Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Automation Information Covid-19 Cloud Computing Holiday Miscellaneous Training Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Vendor Two-factor Authentication Mobile Office Data Security Apps Networking Chrome Mobile Device Management Budget Gmail BYOD Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Information Technology Hacker Applications Avoiding Downtime Marketing Office 365 How To BDR Conferencing WiFi Access Control Computing HIPAA Router Computers Retail Risk Management 2FA Website Managed IT Services Analytics Office Tips Help Desk Augmented Reality Storage Password Bring Your Own Device Virtual Private Network Big Data Health Healthcare Operating System Free Resource Project Management Windows 7 Scam Windows 11 Microsoft 365 Data loss Solutions Monitoring Excel Patch Management Firewall Save Money Remote Monitoring End of Support Vulnerability Vendor Management Telephone The Internet of Things Physical Security Display Social Cooperation Printer Paperless Office Going Green Infrastructure Remote Workers Cybercrime Customer Service Document Management Presentation Cryptocurrency Maintenance Images 101 Modem Antivirus Wireless Technology User Tip Processor Virtual Desktop Multi-Factor Authentication Mobile Security Mobility Data storage LiFi Supply Chain Outlook Smart Technology Word Money Employees Integration Humor Robot Saving Time Sports Managed IT Service Safety Mouse Holidays Downloads IT Management Data Storage VPN Meetings Administration Licensing Data Privacy Video Conferencing Entertainment Managed Services Provider Computer Repair Virtual Machines Professional Services Telephone System Settings Printing Cost Management Wireless Customer Relationship Management Content Filtering iPhone Machine Learning YouTube Hacking Vulnerabilities Supply Chain Management Amazon Specifications Server Management Private Cloud Microchip User FinTech Internet Exlporer 5G Fraud Superfish Term Identity Theft Google Docs Twitter Unified Communications Username IT Assessment Experience Outsource IT Flexibility Running Cable Environment Value Black Friday Media Error Bitcoin Google Wallet Social Engineering Organization Database IP Address Remote Computing Digital Security Cameras Smart Devices IT Technicians Small Businesses Remote Working Laptop Cookies Displays Memory Cyber Monday Windows 8 Proxy Server Drones Recovery Tactics Data Breach Hotspot Google Play Tablet Outsourcing Hard Drives Alert Videos Electronic Health Records Mirgation Halloween Nanotechnology Wasting Time Managed IT Domains File Sharing Dark Data How To Addiction Trend Micro Language Workplace Security Cameras Hiring/Firing Refrigeration Notifications Management Software as a Service Chatbots Scary Stories Screen Reader Managing Costs Distributed Denial of Service Paperless Public Speaking Travel Hacks Lithium-ion battery Google Maps Service Level Agreement eCommerce Fun Computing Infrastructure Techology Co-managed IT SSID Technology Care Virtual Assistant Deep Learning Entrepreneur Surveillance Identity Smart Tech Virtual Machine Business Communications Unified Threat Management Bookmark Reviews Education Download Alerts Unified Threat Management Scams Medical IT Hybrid Work Transportation Undo Development Browsers Network Congestion Connectivity Hypervisor Break Fix Human Resources Mobile Computing Shopping Upload Optimization Search User Error Cables PowerPoint Employer/Employee Relationships Multi-Factor Security Best Practice Social Network PCI DSS Buisness IoT Dark Web Google Apps Navigation Point of Sale Legal Application Gig Economy IT solutions Trends IT Maintenance Regulations Business Intelligence Teamwork Google Calendar Network Management Tech Support Business Growth Customer Resource management Internet Service Provider Data Analysis Monitors Regulations Compliance Star Wars Microsoft Excel Shortcuts Evernote IBM Gamification Memes Cortana Staff Ransmoware Social Networking Vendors SQL Server Legislation Websites Alt Codes Net Neutrality Fileless Malware Financial Data Downtime History Be Proactive Electronic Medical Records Smartwatch Hosted Solution Content IT Wearable Technology SharePoint Workforce Motherboard Threats Azure Comparison Competition Typing Health IT Procurement Directions Writing Telework Assessment Cyber security Permissions Lenovo Workplace Strategies Tech Google Drive Virtual Reality CES Communitications Knowledge Meta

Blog Archive