Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Information Cloud Computing Holiday Covid-19 Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Bandwidth Windows 10 Blockchain Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Chrome Mobile Device Management Budget Gmail Tip of the week Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking BDR Computing Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 Access Control HIPAA WiFi Applications How To Computers Risk Management Website Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Bring Your Own Device Router Retail Big Data 2FA Healthcare Managed IT Services Operating System Help Desk Customer Service Patch Management Free Resource Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Telephone Microsoft 365 Physical Security Solutions Display Printer Cooperation Paperless Office Firewall Infrastructure Document Management The Internet of Things Social Windows 11 Scam Going Green Remote Workers Data loss Excel Monitoring Cybercrime YouTube Hacking Vulnerabilities Robot Presentation Saving Time Cryptocurrency Images 101 Managed IT Service Wireless Technology Multi-Factor Authentication Virtual Desktop Mobility Data storage LiFi IT Management Downloads Meetings VPN Data Privacy Licensing Outlook Entertainment Word Money Computer Repair Employees Humor Integration Telephone System Sports Cost Management Mouse Holidays Safety Machine Learning Data Storage Administration Video Conferencing Managed Services Provider Virtual Machines Maintenance Professional Services User Tip Modem Antivirus Mobile Security Processor Supply Chain Settings Wireless Customer Relationship Management Printing iPhone Content Filtering Smart Technology Cyber security Language Tech Paperless How To Telework Addiction CES Google Drive Management Communitications Chatbots Co-managed IT Knowledge Notifications Travel Supply Chain Management Screen Reader Technology Care Distributed Denial of Service Service Level Agreement Techology Computing Infrastructure Google Maps Term Business Communications 5G User FinTech Google Docs IT Assessment Unified Communications Identity Scams Experience Unified Threat Management Bookmark Flexibility Bitcoin Smart Tech Value Hybrid Work Running Cable Google Wallet Download Unified Threat Management Alerts Human Resources IP Address Organization Digital Security Cameras Smart Devices Cables Laptop Break Fix Network Congestion Browsers Remote Working Windows 8 Connectivity Memory Drones Upload User Error Data Breach Google Play Google Apps Recovery Hard Drives Videos Social Network Electronic Health Records IT Maintenance Multi-Factor Security Halloween Dark Web Point of Sale Domains IoT Wasting Time Business Intelligence Trends Trend Micro Security Cameras Shortcuts Refrigeration Customer Resource management Software as a Service Regulations Network Management Ransmoware Google Calendar Tech Support Scary Stories Microsoft Excel Monitors Public Speaking Data Analysis Hacks Star Wars Managing Costs Vendors Gamification eCommerce Staff SSID Be Proactive Fun Lithium-ion battery Entrepreneur Surveillance Deep Learning Social Networking Virtual Assistant Workforce Legislation Websites Fileless Malware Virtual Machine Threats Content SharePoint Education Wearable Technology Medical IT Workplace Strategies Electronic Medical Records Reviews Undo Health IT Development Motherboard Transportation Meta Comparison Amazon Permissions Writing Directions Mobile Computing Assessment Lenovo Hypervisor Optimization PowerPoint Search Virtual Reality Shopping Best Practice Server Management Employer/Employee Relationships Outsource IT Specifications Private Cloud Environment Buisness Fraud Identity Theft Navigation Media Microchip PCI DSS Internet Exlporer Superfish Gig Economy Legal Username IT solutions Twitter Application Internet Service Provider Business Growth Teamwork Small Businesses Black Friday Error Displays Evernote Social Engineering IBM Regulations Compliance Database Memes IT Technicians Cortana Remote Computing Proxy Server Net Neutrality Alt Codes Cookies SQL Server Outsourcing Cyber Monday History Downtime Hotspot Tablet Financial Data Tactics Smartwatch IT Hosted Solution Mirgation Workplace Alert File Sharing Dark Data Competition Procurement Typing Nanotechnology Managed IT Azure Hiring/Firing

Blog Archive