Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Hackers Cloud Software Privacy Computer Email Hosted Solutions Productivity Data Innovation Internet Network Security Hardware User Tips Malware Business IT Support Tech Term Efficiency Google IT Services Data Backup Mobile Devices Microsoft Workplace Tips communications Android Business Management Collaboration Smartphones Cybersecurity Smartphone Communication Small Business Social Media Server Upgrade Backup Browser Data Recovery Outsourced IT Artificial Intelligence Internet of Things Data Management Ransomware Phishing Productivity VoIP Cloud Computing Microsoft Office Managed Service Provider Windows 10 Windows 10 Facebook Automation Network Managed IT Services Two-factor Authentication Mobile Device App Passwords Government Information Gmail Managed Service Miscellaneous Bandwidth Apps Spam Disaster Recovery Apple Encryption Access Control Computing Business Technology Saving Money Holiday Windows Office 365 Employer-Employee Relationship Users Quick Tips Managed IT Services Applications Office Tips Big Data Augmented Reality Gadgets Healthcare Business Continuity Storage Conferencing BDR Customer Service Vulnerability Computers Hacker Cooperation Retail Going Green Printer Website Mobile Office Blockchain Cybercrime Infrastructure Mobile Device Management Wi-Fi BYOD Paperless Office Firewall Vendor Tip of the week Windows 7 The Internet of Things WiFi Scam Analytics IT Support Data loss Social Networking Display Humor Saving Time Data Security Integration Sports Managed IT Service Customer Relationship Management Mouse Patch Management Bring Your Own Device Telephone Remote Monitoring Hacking Administration Licensing Presentation Current Events IT Management Office VPN Wireless Technology Avoiding Downtime Managed Services Provider Professional Services Settings Printing Cost Management Content Filtering Meetings Managed Services Operating System Voice over Internet Protocol HIPAA iPhone Router Information Technology Risk Management Robot Modem Downloads Save Money Safety Processor Virtual Desktop Mobile Security Document Management End of Support Data storage LiFi Maintenance Vendor Management Antivirus Virtualization Monitoring Help Desk Money Chrome Chatbots Data Breach Management Google Play Solutions Hacks Screen Reader Legislation Scary Stories Distributed Denial of Service How To Electronic Medical Records IBM Electronic Health Records Private Cloud Wasting Time Budget Service Level Agreement Computing Infrastructure Managed IT Fun Identity Tablet Monitors Trend Micro Security Cameras Deep Learning Bookmark Password Smart Tech Comparison Virtual Reality Software as a Service Error Tech Managing Costs Download Education Alerts Techology Competition eCommerce SSID Browsers Virtual Assistant Mobile Computing Connectivity Specifications Break Fix Twitter Surveillance Search Term Virtual Machine Upload Best Practice Compliance Unified Threat Management Google Maps Writing Holidays Social Network Medical IT Entertainment User Transportation IoT Buisness Dark Web Remote Computing Development Travel Mobility Hypervisor Legal Trends IT solutions Business Growth Regulations User Error Optimization Customer Resource management PowerPoint Video Conferencing Data Analysis Employer/Employee Relationships Star Wars Microsoft Excel Alert IP Address Cortana Unified Threat Management Gamification Staff Virtual Private Network Alt Codes Social Networking Social Engineering Virtual Machines Telephone System Fileless Malware Recovery Teamwork Marketing Downtime Network Management Wireless Hard Drives Content Hosted Solution Wearable Technology Word Typing Motherboard Domains Memes Health IT Directions SQL Server Assessment YouTube Permissions Knowledge Dark Data Refrigeration History Google Drive Cryptocurrency SharePoint How To Public Speaking IT Lithium-ion battery Microchip Azure Internet Exlporer Fraud 5G Lenovo Experience Cyber security Google Docs Username Entrepreneur Unified Communications User Tip Vulnerabilities Bitcoin Running Cable Black Friday Communitications Tech Support Free Resource Google Wallet Database Server Management IT Technicians Superfish Undo Project Management Proxy Server Windows 8 Cookies Multi-Factor Security Laptop Cyber Monday IT Assessment Websites Navigation Value Drones Tactics Hotspot Mirgation Identity Theft Network Congestion Multi-Factor Authentication Outlook Microsoft 365 Nanotechnology Google Calendar Halloween Smart Technology Computer Repair Smart Devices Machine Learning Evernote Application Memory Addiction Language