Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

Continue reading
0 Comments

How Google is Trying to Make Passwords Easier and Better

How Google is Trying to Make Passwords Easier and Better

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

Continue reading
0 Comments

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

Continue reading
0 Comments

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

Continue reading
0 Comments

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Tip of the Week: 4 Security Best Practices that Every Employee Needs to Adopt

Security is a hot-button issue for all types of businesses, but cyber security is such a complex subject that it’s difficult to jam-pack its many intricacies into one blog article. Sometimes understanding just a few ways to improve your business’s security practices can be a significant benefit for your organization.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Hackers Cloud Software Privacy Computer Email Hosted Solutions Productivity Data Innovation Internet Network Security Hardware User Tips Malware IT Support Business Tech Term Efficiency Data Backup Google IT Services Mobile Devices Microsoft communications Android Business Management Workplace Tips Collaboration Smartphones Smartphone Communication Small Business Cybersecurity Social Media Server Data Recovery Upgrade Backup Browser Internet of Things Outsourced IT Data Management Artificial Intelligence Windows 10 Phishing Productivity VoIP Microsoft Office Managed Service Provider Windows 10 Facebook Cloud Computing Ransomware Managed IT Services Network Automation Two-factor Authentication Information Government Managed Service App Passwords Mobile Device Gmail Miscellaneous Bandwidth Apps Spam Access Control Disaster Recovery Business Technology Apple Holiday Encryption Computing Saving Money Windows Office 365 Employer-Employee Relationship Managed IT Services Users Applications Office Tips Big Data Quick Tips Augmented Reality Business Continuity Vendor Storage Infrastructure BYOD Paperless Office Customer Service Tip of the week Computers Hacker Going Green Website Scam Data loss Mobile Office Healthcare Conferencing Cybercrime Mobile Device Management Wi-Fi Firewall BDR Cooperation Windows 7 Vulnerability The Internet of Things WiFi Analytics Blockchain IT Support Retail Social Printer Gadgets HIPAA Integration Router Meetings Customer Relationship Management Sports Mouse Modem Bring Your Own Device Mobile Security Processor Administration Hacking Robot Presentation Current Events Save Money Downloads Monitoring Office End of Support Wireless Technology Managed Services Provider Help Desk Document Management Maintenance Vendor Management Avoiding Downtime Professional Services Antivirus Managed Services Settings Saving Time Printing Voice over Internet Protocol Content Filtering Operating System Display Networking Managed IT Service iPhone Telephone Data Security Licensing Information Technology Risk Management Patch Management Remote Monitoring Safety Virtual Desktop Data storage LiFi IT Management Virtualization VPN Cost Management Money Chrome Humor Network Management Budget Software as a Service Fun Managing Costs Deep Learning Fraud Password eCommerce Microchip SSID Internet Exlporer Username Surveillance Education Virtual Assistant Dark Data Competition Virtual Machine User Tip Black Friday Mobile Computing How To Holidays Medical IT Database SharePoint IT Technicians Development Transportation Search Best Practice Hypervisor Proxy Server Cookies Lenovo Cyber Monday Hotspot Optimization Buisness Navigation User PowerPoint Tactics Mirgation Server Management Legal Tech Support Video Conferencing IT solutions Employer/Employee Relationships Business Growth Nanotechnology Superfish Smart Technology Language IP Address Virtual Machines Evernote Addiction Multi-Factor Security Teamwork Cortana Management Chatbots Websites Alt Codes Network Congestion Screen Reader Distributed Denial of Service Identity Theft Computing Infrastructure Computer Repair Memes Downtime Recovery Wireless Service Level Agreement Google Calendar Marketing Hard Drives SQL Server Identity Machine Learning Hosted Solution Typing Domains History Bookmark Word Smart Tech Alerts How To Electronic Medical Records IT YouTube Tech Download Legislation Refrigeration Azure Knowledge Managed IT Google Drive Private Cloud Cryptocurrency Monitors Public Speaking Cyber security Browsers Connectivity Break Fix Tablet Comparison Virtual Reality Lithium-ion battery Communitications Term Vulnerabilities 5G Upload Free Resource Experience Social Network Entrepreneur Compliance Google Docs Error Unified Communications Bitcoin Project Management Running Cable Entertainment IoT Techology Dark Web Specifications Google Wallet Twitter IT Assessment Mobility Trends Undo Value Customer Resource management Regulations Google Maps Windows 8 Writing Multi-Factor Authentication Laptop Data Analysis Star Wars Unified Threat Management Microsoft Excel Gamification Staff Drones Remote Computing Smart Devices Microsoft 365 Memory Telephone System Social Networking Outlook Travel Data Breach Halloween Fileless Malware Google Play User Error Content Wearable Technology Alert Electronic Health Records Application Solutions Wasting Time Health IT Motherboard Virtual Private Network Unified Threat Management Permissions Hacks Social Engineering IBM Trend Micro Scary Stories Directions Security Cameras Assessment