Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Managed Service Passwords Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Mobile Office Vendor Two-factor Authentication Apps Data Security BYOD Mobile Device Management Gmail WiFi Tip of the week Managed Services Chrome Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Marketing HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing How To Hacker BDR Avoiding Downtime Website Operating System Router Virtual Private Network Risk Management 2FA Health Help Desk Analytics Office Tips Big Data Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Computers Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Firewall Display Printer Windows 11 Paperless Office Infrastructure The Internet of Things Monitoring Excel Document Management Social Remote Workers Telephone Scam Data loss Customer Service Free Resource Project Management Cooperation Windows 7 Microsoft 365 Going Green Patch Management Save Money Settings Printing Wireless Employees Content Filtering Word Integration IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Holidays Processor Computer Repair Mobile Security Safety Virtual Desktop Data Storage Data storage Supply Chain LiFi Video Conferencing Managed Services Provider Smart Technology Virtual Machines Outlook Professional Services Machine Learning Money Saving Time Humor Managed IT Service iPhone Maintenance Antivirus Customer Relationship Management Sports Downloads Mouse Licensing Vulnerabilities Data Privacy Entertainment Administration Hacking Presentation Images 101 Multi-Factor Authentication Mobility Wireless Technology Telephone System Robot Cost Management Wearable Technology Videos Electronic Health Records Workforce Alt Codes Content Wasting Time Threats Health IT Downtime Unified Threat Management Motherboard Recovery Comparison Trend Micro Unified Threat Management Directions Security Cameras Workplace Strategies Hosted Solution Assessment Hard Drives Permissions Domains Software as a Service Meta Typing Managing Costs Amazon Network Congestion Specifications eCommerce Google Drive User Error Microchip SSID Internet Exlporer Refrigeration Knowledge Fraud Public Speaking Surveillance Virtual Assistant Outsource IT Username Virtual Machine Environment Media Lithium-ion battery Point of Sale 5G Black Friday Reviews Entrepreneur Google Docs Medical IT Unified Communications Database Experience Running Cable Tech Support IT Technicians Development Transportation Small Businesses Bitcoin Network Management Hypervisor Displays Google Wallet Proxy Server Cookies Monitors Cyber Monday Shopping Optimization PowerPoint Tactics Undo Hotspot Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Windows 8 Drones Navigation Nanotechnology PCI DSS Gig Economy SharePoint Workplace Addiction Electronic Medical Records Language Halloween Chatbots Internet Service Provider Teamwork Hiring/Firing Management Lenovo Evernote Paperless Screen Reader Application Writing Distributed Denial of Service Regulations Compliance Memes Co-managed IT Service Level Agreement Virtual Reality Computing Infrastructure IBM Scary Stories Private Cloud Identity Net Neutrality SQL Server Technology Care Hacks Server Management History Superfish Bookmark Business Communications Identity Theft Smart Tech Fun Financial Data Smartwatch IT Scams Deep Learning Download Twitter Alerts Error Procurement Azure Hybrid Work Cyber security Browsers Tech Human Resources Education Connectivity Social Engineering Break Fix Telework Competition Remote Computing CES Communitications Cables Upload Mobile Computing Social Network Multi-Factor Security Supply Chain Management Term Google Apps Tablet IoT Search Dark Web FinTech Alert IT Assessment IT Maintenance Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations User Dark Data Google Calendar Flexibility Value Business Intelligence Legal Data Analysis Shortcuts IT solutions Star Wars How To Microsoft Excel Organization Notifications Staff Digital Security Cameras Smart Devices Ransmoware Business Growth Gamification IP Address Travel Social Networking Legislation Remote Working Memory Vendors Data Breach Techology Fileless Malware Google Play Be Proactive Google Maps Cortana

Blog Archive