Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Data Backup Smartphone Android Upgrade Data Recovery Disaster Recovery AI Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Mobile Office Two-factor Authentication Data Security Apps Vendor Mobile Device Management Tip of the week Gmail Chrome Managed Services Voice over Internet Protocol Budget WiFi Networking Apple Employer-Employee Relationship App BYOD Information Technology Access Control Marketing Office 365 Conferencing How To BDR HIPAA Hacker Applications Computing Avoiding Downtime Website Risk Management Health Help Desk 2FA Office Tips Analytics Retail Augmented Reality Healthcare Storage Big Data Password Managed IT Services Bring Your Own Device Computers Router Operating System Virtual Private Network Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Excel Remote Workers Telephone The Internet of Things Scam Data loss Cooperation Social Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Customer Service Going Green Vendor Management Solutions Physical Security Cybercrime Display Printer Cryptocurrency Holidays Word Smart Technology Virtual Desktop Data Storage Machine Learning Supply Chain Data storage LiFi Saving Time Video Conferencing Managed Services Provider Virtual Machines Professional Services Outlook Managed IT Service Safety Money Maintenance Antivirus Downloads Humor Licensing iPhone Entertainment Sports Mouse Vulnerabilities Data Privacy Administration Images 101 Telephone System Robot Customer Relationship Management Cost Management Multi-Factor Authentication Mobility Hacking IT Management Presentation VPN Settings Meetings Printing Wireless Content Filtering Employees Wireless Technology User Tip Modem Integration Processor YouTube Computer Repair Mobile Security Proxy Server Surveillance Cookies Virtual Assistant Outsource IT Monitors Cyber Monday Media Recovery Tactics 5G Virtual Machine Environment Hotspot Experience Websites Mirgation Medical IT Google Docs Hard Drives Unified Communications Reviews Domains Bitcoin Running Cable Development Nanotechnology Transportation Small Businesses Electronic Medical Records Language Google Wallet SharePoint Addiction Hypervisor Displays Management Optimization Chatbots PowerPoint Refrigeration Shopping Public Speaking Windows 8 Lenovo Laptop Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Navigation Lithium-ion battery Drones PCI DSS Service Level Agreement Server Management Entrepreneur Private Cloud Identity Workplace Gig Economy Superfish Bookmark Halloween Internet Service Provider Identity Theft Smart Tech Teamwork Hiring/Firing Twitter Alerts Evernote Paperless Regulations Compliance Download Memes Error Co-managed IT Undo Hacks Browsers Scary Stories Net Neutrality Connectivity SQL Server Technology Care Social Engineering Break Fix History Remote Computing Business Communications Financial Data Upload Fun Deep Learning Smartwatch Social Network IT Scams Multi-Factor Security Procurement Tablet IoT Azure Hybrid Work Dark Web Cyber security Alert Tech Human Resources Application Education Telework Trends CES Managed IT Customer Resource management Communitications File Sharing Regulations Cables Dark Data Google Calendar IBM Mobile Computing Data Analysis Supply Chain Management Star Wars How To Microsoft Excel Search Notifications Staff Term Google Apps FinTech Gamification Best Practice IT Assessment Travel Social Networking IT Maintenance Legislation Techology Fileless Malware Buisness Flexibility Google Maps Value Business Intelligence Wearable Technology Shortcuts Legal IT solutions Organization Content Competition Business Growth Digital Security Cameras Health IT Smart Devices Unified Threat Management Motherboard Ransmoware Comparison Unified Threat Management Directions Remote Working Assessment Memory Vendors Permissions Cortana Data Breach Google Play Be Proactive Alt Codes Videos Electronic Health Records Workforce Network Congestion Specifications User Error Microchip User Downtime Internet Exlporer Wasting Time Threats Fraud Trend Micro Security Cameras Workplace Strategies Hosted Solution Username Typing Software as a Service Point of Sale Meta Black Friday IP Address Database Managing Costs Amazon Knowledge eCommerce Tech Support IT Technicians SSID Google Drive Network Management

Blog Archive