Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Users Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Small Business Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management Smartphones VoIP communications Upgrade Managed Service Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Windows Social Media Microsoft Office Network Tech Term Current Events Remote Internet of Things Automation Facebook Artificial Intelligence Productivity Gadgets AI Covid-19 Cloud Computing Server Managed Service Provider Miscellaneous Remote Work Holiday Information Outsourced IT Encryption Employee/Employer Relationship Training Spam Office Windows 10 Compliance Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps Vendor Mobile Device Management Managed Services Voice over Internet Protocol Gmail Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Avoiding Downtime Marketing Access Control Applications Computing Tip of the week Information Technology Office 365 WiFi IT Support Conferencing How To BDR Hacker Virtual Private Network HIPAA Website Router Operating System Health Risk Management Retail Help Desk Healthcare Analytics Office Tips Augmented Reality Managed IT Services Big Data Storage Password Bring Your Own Device Computers Going Green Display Printer Paperless Office Infrastructure Cybercrime Document Management Firewall Remote Workers Monitoring Scam The Internet of Things Data loss Free Resource Project Management Windows 7 Social Telephone Windows 11 Microsoft 365 2FA Patch Management Save Money Solutions Remote Monitoring Cooperation End of Support Excel Vulnerability Vendor Management Customer Service Physical Security Wireless Technology Computer Repair Settings Holidays Wireless Printing Data Storage Content Filtering Video Conferencing Data Privacy YouTube Managed Services Provider User Tip Modem Word Professional Services Mobile Security Cryptocurrency Virtual Machines Processor Machine Learning Virtual Desktop Smart Technology LiFi Data storage iPhone Maintenance Safety Antivirus Saving Time Outlook Vulnerabilities Money Managed IT Service Humor Images 101 Downloads Multi-Factor Authentication Mobility Licensing Sports Mouse Robot Supply Chain Entertainment Customer Relationship Management Administration Employees Integration IT Management Hacking Telephone System VPN Presentation Meetings Cost Management Virtual Assistant Content Wearable Technology Technology Care Surveillance Business Communications Cortana Virtual Machine Health IT Motherboard Point of Sale Comparison Permissions Alt Codes Scams Reviews Directions IP Address Medical IT Assessment Transportation Network Management Tech Support Hybrid Work Downtime Development Monitors Hosted Solution Human Resources Hypervisor Specifications Internet Exlporer Recovery Fraud Typing Cables Shopping Optimization Microchip PowerPoint Employer/Employee Relationships Username Hard Drives Websites Black Friday Google Apps PCI DSS Knowledge Domains Navigation Google Drive Database Electronic Medical Records IT Maintenance Gig Economy SharePoint Internet Service Provider 5G Teamwork Refrigeration IT Technicians Business Intelligence Cyber Monday Writing Unified Communications Shortcuts Regulations Compliance Experience Proxy Server Lenovo Public Speaking Evernote Cookies Google Docs Tactics Hotspot Virtual Reality Bitcoin Ransmoware Running Cable Memes Lithium-ion battery Net Neutrality SQL Server Server Management Mirgation Private Cloud Entrepreneur Google Wallet Vendors Be Proactive Financial Data History Superfish Nanotechnology Identity Theft Addiction Language Twitter Windows 8 Workforce Smartwatch Laptop IT Procurement Azure Management Undo Chatbots Error Drones Threats Distributed Denial of Service Social Engineering Workplace Strategies Telework Cyber security Tech Screen Reader Service Level Agreement Computing Infrastructure Remote Computing Meta CES Halloween Communitications Supply Chain Management Identity Amazon FinTech Bookmark Term Smart Tech Tablet Download Application Alerts Alert Hacks Outsource IT Scary Stories IT Assessment Media Flexibility Fun Value Managed IT File Sharing Environment Dark Data Break Fix How To Deep Learning Organization Browsers IBM Connectivity Upload Notifications Small Businesses Digital Security Cameras Smart Devices Education Remote Working Memory Social Network Travel Displays Multi-Factor Security Google Maps Dark Web Data Breach Techology Google Play IoT Trends Mobile Computing Outsourcing Videos Electronic Health Records Search Wasting Time Customer Resource management Competition Regulations Unified Threat Management Google Calendar Microsoft Excel Best Practice Workplace Trend Micro Data Analysis Unified Threat Management Security Cameras Star Wars Gamification Staff Hiring/Firing Buisness Software as a Service Network Congestion IT solutions Paperless Managing Costs Social Networking Legal Legislation User Business Growth Co-managed IT eCommerce Fileless Malware User Error SSID

Blog Archive