Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services WiFi Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Analytics Office Tips Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Windows 11 Firewall Document Management Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Microsoft 365 Cybercrime Solutions Display Printer Paperless Office Infrastructure Monitoring Holidays Outlook Machine Learning Data Storage Money Saving Time Humor Supply Chain Video Conferencing Managed IT Service Managed Services Provider Maintenance Virtual Machines Safety Professional Services Antivirus Sports Downloads Mouse Licensing Entertainment Administration iPhone Vulnerabilities Data Privacy Telephone System Robot Customer Relationship Management Cost Management Settings Images 101 Printing Wireless Content Filtering Multi-Factor Authentication Mobility Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Employees Processor Integration Virtual Desktop LiFi Data storage Smart Technology Word Addiction Electronic Medical Records Language Reviews SharePoint Medical IT Transportation Small Businesses Refrigeration Management Halloween Chatbots Development Writing Distributed Denial of Service Hypervisor Displays Public Speaking Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Shopping Optimization Lithium-ion battery PowerPoint Employer/Employee Relationships Outsourcing Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Fun PCI DSS Superfish Bookmark Navigation Identity Theft Smart Tech Deep Learning Download Twitter Alerts Gig Economy Workplace Teamwork Hiring/Firing Undo Error Internet Service Provider Social Engineering Break Fix Regulations Compliance Browsers Evernote Paperless Education Connectivity Upload Remote Computing Memes Co-managed IT SQL Server Technology Care Mobile Computing Social Network Multi-Factor Security Net Neutrality Search Dark Web Financial Data History Business Communications Tablet IoT Application Best Practice Trends Alert Smartwatch IT Scams Procurement Azure Hybrid Work Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Telework Cyber security IBM Legal Data Analysis Tech Human Resources IT solutions Star Wars Cables Business Growth Gamification Notifications Staff CES Communitications Supply Chain Management Travel Social Networking Legislation Cortana FinTech Techology Fileless Malware Term Google Apps Google Maps IT Maintenance Alt Codes Content Wearable Technology IT Assessment Flexibility Value Business Intelligence Competition Health IT Downtime Unified Threat Management Motherboard Comparison Permissions Organization Unified Threat Management Directions Shortcuts Hosted Solution Assessment Ransmoware Typing Digital Security Cameras Smart Devices Remote Working Memory Vendors Network Congestion Specifications Internet Exlporer Knowledge Fraud Data Breach Google Drive User Error Microchip Google Play Be Proactive User Workforce Username Videos Electronic Health Records 5G Black Friday Wasting Time Threats Point of Sale Unified Communications Database Experience Trend Micro IP Address Google Docs Security Cameras Workplace Strategies Meta Bitcoin Network Management Running Cable Tech Support IT Technicians Software as a Service Monitors Cyber Monday Managing Costs Amazon Google Wallet Proxy Server Cookies Recovery Tactics Hotspot eCommerce SSID Virtual Assistant Outsource IT Hard Drives Windows 8 Laptop Websites Mirgation Surveillance Virtual Machine Environment Domains Drones Media Nanotechnology

Blog Archive