Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity AI Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Mobile Device Management Chrome Managed Services Voice over Internet Protocol Gmail Budget Networking WiFi Apple App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Computing Applications Hacker Information Technology Health 2FA Website Help Desk Office Tips Analytics Augmented Reality Retail Healthcare Storage Password Managed IT Services Bring Your Own Device Big Data Router Operating System Physical Security Computers Virtual Private Network Risk Management Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Patch Management Save Money Microsoft 365 Going Green Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Cybercrime Display Printer Holidays Virtual Desktop Data Storage Smart Technology Supply Chain Data storage LiFi Video Conferencing Word Machine Learning Managed Services Provider Virtual Machines Professional Services Outlook Saving Time Money Managed IT Service Humor Maintenance Downloads Antivirus iPhone Safety Sports Licensing Mouse Entertainment Vulnerabilities Data Privacy Administration Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Customer Relationship Management Settings Printing IT Management Wireless Content Filtering Meetings VPN Employees Hacking Integration Presentation YouTube Modem User Tip Cryptocurrency Processor Computer Repair Mobile Security Wireless Technology Experience Cookies Monitors Cyber Monday Medical IT IP Address Google Docs Unified Communications Proxy Server Reviews Bitcoin Running Cable Tactics Development Hotspot Transportation Small Businesses Google Wallet Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Recovery Shopping Hard Drives Windows 8 SharePoint Laptop Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Domains Drones Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Refrigeration Halloween Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Public Speaking Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Lithium-ion battery Superfish Bookmark Hacks Entrepreneur Scary Stories Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Fun Error History Connectivity IT Social Engineering Break Fix Scams Deep Learning Browsers Smartwatch Undo Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Education Social Network Telework Cyber security CES Tablet IoT Communitications Dark Web Cables Mobile Computing Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Search Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Application Best Practice Buisness Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts IBM Legal IT solutions Organization Business Growth Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Cortana Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Alt Codes Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Competition Downtime Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hosted Solution Typing User Error Microchip Internet Exlporer Software as a Service Fraud Meta Username Managing Costs Amazon Knowledge Point of Sale eCommerce Black Friday SSID Google Drive User Database Surveillance Virtual Assistant Outsource IT Media Network Management 5G Tech Support IT Technicians Virtual Machine Environment

Blog Archive