Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security App BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol Tip of the week WiFi Chrome Budget Employer-Employee Relationship Networking Apple Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing How To BDR Hacker Website Operating System Router Virtual Private Network Risk Management Health Help Desk Analytics Office Tips 2FA Big Data Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Computers Solutions Patch Management Save Money Remote Monitoring Going Green End of Support Vulnerability Vendor Management Physical Security Cybercrime Display Printer Firewall Paperless Office Infrastructure The Internet of Things Monitoring Windows 11 Remote Workers Document Management Social Excel Free Resource Scam Project Management Telephone Data loss Windows 7 Customer Service Microsoft 365 Cooperation Robot Data Privacy Wireless Technology Telephone System Employees Integration Cost Management Settings Wireless IT Management Printing Content Filtering VPN Meetings Word Holidays YouTube Cryptocurrency Computer Repair Data Storage User Tip Modem Mobile Security Video Conferencing Processor Managed Services Provider Virtual Machines Safety Professional Services Virtual Desktop Data storage LiFi Smart Technology Machine Learning Outlook Supply Chain iPhone Saving Time Money Humor Maintenance Managed IT Service Vulnerabilities Antivirus Customer Relationship Management Sports Downloads Images 101 Mouse Licensing Multi-Factor Authentication Mobility Administration Entertainment Hacking Presentation Videos IT solutions Microsoft Excel Electronic Health Records Data Analysis Legal Star Wars Travel Gamification Google Maps Business Growth Staff Google Apps Wasting Time Techology Trend Micro IP Address Security Cameras Social Networking Legislation IT Maintenance Business Intelligence Software as a Service Cortana Fileless Malware Unified Threat Management Content Alt Codes Wearable Technology Shortcuts Managing Costs Unified Threat Management Ransmoware eCommerce SSID Health IT Recovery Motherboard Downtime Comparison Hosted Solution Permissions Network Congestion Vendors Surveillance Virtual Assistant Directions Hard Drives Assessment User Error Domains Typing Be Proactive Virtual Machine Workforce Medical IT Reviews Specifications Point of Sale Fraud Threats Development Knowledge Transportation Microchip Refrigeration Google Drive Internet Exlporer Public Speaking Username Workplace Strategies Hypervisor Meta Optimization 5G Lithium-ion battery PowerPoint Network Management Tech Support Shopping Black Friday Database Entrepreneur Unified Communications Monitors Amazon Experience Employer/Employee Relationships Google Docs Navigation Bitcoin IT Technicians PCI DSS Running Cable Cyber Monday Outsource IT Proxy Server Google Wallet Cookies Websites Gig Economy Tactics Hotspot Environment Internet Service Provider Media Teamwork Undo SharePoint Evernote Windows 8 Mirgation Electronic Medical Records Regulations Compliance Laptop Small Businesses Memes Drones Nanotechnology Addiction Language Writing Displays Net Neutrality SQL Server Lenovo Management Chatbots Virtual Reality Financial Data Halloween History Distributed Denial of Service Outsourcing IT Server Management Application Screen Reader Private Cloud Smartwatch Service Level Agreement Identity Theft Computing Infrastructure Procurement Azure Superfish IBM Tech Hacks Identity Twitter Telework Scary Stories Workplace Cyber security CES Hiring/Firing Communitications Fun Bookmark Smart Tech Error Download Deep Learning Alerts Social Engineering Supply Chain Management Paperless Term Remote Computing FinTech Co-managed IT Education Break Fix Technology Care IT Assessment Browsers Connectivity Upload Tablet Flexibility Business Communications Value Competition Social Network Mobile Computing Alert Organization Multi-Factor Security Scams Digital Security Cameras Dark Web Dark Data Hybrid Work Smart Devices Search Managed IT IoT File Sharing Trends Best Practice How To Remote Working Human Resources Memory Data Breach Google Play Customer Resource management User Regulations Notifications Buisness Google Calendar Cables

Blog Archive