Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Remote Work Managed Service Provider Outsourced IT Employee/Employer Relationship IT Support Compliance Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Apple Networking Voice over Internet Protocol App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Windows 7 Vendor Management Customer Service Cybercrime Microsoft 365 Physical Security Display Solutions Printer Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Telephone Excel The Internet of Things Scam Data loss Remote Workers Social Cooperation Going Green Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Content Filtering Images 101 Hacking IT Management Multi-Factor Authentication Presentation VPN Mobility YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Employees Virtual Desktop Integration LiFi Data storage Smart Technology Word Outlook Machine Learning Holidays Money Saving Time Humor Data Storage Managed IT Service Supply Chain Maintenance Video Conferencing Safety Managed Services Provider Antivirus Sports Downloads Virtual Machines Mouse Professional Services Licensing Entertainment Administration iPhone Telephone System Robot Cost Management Customer Relationship Management Vulnerabilities Data Privacy Settings Wireless Printing IT Maintenance Hosted Solution Assessment Permissions IT Assessment Unified Threat Management Directions Flexibility Value Business Intelligence Typing Network Congestion Specifications Organization Shortcuts Ransmoware User Internet Exlporer Knowledge Fraud Digital Security Cameras Smart Devices Google Drive User Error Microchip Remote Working Memory Vendors Username 5G Black Friday Data Breach Google Play Be Proactive Point of Sale Workforce Unified Communications Database Experience Videos Electronic Health Records IP Address Google Docs Wasting Time Threats Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Trend Micro Google Wallet Proxy Server Security Cameras Workplace Strategies Cookies Meta Recovery Tactics Hotspot Software as a Service Managing Costs Amazon Hard Drives Windows 8 Laptop Websites Mirgation eCommerce Domains Drones SSID Nanotechnology Virtual Assistant Outsource IT Addiction Electronic Medical Records Language Surveillance SharePoint Virtual Machine Environment Refrigeration Management Media Halloween Chatbots Writing Distributed Denial of Service Reviews Public Speaking Lenovo Medical IT Screen Reader Transportation Small Businesses Service Level Agreement Virtual Reality Computing Infrastructure Development Lithium-ion battery Hypervisor Displays Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Fun Shopping Optimization Superfish Bookmark PowerPoint Identity Theft Smart Tech Employer/Employee Relationships Outsourcing Deep Learning Download Twitter Alerts PCI DSS Undo Navigation Error Social Engineering Break Fix Gig Economy Browsers Workplace Education Connectivity Teamwork Hiring/Firing Upload Remote Computing Internet Service Provider Regulations Compliance Mobile Computing Social Network Evernote Paperless Multi-Factor Security Search Dark Web Memes Co-managed IT Tablet IoT SQL Server Technology Care Application Best Practice Trends Alert Net Neutrality Financial Data History Managed IT Customer Resource management Business Communications Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Smartwatch IT IBM Legal Data Analysis Scams IT solutions Star Wars Azure Hybrid Work Business Growth Gamification Notifications Staff Procurement Telework Cyber security Tech Human Resources Travel Social Networking Legislation Google Maps Cortana CES Communitications Techology Fileless Malware Cables Supply Chain Management Alt Codes Content Wearable Technology Comparison FinTech Competition Health IT Term Google Apps Downtime Unified Threat Management Motherboard

Blog Archive