Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Microsoft Managed Service Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi Networking Apple App Employer-Employee Relationship BYOD Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing How To BDR HIPAA Computing Hacker Virtual Private Network Risk Management Website Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Computers Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone Scam The Internet of Things Data loss Cooperation Free Resource Social Project Management Windows 7 Patch Management Going Green Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Cryptocurrency User Tip Wireless Technology Modem Computer Repair Mobile Security Processor Holidays Virtual Desktop LiFi Data storage Data Storage Word Smart Technology Supply Chain Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Saving Time Money Virtual Machines Humor Managed IT Service Maintenance Safety Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering IT Management Hacking VPN Employees Presentation Meetings YouTube Integration Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID 5G Unified Communications Virtual Assistant Outsource IT Experience IP Address Google Docs Database Surveillance Network Management Bitcoin Tech Support IT Technicians Virtual Machine Environment Running Cable Media Proxy Server Reviews Google Wallet Cookies Monitors Cyber Monday Medical IT Recovery Hotspot Transportation Small Businesses Tactics Development Hard Drives Windows 8 Websites Mirgation Hypervisor Displays Laptop Shopping Domains Drones Nanotechnology Optimization PowerPoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Refrigeration Chatbots Halloween Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Public Speaking Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Server Management Regulations Compliance Hacks Private Cloud Identity Entrepreneur Scary Stories Evernote Paperless Co-managed IT Fun Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Deep Learning Twitter Alerts SQL Server Technology Care Financial Data Undo Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Education Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Mobile Computing Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Search CES Tablet IoT Communitications Trends Supply Chain Management Application Best Practice Alert Managed IT Customer Resource management FinTech File Sharing Regulations Buisness Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis IBM Legal Star Wars IT Assessment IT solutions Gamification Flexibility Business Growth Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Ransmoware Cortana Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Alt Codes Wearable Technology Memory Vendors Health IT Competition Unified Threat Management Motherboard Data Breach Downtime Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Knowledge User Error Microchip Google Drive Internet Exlporer Software as a Service User

Blog Archive