Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Artificial Intelligence Automation Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Windows 10 Bandwidth Business Technology Apps Data Security Two-factor Authentication Mobile Office Vendor WiFi Tip of the week Apple App Employer-Employee Relationship Networking BYOD Chrome Mobile Device Management Managed Services Budget Voice over Internet Protocol Gmail Conferencing How To Computing BDR Information Technology Hacker Avoiding Downtime Marketing Office 365 HIPAA Applications Access Control Help Desk Big Data Retail Operating System Managed IT Services Computers Risk Management Website 2FA Office Tips Analytics Physical Security Router Augmented Reality Virtual Private Network Storage Password Health Healthcare Bring Your Own Device The Internet of Things Monitoring Free Resource Document Management Project Management Windows 7 Social Going Green Microsoft 365 Scam Data loss Telephone Solutions Cybercrime Customer Service Cooperation Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Excel Display Printer Firewall Remote Workers Paperless Office Infrastructure Vulnerabilities Smart Technology Machine Learning Administration Data Privacy Saving Time Images 101 Maintenance Multi-Factor Authentication Mobility Antivirus Managed IT Service Settings Printing Downloads Customer Relationship Management Wireless Content Filtering Licensing Employees YouTube Integration Entertainment Hacking Cryptocurrency Presentation Robot Wireless Technology Virtual Desktop Holidays Telephone System Cost Management Data storage LiFi Data Storage IT Management Supply Chain VPN Outlook Meetings Video Conferencing Managed Services Provider Word Money Virtual Machines Professional Services Humor Computer Repair User Tip Modem Processor Mobile Security Sports Mouse Safety iPhone Mirgation Mobile Computing Telework Electronic Medical Records Cyber security Tech Human Resources SharePoint Cables Nanotechnology CES Communitications Search Supply Chain Management Writing Addiction Lenovo Language Best Practice Chatbots FinTech Virtual Reality Buisness Term Google Apps Management IT Maintenance Application Screen Reader Server Management Legal Distributed Denial of Service Private Cloud IT solutions IT Assessment Business Growth Flexibility Value Business Intelligence Service Level Agreement Superfish Computing Infrastructure Identity Theft Identity Organization Twitter IBM Shortcuts Cortana Ransmoware Bookmark Smart Tech Digital Security Cameras Error Smart Devices Alt Codes Remote Working Social Engineering Memory Vendors Download Alerts Remote Computing Downtime Data Breach Google Play Be Proactive Workforce Browsers Connectivity Videos Break Fix Hosted Solution Electronic Health Records Typing Wasting Time Threats Competition Upload Tablet Multi-Factor Security Alert Trend Micro Security Cameras Workplace Strategies Social Network Knowledge Meta IoT Managed IT Google Drive Dark Web File Sharing Software as a Service Dark Data How To Managing Costs Amazon Trends User Regulations Google Calendar Notifications eCommerce 5G SSID Customer Resource management Experience Virtual Assistant Outsource IT Data Analysis Star Wars Google Docs Microsoft Excel Travel Unified Communications Surveillance Bitcoin Running Cable Virtual Machine Environment Media Gamification Techology Staff Google Maps Social Networking Google Wallet Reviews Legislation IP Address Medical IT Transportation Small Businesses Fileless Malware Unified Threat Management Development Windows 8 Laptop Hypervisor Displays Content Unified Threat Management Wearable Technology Recovery Motherboard Drones Shopping Comparison Optimization PowerPoint Health IT Employer/Employee Relationships Outsourcing Directions Hard Drives Assessment Permissions Network Congestion PCI DSS Halloween Domains Navigation User Error Gig Economy Specifications Workplace Teamwork Hiring/Firing Microchip Refrigeration Internet Exlporer Fraud Point of Sale Internet Service Provider Hacks Regulations Compliance Scary Stories Public Speaking Evernote Paperless Username Network Management Black Friday Tech Support Memes Lithium-ion battery Fun Co-managed IT Monitors SQL Server Technology Care Database Entrepreneur Deep Learning Net Neutrality IT Technicians Financial Data History Business Communications Proxy Server Cookies Smartwatch Cyber Monday Websites Education IT Scams Azure Hybrid Work Undo Tactics Hotspot Procurement

Blog Archive