Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Managed Service Users AI Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Compliance Training Covid-19 Gadgets Cloud Computing Server IT Support Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Blockchain Business Technology Vendor Bandwidth Windows 10 Virtualization Two-factor Authentication Mobile Office Data Security Managed Services Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Voice over Internet Protocol Employer-Employee Relationship BYOD Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 HIPAA Marketing Applications Password Managed IT Services How To BDR Conferencing Virtual Private Network Risk Management Computers Health Website Office Tips Analytics Router Augmented Reality Retail Storage Bring Your Own Device 2FA Help Desk Big Data Healthcare Operating System Customer Service Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Document Management Firewall Windows 11 Scam Data loss Monitoring The Internet of Things Excel Going Green Patch Management Social Save Money Managed IT Service Remote Workers Remote Monitoring Vulnerability Telephone End of Support Vendor Management Cybercrime VPN YouTube Meetings Vulnerabilities Entertainment Cryptocurrency Data Privacy Hacking Computer Repair Images 101 Presentation Mobility Telephone System Virtual Desktop Multi-Factor Authentication Cost Management Data storage LiFi Wireless Technology Outlook Machine Learning Money Employees Word Integration Humor User Tip Modem Mobile Security Processor Maintenance Antivirus Sports Mouse Holidays Safety Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Professional Services Saving Time Virtual Machines Robot Settings Downloads Printing Wireless Content Filtering iPhone IT Management Customer Relationship Management Licensing Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Network Congestion IoT Communitications Knowledge Dark Web Cables Google Drive User Error CES Competition Trends Supply Chain Management Google Calendar Term Google Apps Customer Resource management FinTech Point of Sale Regulations 5G Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Google Docs Data Analysis Unified Communications Bitcoin Network Management Gamification Flexibility Running Cable Tech Support User Staff Value Business Intelligence Legislation Shortcuts Google Wallet Organization Social Networking Monitors Smart Devices Ransmoware Fileless Malware Digital Security Cameras Windows 8 IP Address Content Remote Working Laptop Websites Wearable Technology Memory Vendors Comparison Google Play Be Proactive Drones Health IT Motherboard Data Breach Assessment Electronic Health Records Electronic Medical Records Permissions Workforce SharePoint Directions Videos Halloween Recovery Wasting Time Threats Specifications Security Cameras Workplace Strategies Lenovo Hard Drives Trend Micro Writing Domains Internet Exlporer Software as a Service Virtual Reality Fraud Meta Microchip Hacks Server Management Username Scary Stories Private Cloud Managing Costs Amazon Black Friday SSID Superfish Identity Theft Refrigeration eCommerce Fun Public Speaking Database Surveillance Twitter Virtual Assistant Outsource IT Deep Learning Lithium-ion battery Error IT Technicians Virtual Machine Environment Media Entrepreneur Cyber Monday Medical IT Proxy Server Reviews Education Cookies Social Engineering Tactics Development Remote Computing Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Search PowerPoint Shopping Tablet Undo Nanotechnology Optimization Best Practice Addiction Alert Language Employer/Employee Relationships Outsourcing Managed IT Management PCI DSS Buisness File Sharing Chatbots Dark Data Navigation How To Distributed Denial of Service Workplace Legal Gig Economy IT solutions Screen Reader Business Growth Service Level Agreement Internet Service Provider Notifications Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Travel Application Identity Evernote Paperless Smart Tech Memes Cortana Co-managed IT Techology Bookmark Google Maps Alt Codes IBM Download Net Neutrality Alerts SQL Server Technology Care Business Communications Financial Data Downtime Unified Threat Management History Connectivity IT Break Fix Scams Unified Threat Management Browsers Smartwatch Hosted Solution Typing Upload Procurement Azure Hybrid Work

Blog Archive