Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade Smartphones AI Business Management VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Automation Information Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Business Technology Blockchain Wi-Fi Windows 10 Bandwidth Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security App Employer-Employee Relationship Tip of the week Networking Mobile Device Management Chrome Gmail Budget BYOD Apple Managed Services Voice over Internet Protocol HIPAA Computing Hacker Applications Information Technology Avoiding Downtime How To Marketing BDR Office 365 Conferencing WiFi Access Control Healthcare Operating System Retail Router Computers Risk Management Managed IT Services Website Help Desk Analytics Office Tips Augmented Reality Storage 2FA Password Virtual Private Network Bring Your Own Device Big Data Health Going Green Document Management Free Resource Customer Service Project Management Cybercrime Windows 7 Scam Data loss Microsoft 365 Solutions Monitoring Patch Management Save Money Firewall Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Telephone Physical Security The Internet of Things Excel Display Printer Cooperation Social Paperless Office Remote Workers Infrastructure Telephone System iPhone Machine Learning Cost Management Customer Relationship Management Settings Wireless Vulnerabilities Printing Data Privacy Content Filtering Hacking Maintenance YouTube Images 101 Presentation Antivirus Multi-Factor Authentication Mobility Cryptocurrency User Tip Modem Wireless Technology Processor Mobile Security Virtual Desktop Data storage LiFi Employees Smart Technology Integration Word Outlook Robot Money Saving Time Humor Holidays IT Management Managed IT Service Data Storage Safety VPN Meetings Sports Downloads Supply Chain Mouse Video Conferencing Licensing Managed Services Provider Computer Repair Virtual Machines Professional Services Entertainment Administration SQL Server Technology Care Legal Data Analysis IT solutions Websites Star Wars Microsoft Excel Net Neutrality IBM Staff Financial Data History Business Communications Business Growth Gamification Electronic Medical Records Social Networking Smartwatch Legislation IT SharePoint Scams Azure Hybrid Work Fileless Malware Cortana Procurement Wearable Technology Telework Cyber security Lenovo Tech Human Resources Alt Codes Content Writing Health IT Downtime Virtual Reality Motherboard CES Comparison Communitications Competition Cables Server Management Directions Hosted Solution Private Cloud Assessment Permissions Supply Chain Management FinTech Superfish Term Google Apps Typing Identity Theft Twitter Specifications IT Assessment IT Maintenance Value Business Intelligence User Google Drive Microchip Error Internet Exlporer Knowledge Fraud Flexibility Social Engineering Organization Shortcuts Username Remote Computing Digital Security Cameras 5G Black Friday Smart Devices Ransmoware Memory Vendors Google Docs Unified Communications Database Experience Remote Working IP Address Running Cable IT Technicians Data Breach Google Play Be Proactive Bitcoin Tablet Google Wallet Proxy Server Alert Cookies Videos Cyber Monday Electronic Health Records Workforce Wasting Time Threats Recovery Managed IT File Sharing Tactics Dark Data Hotspot Laptop How To Mirgation Trend Micro Hard Drives Security Cameras Workplace Strategies Windows 8 Drones Notifications Nanotechnology Software as a Service Domains Meta Managing Costs Amazon Travel Addiction Language Halloween Chatbots eCommerce Refrigeration Techology SSID Google Maps Management Virtual Assistant Outsource IT Screen Reader Distributed Denial of Service Surveillance Public Speaking Lithium-ion battery Virtual Machine Environment Media Unified Threat Management Service Level Agreement Computing Infrastructure Scary Stories Identity Reviews Unified Threat Management Medical IT Entrepreneur Hacks Transportation Small Businesses Bookmark Smart Tech Fun Development Alerts Hypervisor Displays Deep Learning Download Network Congestion Shopping Optimization Undo User Error PowerPoint Employer/Employee Relationships Outsourcing Browsers Education Connectivity Break Fix PCI DSS Navigation Point of Sale Upload Social Network Gig Economy Multi-Factor Security Workplace Mobile Computing Teamwork Hiring/Firing Network Management Tech Support IoT Search Dark Web Internet Service Provider Regulations Compliance Application Evernote Paperless Best Practice Trends Monitors Customer Resource management Buisness Regulations Google Calendar Memes Co-managed IT

Blog Archive