Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android Data Recovery AI Upgrade Disaster Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Virtualization Business Technology Apps Two-factor Authentication Data Security Mobile Office Vendor Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Conferencing Computing Information Technology Hacker Avoiding Downtime How To Office 365 BDR Marketing HIPAA Applications Access Control Operating System Retail Healthcare Risk Management Computers Managed IT Services Website Office Tips Analytics Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network Health Big Data 2FA Help Desk Excel Document Management Cybercrime Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Physical Security Display The Internet of Things Printer Paperless Office Windows 11 Infrastructure Monitoring Going Green Social Settings Video Conferencing Machine Learning Managed Services Provider Printing Wireless Content Filtering Saving Time Virtual Machines Professional Services Customer Relationship Management YouTube Managed IT Service Cryptocurrency Maintenance Antivirus Downloads Hacking iPhone Presentation Licensing Virtual Desktop Entertainment Data storage Vulnerabilities LiFi Wireless Technology Data Privacy Images 101 Outlook Telephone System Multi-Factor Authentication Money Robot Mobility Word Cost Management Humor Sports IT Management VPN Employees Meetings Mouse Integration Safety User Tip Modem Administration Processor Computer Repair Mobile Security Holidays Data Storage Smart Technology Supply Chain Electronic Medical Records Language Employer/Employee Relationships Outsourcing Alt Codes IBM SharePoint Addiction Management PCI DSS Chatbots Navigation Downtime Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Hosted Solution Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Typing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Knowledge Superfish Bookmark Identity Theft Smart Tech Memes Google Drive Co-managed IT Competition Twitter Alerts SQL Server Technology Care Download Net Neutrality Financial Data Error History Business Communications 5G Experience Browsers Smartwatch Connectivity IT Google Docs Social Engineering Break Fix Scams Unified Communications Remote Computing Azure Hybrid Work Bitcoin Running Cable User Upload Procurement Social Network Telework Cyber security Google Wallet Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables Alert Windows 8 IP Address Laptop Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Drones Dark Data Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Halloween Recovery Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Hard Drives Domains Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Hacks Scary Stories Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Refrigeration Fun Public Speaking Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Deep Learning Wasting Time Threats Lithium-ion battery Entrepreneur Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Education User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Mobile Computing Username Search Point of Sale eCommerce Black Friday SSID Undo Best Practice Database Surveillance Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Media Buisness Proxy Server Reviews Cookies Legal Monitors Cyber Monday Medical IT IT solutions Hotspot Transportation Small Businesses Business Growth Tactics Development Websites Mirgation Hypervisor Displays Application Cortana Shopping Nanotechnology Optimization PowerPoint

Blog Archive