Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Google Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Artificial Intelligence Holiday Miscellaneous Information Automation Covid-19 Cloud Computing Gadgets Training Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Data Security Two-factor Authentication Vendor Apps Tip of the week App Networking Mobile Device Management Gmail Managed Services Chrome BYOD WiFi Voice over Internet Protocol Budget Employer-Employee Relationship Apple Hacker Avoiding Downtime Computing Conferencing Marketing Information Technology How To BDR Office 365 HIPAA Applications Access Control Computers Help Desk Retail Operating System Website Risk Management Managed IT Services 2FA Office Tips Analytics Augmented Reality Healthcare Big Data Storage Password Virtual Private Network Router Bring Your Own Device Health Customer Service Microsoft 365 Going Green Document Management Monitoring Solutions Cybercrime Scam Data loss Telephone Windows 11 Firewall Patch Management Cooperation Excel Save Money Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Remote Workers Physical Security Social Display Printer Paperless Office Free Resource Project Management Infrastructure Windows 7 Multi-Factor Authentication Mobility Machine Learning Hacking Presentation Smart Technology Settings Printing Wireless Wireless Technology Maintenance Saving Time Employees Content Filtering Antivirus Integration YouTube Managed IT Service Cryptocurrency Word Downloads Holidays Licensing Virtual Desktop Data Storage Supply Chain Data storage LiFi Entertainment Video Conferencing Robot Managed Services Provider Safety Virtual Machines Professional Services Outlook Money Telephone System Cost Management Humor IT Management VPN Meetings iPhone Sports Mouse Computer Repair Vulnerabilities Data Privacy Customer Relationship Management Modem Administration User Tip Processor Images 101 Mobile Security Electronic Medical Records Cookies Cyber Monday Shortcuts Legal SharePoint IT solutions Proxy Server Organization Digital Security Cameras Tactics Smart Devices Hotspot Ransmoware Business Growth Lenovo Remote Working Writing Mirgation Memory Vendors Virtual Reality Nanotechnology Data Breach User Google Play Be Proactive Cortana Server Management Videos Private Cloud Addiction Electronic Health Records Language Workforce Alt Codes Superfish Downtime Identity Theft Management Chatbots Wasting Time Threats Twitter IP Address Screen Reader Trend Micro Distributed Denial of Service Security Cameras Workplace Strategies Hosted Solution Typing Error Service Level Agreement Software as a Service Computing Infrastructure Meta Social Engineering Identity Managing Costs Amazon Knowledge Remote Computing Smart Tech eCommerce Recovery SSID Google Drive Bookmark Download Surveillance Hard Drives Alerts Virtual Assistant Outsource IT Virtual Machine Environment Media Tablet 5G Domains Reviews Experience Alert Connectivity Break Fix Medical IT Google Docs Unified Communications Browsers Bitcoin Managed IT Running Cable File Sharing Upload Development Dark Data Refrigeration Transportation Small Businesses Hypervisor Displays Multi-Factor Security Google Wallet Social Network How To Public Speaking Shopping Notifications Lithium-ion battery IoT Optimization Dark Web PowerPoint Windows 8 Laptop Travel Trends Employer/Employee Relationships Outsourcing Entrepreneur Google Calendar Navigation Drones Techology Google Maps Customer Resource management PCI DSS Regulations Gig Economy Star Wars Microsoft Excel Workplace Data Analysis Halloween Unified Threat Management Gamification Internet Service Provider Undo Staff Teamwork Hiring/Firing Legislation Evernote Paperless Unified Threat Management Regulations Compliance Social Networking Memes Co-managed IT Fileless Malware Hacks Scary Stories Content Net Neutrality Network Congestion Wearable Technology SQL Server Technology Care History Comparison Business Communications User Error Health IT Financial Data Fun Motherboard Smartwatch Assessment IT Application Permissions Scams Deep Learning Directions Point of Sale Procurement Azure Hybrid Work Cyber security Specifications Tech Human Resources Education Telework IBM Microchip CES Tech Support Internet Exlporer Communitications Fraud Cables Network Management Mobile Computing Username Supply Chain Management Monitors Black Friday Term Google Apps FinTech Search Websites Database IT Assessment IT Maintenance Best Practice Buisness Flexibility Competition IT Technicians Value Business Intelligence

Blog Archive