Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP AI Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Artificial Intelligence Automation Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Blockchain Data Security Vendor Mobile Office Two-factor Authentication Apps Chrome Budget Managed Services BYOD Voice over Internet Protocol Apple Mobile Device Management App Gmail Tip of the week Networking Employer-Employee Relationship BDR HIPAA Applications Hacker Avoiding Downtime Marketing Access Control Conferencing Computing WiFi Information Technology How To Office 365 Analytics Office Tips Router Augmented Reality Computers Storage Password Bring Your Own Device Healthcare Website Virtual Private Network Help Desk 2FA Health Operating System Retail Big Data Risk Management Managed IT Services Patch Management Customer Service Save Money Remote Monitoring Vulnerability End of Support Vendor Management Remote Workers Physical Security Windows 11 Monitoring Display Printer Paperless Office Free Resource Excel Infrastructure Project Management Windows 7 Firewall Going Green Microsoft 365 Telephone Document Management Cybercrime The Internet of Things Solutions Cooperation Scam Social Data loss Data Storage Outlook Video Conferencing Robot Money Managed Services Provider Hacking Humor Presentation Professional Services Virtual Machines Modem User Tip Processor Mobile Security Wireless Technology Sports IT Management VPN Meetings Mouse iPhone Smart Technology Administration Computer Repair Vulnerabilities Word Supply Chain Saving Time Images 101 Managed IT Service Settings Multi-Factor Authentication Mobility Wireless Machine Learning Downloads Printing Content Filtering Safety Licensing YouTube Entertainment Cryptocurrency Employees Maintenance Integration Antivirus Data Privacy Telephone System Virtual Desktop LiFi Cost Management Data storage Holidays Customer Relationship Management Vendors Directions Assessment Hypervisor Permissions How To Notifications PowerPoint Shopping Be Proactive Halloween Optimization Competition Travel Employer/Employee Relationships Specifications Workforce Threats Microchip Techology PCI DSS Internet Exlporer Google Maps Fraud Navigation Hacks Gig Economy Workplace Strategies Username Scary Stories Internet Service Provider Fun Unified Threat Management Teamwork Black Friday User Meta Amazon Deep Learning Unified Threat Management Regulations Compliance Database Evernote Memes IT Technicians Net Neutrality Cookies IP Address SQL Server Cyber Monday Network Congestion Outsource IT Proxy Server Education Environment User Error Financial Data Media Tactics History Hotspot Mobile Computing Smartwatch IT Mirgation Procurement Nanotechnology Search Point of Sale Azure Recovery Small Businesses Displays Best Practice Telework Addiction Cyber security Language Hard Drives Tech Domains Tech Support CES Management Buisness Network Management Communitications Chatbots IT solutions Supply Chain Management Screen Reader Distributed Denial of Service Monitors Legal Outsourcing Business Growth FinTech Service Level Agreement Computing Infrastructure Refrigeration Term Identity Public Speaking Websites Workplace IT Assessment Hiring/Firing Bookmark Flexibility Smart Tech Cortana Lithium-ion battery Value Entrepreneur Alt Codes SharePoint Organization Paperless Download Alerts Electronic Medical Records Digital Security Cameras Co-managed IT Downtime Smart Devices Technology Care Browsers Hosted Solution Lenovo Remote Working Connectivity Memory Break Fix Writing Typing Business Communications Upload Data Breach Undo Virtual Reality Google Play Private Cloud Multi-Factor Security Videos Scams Social Network Server Management Electronic Health Records Hybrid Work Superfish IoT Knowledge Identity Theft Wasting Time Dark Web Google Drive Human Resources Trends Trend Micro Twitter Security Cameras Software as a Service Regulations 5G Error Google Calendar Cables Customer Resource management Data Analysis Unified Communications Star Wars Experience Managing Costs Microsoft Excel Application Social Engineering Google Docs SSID Bitcoin Google Apps Gamification Running Cable eCommerce Staff Remote Computing Surveillance Social Networking IBM Virtual Assistant Legislation Google Wallet IT Maintenance Business Intelligence Fileless Malware Tablet Virtual Machine Alert Medical IT Windows 8 Reviews Shortcuts Content Laptop Wearable Technology Managed IT Development Motherboard File Sharing Transportation Comparison Dark Data Drones Ransmoware Health IT

Blog Archive