Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Artificial Intelligence Holiday Automation Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Data Security Two-factor Authentication Vendor Apps Tip of the week App Managed Services Voice over Internet Protocol Mobile Device Management Networking Gmail WiFi BYOD Chrome Employer-Employee Relationship Budget Apple Avoiding Downtime Conferencing Marketing Computing How To Information Technology BDR Office 365 HIPAA Applications Access Control Hacker 2FA Website Retail Healthcare Operating System Managed IT Services Risk Management Big Data Analytics Office Tips Augmented Reality Router Physical Security Virtual Private Network Storage Password Bring Your Own Device Health Computers Help Desk Windows 11 Document Management Going Green Remote Workers Excel Telephone Scam Data loss Cybercrime Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Social Vendor Management Solutions Display Printer Customer Service Paperless Office Infrastructure Monitoring Video Conferencing Wireless Technology Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Supply Chain Maintenance Settings Wireless Antivirus Printing Word Downloads iPhone Content Filtering Licensing YouTube Vulnerabilities Entertainment Cryptocurrency Safety Images 101 Telephone System Multi-Factor Authentication Virtual Desktop Robot Mobility LiFi Data storage Cost Management Data Privacy Outlook IT Management VPN Employees Money Meetings Integration Humor Customer Relationship Management User Tip Modem Computer Repair Mobile Security Processor Sports Mouse Holidays Hacking Presentation Data Storage Smart Technology Administration Addiction Best Practice Electronic Medical Records Language Employer/Employee Relationships Outsource IT SharePoint Media Management PCI DSS Chatbots Buisness Navigation Environment IT solutions Writing Distributed Denial of Service IP Address Lenovo Gig Economy Legal Screen Reader Service Level Agreement Internet Service Provider Business Growth Virtual Reality Computing Infrastructure Teamwork Small Businesses Displays Server Management Regulations Compliance Private Cloud Identity Evernote Cortana Superfish Bookmark Recovery Identity Theft Smart Tech Memes Hard Drives Download Net Neutrality Alt Codes Twitter Alerts SQL Server Outsourcing Domains Financial Data Error History Downtime Hosted Solution Social Engineering Break Fix Workplace Browsers Smartwatch Connectivity IT Refrigeration Upload Procurement Typing Remote Computing Azure Hiring/Firing Paperless Public Speaking Social Network Telework Cyber security Multi-Factor Security Tech Dark Web Knowledge Co-managed IT Lithium-ion battery CES Google Drive Tablet IoT Communitications Trends Supply Chain Management Entrepreneur Alert Technology Care 5G Business Communications Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Unified Communications How To Microsoft Excel Experience Scams Data Analysis Google Docs Star Wars IT Assessment Undo Gamification Flexibility Bitcoin Notifications Staff Value Running Cable Hybrid Work Human Resources Organization Google Wallet Travel Social Networking Legislation Cables Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Windows 8 Wearable Technology Memory Laptop Google Apps Health IT Drones Unified Threat Management Motherboard Data Breach Comparison Google Play Assessment Electronic Health Records Permissions IT Maintenance Unified Threat Management Directions Videos Application Wasting Time Halloween Business Intelligence Network Congestion Specifications Security Cameras Shortcuts IBM Trend Micro Internet Exlporer Software as a Service Fraud Ransmoware User Error Microchip Username Hacks Managing Costs Scary Stories Vendors Black Friday SSID Fun Be Proactive Point of Sale eCommerce Database Surveillance Deep Learning Virtual Assistant Workforce Competition Network Management Tech Support IT Technicians Virtual Machine Threats Monitors Cyber Monday Medical IT Workplace Strategies Proxy Server Reviews Cookies Education Tactics Development Hotspot Transportation Meta Mobile Computing Websites Mirgation Hypervisor Amazon PowerPoint Search Shopping User Nanotechnology Optimization

Blog Archive