Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Covid-19 Training Gadgets Cloud Computing Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Budget Gmail Apple WiFi Tip of the week App Managed Services Employer-Employee Relationship Voice over Internet Protocol Networking Chrome BYOD HIPAA Applications Access Control Conferencing Computing Information Technology How To Hacker BDR Avoiding Downtime Office 365 Marketing Physical Security Storage Router Virtual Private Network Password Bring Your Own Device Health 2FA Help Desk Big Data Retail Operating System Healthcare Risk Management Managed IT Services Computers Analytics Office Tips Website Augmented Reality Solutions Firewall Display Printer Paperless Office Infrastructure Windows 11 The Internet of Things Monitoring Social Going Green Document Management Excel Cybercrime Remote Workers Scam Telephone Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management VPN Meetings Employees Integration Sports Computer Repair Mouse User Tip Modem Mobile Security Processor Safety Administration Holidays Data Storage Supply Chain Smart Technology Machine Learning Video Conferencing Managed Services Provider Professional Services Settings Saving Time Virtual Machines Wireless Printing Content Filtering Maintenance Managed IT Service Antivirus Customer Relationship Management YouTube Downloads iPhone Cryptocurrency Hacking Licensing Presentation Vulnerabilities Entertainment Data Privacy Virtual Desktop LiFi Wireless Technology Data storage Images 101 Robot Telephone System Multi-Factor Authentication Outlook Mobility Cost Management Money IT Management Word Humor Assessment Electronic Health Records Workforce Permissions Hacks Scary Stories Directions Videos Network Congestion Fun Refrigeration Threats Wasting Time User Error Workplace Strategies Specifications Security Cameras Deep Learning Public Speaking Trend Micro Internet Exlporer Software as a Service Meta Fraud Point of Sale Microchip Lithium-ion battery Education Username Amazon Managing Costs Entrepreneur Black Friday SSID Network Management Tech Support eCommerce Database Surveillance Outsource IT Virtual Assistant Mobile Computing Monitors Search Undo Environment IT Technicians Virtual Machine Media Cyber Monday Medical IT Best Practice Websites Proxy Server Reviews Cookies Tactics Development Small Businesses Hotspot Transportation Buisness IT solutions Electronic Medical Records Displays Mirgation Hypervisor SharePoint Legal PowerPoint Business Growth Shopping Nanotechnology Optimization Addiction Application Outsourcing Language Employer/Employee Relationships Lenovo Writing Virtual Reality Cortana Management PCI DSS Chatbots Navigation Workplace Distributed Denial of Service Server Management Alt Codes Private Cloud Gig Economy IBM Screen Reader Service Level Agreement Internet Service Provider Hiring/Firing Computing Infrastructure Teamwork Superfish Identity Theft Downtime Hosted Solution Twitter Regulations Compliance Identity Evernote Paperless Co-managed IT Typing Error Bookmark Smart Tech Memes Download Net Neutrality Technology Care Alerts SQL Server Social Engineering Remote Computing Knowledge Financial Data Competition History Google Drive Business Communications Scams Break Fix Browsers Smartwatch Connectivity IT 5G Upload Procurement Hybrid Work Azure Tablet Unified Communications Alert Experience Social Network Telework Cyber security Google Docs Multi-Factor Security Tech Human Resources Cables Dark Web Managed IT Bitcoin File Sharing Running Cable CES Dark Data IoT Communitications User How To Trends Supply Chain Management Google Wallet Notifications Customer Resource management FinTech Regulations Google Calendar Term Google Apps IT Maintenance Microsoft Excel Windows 8 Travel Laptop Data Analysis IP Address Star Wars IT Assessment Gamification Flexibility Business Intelligence Staff Value Techology Drones Google Maps Organization Social Networking Legislation Shortcuts Smart Devices Recovery Ransmoware Unified Threat Management Halloween Fileless Malware Digital Security Cameras Content Remote Working Hard Drives Vendors Wearable Technology Memory Unified Threat Management Be Proactive Comparison Google Play Health IT Domains Motherboard Data Breach

Blog Archive