Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Productivity Managed Service Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Managed Service Provider Remote Work Server Outsourced IT Employee/Employer Relationship IT Support Compliance Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Access Control Marketing Office 365 Conferencing WiFi How To BDR Computing Hacker HIPAA Information Technology Avoiding Downtime Applications Website Health 2FA Analytics Office Tips Help Desk Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers The Internet of Things Scam Telephone Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Customer Service Vendor Management Cybercrime Solutions Physical Security Display Printer Processor Virtual Desktop Mobile Security Data storage LiFi Holidays Word Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Humor Managed Services Provider Virtual Machines Professional Services Saving Time Safety Maintenance Sports Managed IT Service Antivirus Mouse Downloads iPhone Administration Licensing Vulnerabilities Entertainment Data Privacy Robot Images 101 Customer Relationship Management Mobility Telephone System Multi-Factor Authentication Settings Cost Management Wireless Printing Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Employees Cryptocurrency Wireless Technology Integration Computer Repair User Tip Modem Google Wallet Database Surveillance Virtual Assistant Outsource IT Monitors Recovery IT Technicians Virtual Machine Environment Media Cookies Laptop Websites Cyber Monday Medical IT Proxy Server Reviews Hard Drives Windows 8 Domains Drones Tactics Development Hotspot Transportation Small Businesses SharePoint Mirgation Hypervisor Displays Electronic Medical Records Nanotechnology Optimization Halloween PowerPoint Shopping Refrigeration Public Speaking Lenovo Addiction Language Employer/Employee Relationships Outsourcing Writing Navigation Lithium-ion battery Management PCI DSS Chatbots Virtual Reality Screen Reader Entrepreneur Scary Stories Private Cloud Distributed Denial of Service Workplace Gig Economy Hacks Server Management Superfish Service Level Agreement Internet Service Provider Identity Theft Computing Infrastructure Teamwork Hiring/Firing Fun Evernote Paperless Regulations Compliance Deep Learning Identity Twitter Smart Tech Memes Error Co-managed IT Bookmark Undo Download Net Neutrality Education Alerts SQL Server Technology Care Social Engineering Business Communications Financial Data History Remote Computing Connectivity IT Break Fix Scams Browsers Smartwatch Mobile Computing Upload Procurement Tablet Azure Hybrid Work Search Multi-Factor Security Tech Human Resources Social Network Telework Application Best Practice Cyber security Alert IoT Communitications Buisness File Sharing Dark Web Cables Dark Data CES Managed IT IBM Legal Trends Supply Chain Management IT solutions How To Google Calendar Term Google Apps Customer Resource management FinTech Business Growth Regulations Notifications Star Wars IT Assessment Travel Microsoft Excel IT Maintenance Data Analysis Techology Gamification Flexibility Google Maps Staff Value Business Intelligence Cortana Legislation Shortcuts Organization Alt Codes Social Networking Smart Devices Downtime Unified Threat Management Ransmoware Fileless Malware Digital Security Cameras Competition Unified Threat Management Content Remote Working Hosted Solution Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Typing Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Network Congestion Directions Videos Google Drive User Error User Wasting Time Threats Knowledge Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Point of Sale Fraud Meta 5G Microchip IP Address Google Docs Username Unified Communications Managing Costs Amazon Experience Running Cable Tech Support Black Friday SSID Bitcoin Network Management eCommerce

Blog Archive