchain Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Apple App Employer-Employee Relationship Tip of the week Voice over Internet Protocol Marketing Office 365 Managed IT Services How To BDR Password HIPAA Physical Security Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Website Healthcare Analytics Office Tips Augmented Reality Storage Bring Your Own Device Router Big Data Virtual Private Network Health Help Desk 2FA Operating System Computers Retail Risk Management Scam Data loss Cooperation Firewall Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Vendor Management The Internet of Things Solutions Social Display Printer Paperless Office Going Green Infrastructure Windows 11 Monitoring Customer Service Cybercrime Document Management Excel Managed IT Service Remote Workers Telephone Virtual Desktop Data storage LiFi Licensing iPhone Word Entertainment Outlook Vulnerabilities Data Privacy Money Humor Telephone System Images 101 Robot Cost Management Safety Multi-Factor Authentication Mobility Sports Mouse IT Management VPN Meetings Administration Employees Integration User Tip Modem Processor Computer Repair Mobile Security Customer Relationship Management Holidays Settings Wireless Smart Technology Printing Data Storage Content Filtering Machine Learning Hacking Supply Chain Saving Time Presentation Video Conferencing YouTube Managed Services Provider Cryptocurrency Virtual Machines Professional Services Wireless Technology Maintenance Downloads Antivirus SQL Server Technology Care Browsers Connectivity Social Engineering Break Fix Google Wallet Net Neutrality Financial Data Recovery History Business Communications Upload Remote Computing Smartwatch Multi-Factor Security Hard Drives Windows 8 IT Laptop Scams Social Network Azure Hybrid Work Tablet IoT Dark Web Domains Drones Procurement Telework Cyber security Tech Human Resources Trends Alert Managed IT Customer Resource management File Sharing Regulations CES Dark Data Google Calendar Refrigeration Communitications Halloween Cables Data Analysis Star Wars How To Microsoft Excel Public Speaking Supply Chain Management Notifications Staff Lithium-ion battery FinTech Term Google Apps Gamification Travel Social Networking Legislation Hacks IT Assessment Entrepreneur Scary Stories IT Maintenance Value Business Intelligence Techology Fileless Malware Fun Google Maps Flexibility Wearable Technology Organization Deep Learning Shortcuts Content Health IT Unified Threat Management Motherboard Digital Security Cameras Comparison Undo Smart Devices Ransmoware Education Memory Vendors Unified Threat Management Directions Assessment Permissions Remote Working Data Breach Google Play Be Proactive Videos Network Congestion Specifications Mobile Computing Electronic Health Records Workforce Wasting Time Threats User Error Microchip Search Internet Exlporer Fraud Application Best Practice Trend Micro Security Cameras Workplace Strategies Username Meta Point of Sale Black Friday Software as a Service Buisness IT solutions Managing Costs Amazon Database IBM Legal Tech Support IT Technicians Business Growth eCommerce SSID Network Management Virtual Assistant Outsource IT Proxy Server Cookies Monitors Cyber Monday Surveillance Virtual Machine Environment Cortana Media Tactics Hotspot Websites Mirgation Reviews Alt Codes Medical IT Transportation Small Businesses Nanotechnology Competition Development Downtime Hosted Solution Hypervisor Displays SharePoint Addiction Electronic Medical Records Language Chatbots Shopping Typing Optimization PowerPoint Management Employer/Employee Relationships Outsourcing Lenovo Screen Reader Writing Distributed Denial of Service PCI DSS User Knowledge Navigation Service Level Agreement Virtual Reality Computing Infrastructure Google Drive Private Cloud Identity Gig Economy Workplace Server Management Teamwork Hiring/Firing Superfish Bookmark 5G Identity Theft Smart Tech Internet Service Provider Google Docs Regulations Compliance Unified Communications Experience Evernote Paperless Download Twitter Alerts IP Address Error Bitcoin Memes Running Cable Co-managed IT

Blog Archive