Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Google Maintains Its Monopoly on Search Engines

How Google Maintains Its Monopoly on Search Engines

It’s no secret that Google has a monopoly on the search engine market, but have you ever wondered how it maintains this stranglehold when other equally capable competitors, like Apple, could produce similar products? Well, it’s not as simple as you might think, and it even involves a considerable amount of funds that influence Apple’s decision.

Continue reading
0 Comments

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Bring Your Own Device Managed IT Services Big Data 2FA Operating System Computers Router Healthcare Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password The Internet of Things Scam Data loss Windows 11 Social Cooperation Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Remote Workers Cybercrime Physical Security Display Printer Free Resource Paperless Office Infrastructure Project Management Windows 7 Monitoring Microsoft 365 Firewall Document Management Solutions Telephone Mouse Licensing Administration Entertainment Holidays Data Storage Supply Chain Video Conferencing Robot Telephone System Cost Management Managed Services Provider Customer Relationship Management Professional Services Settings Virtual Machines Wireless Printing Content Filtering Hacking IT Management Presentation VPN YouTube Meetings iPhone Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Vulnerabilities Data Privacy Virtual Desktop LiFi Data storage Images 101 Smart Technology Word Multi-Factor Authentication Mobility Outlook Machine Learning Money Saving Time Humor Managed IT Service Safety Maintenance Employees Downloads Integration Antivirus Sports Education Connectivity Social Engineering Break Fix Managing Costs Amazon Browsers Upload Remote Computing eCommerce SSID Surveillance Multi-Factor Security Virtual Assistant Outsource IT Mobile Computing Social Network Tablet IoT Search Dark Web Virtual Machine Environment Media Medical IT Application Best Practice Trends Reviews Alert Development Dark Data Google Calendar Transportation Small Businesses Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Hypervisor Displays IBM Legal Data Analysis PowerPoint Business Growth Gamification Shopping Notifications Staff Optimization Legislation Employer/Employee Relationships Outsourcing Travel Social Networking Google Maps PCI DSS Cortana Navigation Techology Fileless Malware Workplace Alt Codes Content Gig Economy Wearable Technology Internet Service Provider Comparison Teamwork Hiring/Firing Competition Health IT Downtime Unified Threat Management Motherboard Hosted Solution Assessment Regulations Compliance Permissions Evernote Paperless Unified Threat Management Directions Co-managed IT Typing Memes Net Neutrality Network Congestion Specifications SQL Server Technology Care User Internet Exlporer Financial Data Knowledge Fraud History Business Communications Google Drive User Error Microchip Scams Username Smartwatch IT Procurement 5G Black Friday Azure Hybrid Work Point of Sale Unified Communications Database Telework Experience Cyber security Tech Human Resources IP Address Google Docs Cables Bitcoin Network Management CES Running Cable Tech Support IT Technicians Communitications Supply Chain Management Monitors Cyber Monday Google Wallet Proxy Server Cookies Recovery Tactics FinTech Hotspot Term Google Apps IT Maintenance Hard Drives Windows 8 Laptop Websites Mirgation IT Assessment Flexibility Value Business Intelligence Domains Drones Nanotechnology Addiction Organization Electronic Medical Records Language Shortcuts SharePoint Ransmoware Refrigeration Management Digital Security Cameras Halloween Chatbots Smart Devices Remote Working Writing Distributed Denial of Service Memory Vendors Public Speaking Lenovo Screen Reader Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure Data Breach Google Play Be Proactive Workforce Hacks Server Management Videos Entrepreneur Scary Stories Private Cloud Identity Electronic Health Records Identity Theft Smart Tech Fun Wasting Time Threats Superfish Bookmark Deep Learning Download Twitter Alerts Trend Micro Security Cameras Workplace Strategies Meta Undo Error Software as a Service

Blog Archive