Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Hosted Solutions Collaboration Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Facebook Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Virtualization Apps Mobile Office Two-factor Authentication Data Security Vendor Budget BYOD Employer-Employee Relationship Apple App Tip of the week Mobile Device Management Networking Gmail Managed Services WiFi Voice over Internet Protocol Chrome Applications Access Control Hacker Conferencing Avoiding Downtime Marketing Computing Information Technology How To BDR Office 365 HIPAA Storage Password 2FA Virtual Private Network Bring Your Own Device Help Desk Health Computers Website Operating System Retail Risk Management Managed IT Services Office Tips Analytics Router Augmented Reality Big Data Healthcare Vendor Management Social Windows 11 Physical Security Free Resource Project Management Display Windows 7 Printer Monitoring Excel Customer Service Paperless Office Microsoft 365 Infrastructure Solutions Going Green Document Management Telephone Cybercrime Cooperation Scam Data loss Firewall Patch Management The Internet of Things Save Money Remote Workers Remote Monitoring Vulnerability End of Support iPhone IT Management User Tip Modem VPN Processor Meetings Mobile Security Sports Vulnerabilities Mouse Supply Chain Customer Relationship Management Computer Repair Images 101 Administration Smart Technology Multi-Factor Authentication Mobility Hacking Presentation Saving Time Wireless Technology Machine Learning Managed IT Service Settings Employees Integration Printing Downloads Wireless Content Filtering Licensing Maintenance YouTube Data Privacy Antivirus Entertainment Word Holidays Cryptocurrency Data Storage Telephone System Virtual Desktop Video Conferencing Managed Services Provider Data storage Cost Management LiFi Safety Virtual Machines Professional Services Outlook Robot Money Humor Hacks Scary Stories Smartwatch Outsource IT Unified Threat Management IT Application Username Azure Black Friday Environment Fun Procurement Media Telework IBM Cyber security Database Tech Deep Learning Network Congestion IT Technicians CES Small Businesses User Error Communitications Supply Chain Management Proxy Server Cookies Education Cyber Monday Displays FinTech Point of Sale Tactics Term Hotspot Mobile Computing Mirgation Outsourcing IT Assessment Flexibility Network Management Competition Value Tech Support Nanotechnology Search Organization Workplace Addiction Best Practice Monitors Language Management Chatbots Buisness Digital Security Cameras Hiring/Firing Smart Devices Remote Working Paperless Memory Legal Websites Screen Reader IT solutions Distributed Denial of Service Computing Infrastructure Co-managed IT Data Breach User Service Level Agreement Google Play Business Growth Electronic Medical Records Identity Videos Technology Care SharePoint Electronic Health Records Business Communications Bookmark Wasting Time Smart Tech Cortana Alerts Scams Lenovo IP Address Trend Micro Download Security Cameras Alt Codes Writing Virtual Reality Downtime Hybrid Work Software as a Service Human Resources Server Management Browsers Managing Costs Private Cloud Connectivity Hosted Solution Break Fix Cables Superfish eCommerce Identity Theft Recovery Upload SSID Typing Hard Drives Social Network Virtual Assistant Twitter Multi-Factor Security Surveillance Google Apps Domains Virtual Machine Google Drive Error IoT Dark Web Knowledge Social Engineering Reviews IT Maintenance Trends Medical IT Refrigeration Customer Resource management Transportation Remote Computing Regulations Google Calendar Business Intelligence 5G Development Shortcuts Public Speaking Data Analysis Hypervisor Google Docs Star Wars Unified Communications Microsoft Excel Experience Staff Running Cable Shopping Ransmoware Lithium-ion battery Optimization Tablet Gamification PowerPoint Bitcoin Employer/Employee Relationships Google Wallet Alert Entrepreneur Social Networking Legislation Vendors PCI DSS Be Proactive Managed IT Fileless Malware File Sharing Navigation Dark Data Windows 8 How To Wearable Technology Laptop Gig Economy Workforce Content Undo Health IT Teamwork Drones Notifications Motherboard Comparison Threats Internet Service Provider Regulations Compliance Workplace Strategies Directions Travel Assessment Evernote Permissions Halloween Meta Techology Memes Google Maps SQL Server Specifications Amazon Net Neutrality Financial Data Microchip History Unified Threat Management Internet Exlporer Fraud

Blog Archive