Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Communication Saving Money Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Training Covid-19 Gadgets Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Apple Networking Voice over Internet Protocol App Mobile Device Management HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing Hacker Avoiding Downtime How To Marketing BDR Operating System Router Physical Security Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Computers Storage Password Bring Your Own Device Managed IT Services Website Healthcare Vendor Management Windows 7 Cybercrime Microsoft 365 The Internet of Things Display Printer Solutions Social Paperless Office Infrastructure Monitoring Windows 11 Document Management Customer Service Telephone Excel Scam Data loss Remote Workers Cooperation Going Green Patch Management Save Money Free Resource Remote Monitoring Firewall Project Management Vulnerability End of Support Content Filtering Images 101 IT Management Multi-Factor Authentication VPN Mobility YouTube Meetings Safety Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Employees Virtual Desktop LiFi Data storage Integration Smart Technology Outlook Machine Learning Customer Relationship Management Holidays Money Saving Time Humor Data Storage Managed IT Service Hacking Supply Chain Maintenance Presentation Video Conferencing Managed Services Provider Antivirus Sports Downloads Virtual Machines Mouse Professional Services Licensing Wireless Technology Entertainment Administration iPhone Word Telephone System Robot Vulnerabilities Cost Management Data Privacy Settings Printing Wireless Permissions Entrepreneur IT Assessment Unified Threat Management Directions IT Maintenance Hosted Solution Assessment Value Business Intelligence Typing Flexibility Organization Shortcuts Network Congestion Specifications Internet Exlporer Knowledge Fraud Undo Digital Security Cameras Smart Devices Google Drive User Error Microchip Ransmoware Memory Vendors Username Remote Working 5G Black Friday Data Breach Google Play Be Proactive Point of Sale Unified Communications Database Experience Videos Electronic Health Records Google Docs Workforce Wasting Time Threats Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Application Trend Micro Google Wallet Proxy Server Security Cameras Workplace Strategies Cookies Tactics Hotspot Software as a Service Meta Managing Costs Amazon Windows 8 Laptop Websites Mirgation IBM eCommerce Drones SSID Nanotechnology Addiction Electronic Medical Records Language Surveillance SharePoint Virtual Assistant Outsource IT Virtual Machine Environment Management Media Halloween Chatbots Writing Distributed Denial of Service Reviews Lenovo Medical IT Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Competition Development Transportation Small Businesses Hypervisor Displays Hacks Server Management Scary Stories Private Cloud Identity Fun Shopping Optimization Superfish Bookmark PowerPoint Identity Theft Smart Tech Deep Learning Download Twitter Alerts Employer/Employee Relationships Outsourcing PCI DSS Navigation Error User Social Engineering Break Fix Gig Economy Browsers Workplace Education Connectivity Teamwork Hiring/Firing Upload Remote Computing Internet Service Provider Regulations Compliance Mobile Computing Social Network Evernote Paperless IP Address Multi-Factor Security Search Dark Web Memes Co-managed IT Tablet IoT SQL Server Technology Care Best Practice Trends Alert Net Neutrality Financial Data History Managed IT Customer Resource management Business Communications Buisness File Sharing Regulations Dark Data Google Calendar Recovery How To Microsoft Excel Hard Drives Smartwatch IT Legal Data Analysis Scams IT solutions Star Wars Azure Hybrid Work Business Growth Gamification Notifications Staff Domains Procurement Telework Cyber security Tech Human Resources Travel Social Networking Legislation Cortana Refrigeration CES Communitications Techology Fileless Malware Cables Google Maps Alt Codes Content Wearable Technology Public Speaking Supply Chain Management FinTech Health IT Term Google Apps Downtime Unified Threat Management Motherboard Lithium-ion battery Comparison

Blog Archive