Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Small Business Collaboration Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Managed Services Data Security Apps Vendor Mobile Office Two-factor Authentication WiFi Apple Networking Voice over Internet Protocol Employer-Employee Relationship App BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Password Managed IT Services How To BDR HIPAA Hacker Computing Physical Security Avoiding Downtime Applications Information Technology Marketing Access Control Office 365 Conferencing Storage Bring Your Own Device Big Data Healthcare Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail The Internet of Things Excel Telephone Scam Data loss Social Remote Workers Cooperation Going Green Patch Management Save Money Remote Monitoring Free Resource Customer Service Project Management End of Support Vulnerability Windows 7 Vendor Management Cybercrime Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 Managed IT Service Video Conferencing Maintenance Downloads Antivirus Managed Services Provider Sports Mouse Virtual Machines Professional Services Licensing Entertainment Administration iPhone Customer Relationship Management Robot Telephone System Cost Management Vulnerabilities Data Privacy Settings Wireless Hacking Printing Images 101 Content Filtering Presentation IT Management Multi-Factor Authentication YouTube Meetings Mobility VPN Wireless Technology Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Employees Data storage LiFi Integration Word Smart Technology Outlook Machine Learning Holidays Money Saving Time Humor Safety Data Storage Supply Chain Deep Learning Download Employer/Employee Relationships Outsourcing Twitter Alerts Navigation PCI DSS Error Browsers Education Connectivity Workplace Social Engineering Break Fix Gig Economy Internet Service Provider Upload Teamwork Hiring/Firing Remote Computing Evernote Paperless Multi-Factor Security Application Regulations Compliance Mobile Computing Social Network Memes Tablet IoT Co-managed IT Search Dark Web Net Neutrality Best Practice Trends SQL Server Technology Care Alert IBM Buisness File Sharing Regulations Business Communications Dark Data Google Calendar Financial Data Managed IT Customer Resource management History Smartwatch Legal Data Analysis IT IT solutions Star Wars Scams How To Microsoft Excel Procurement Business Growth Gamification Azure Hybrid Work Notifications Staff Cyber security Travel Social Networking Tech Human Resources Legislation Telework CES Techology Fileless Malware Communitications Google Maps Cables Cortana Competition Supply Chain Management Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard Term Google Apps Comparison FinTech Health IT Unified Threat Management Directions IT Assessment Hosted Solution Assessment IT Maintenance Permissions User Flexibility Typing Value Business Intelligence Shortcuts Network Congestion Specifications Organization Digital Security Cameras Google Drive User Error Microchip Smart Devices Internet Exlporer Ransmoware Knowledge Fraud Remote Working Username Memory Vendors IP Address Data Breach Point of Sale Google Play Be Proactive 5G Black Friday Videos Google Docs Electronic Health Records Unified Communications Database Workforce Experience Recovery Bitcoin Network Management Wasting Time Threats Running Cable Tech Support IT Technicians Trend Micro Cookies Security Cameras Workplace Strategies Monitors Cyber Monday Hard Drives Google Wallet Proxy Server Software as a Service Tactics Meta Hotspot Domains Windows 8 Managing Costs Amazon Laptop Websites Mirgation eCommerce Nanotechnology SSID Refrigeration Drones SharePoint Surveillance Addiction Virtual Assistant Outsource IT Electronic Medical Records Language Public Speaking Lithium-ion battery Media Management Virtual Machine Environment Halloween Chatbots Screen Reader Medical IT Writing Distributed Denial of Service Entrepreneur Reviews Lenovo Development Service Level Agreement Transportation Small Businesses Virtual Reality Computing Infrastructure Hacks Server Management Hypervisor Displays Scary Stories Private Cloud Identity Optimization Identity Theft Smart Tech PowerPoint Fun Undo Shopping Superfish Bookmark

Blog Archive