Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Holiday Information Automation Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Blockchain Business Technology Windows 10 Wi-Fi Virtualization Apps Vendor Mobile Office Two-factor Authentication Data Security Employer-Employee Relationship Chrome BYOD Budget Apple Managed Services Voice over Internet Protocol App Tip of the week Mobile Device Management Gmail Networking WiFi HIPAA Hacker Applications Avoiding Downtime Access Control Marketing Computing Conferencing Information Technology How To BDR Office 365 Augmented Reality 2FA Storage Password Computers Bring Your Own Device Virtual Private Network Router Health Website Healthcare Help Desk Operating System Retail Risk Management Managed IT Services Big Data Analytics Office Tips Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Customer Service Physical Security Excel Display Printer Paperless Office Remote Workers Infrastructure Going Green Monitoring Document Management Free Resource Firewall Cybercrime Project Management Windows 7 Scam Microsoft 365 Data loss The Internet of Things Telephone Solutions Social Patch Management Cooperation Save Money Money Customer Relationship Management Humor Telephone System Holidays Cost Management IT Management Data Storage VPN Meetings Sports Hacking Supply Chain Presentation Mouse Video Conferencing Managed Services Provider Virtual Machines Professional Services Computer Repair Wireless Technology Administration User Tip Modem Mobile Security Processor iPhone Machine Learning Word Settings Printing Smart Technology Wireless Vulnerabilities Content Filtering Data Privacy Saving Time Images 101 YouTube Maintenance Antivirus Cryptocurrency Safety Multi-Factor Authentication Mobility Managed IT Service Downloads Virtual Desktop LiFi Licensing Data storage Employees Integration Entertainment Robot Outlook Virtual Assistant Outsource IT Data Analysis Star Wars Surveillance Microsoft Excel Staff Virtual Machine Environment Unified Threat Management Media Gamification Hacks Reviews Unified Threat Management Social Networking Scary Stories Legislation Medical IT Competition Fun Transportation Small Businesses Fileless Malware Development Deep Learning Wearable Technology Hypervisor Displays Network Congestion Content Health IT Shopping User Error Motherboard Optimization Comparison PowerPoint Employer/Employee Relationships Outsourcing Directions Assessment Education Permissions PCI DSS Point of Sale User Navigation Mobile Computing Gig Economy Specifications Workplace Fraud Search Teamwork Hiring/Firing Tech Support Microchip Internet Exlporer Internet Service Provider Network Management Username Best Practice Regulations Compliance IP Address Evernote Paperless Monitors Buisness Memes Black Friday Co-managed IT SQL Server Technology Care Websites Legal Database IT solutions Net Neutrality Business Growth Financial Data IT Technicians History Recovery Business Communications Electronic Medical Records Proxy Server Smartwatch SharePoint Cookies IT Cyber Monday Hard Drives Scams Hotspot Domains Cortana Azure Hybrid Work Tactics Procurement Alt Codes Telework Lenovo Mirgation Cyber security Tech Human Resources Writing Virtual Reality CES Nanotechnology Downtime Communitications Refrigeration Cables Supply Chain Management Server Management Language Public Speaking Private Cloud Addiction Hosted Solution Management Typing FinTech Superfish Chatbots Lithium-ion battery Identity Theft Term Google Apps IT Maintenance Twitter Entrepreneur Screen Reader IT Assessment Distributed Denial of Service Flexibility Computing Infrastructure Knowledge Value Business Intelligence Error Google Drive Service Level Agreement Organization Identity Shortcuts Social Engineering Ransmoware Remote Computing Bookmark Digital Security Cameras Smart Tech Smart Devices Undo 5G Remote Working Alerts Experience Memory Vendors Google Docs Download Unified Communications Bitcoin Running Cable Data Breach Tablet Google Play Be Proactive Workforce Alert Browsers Google Wallet Videos Connectivity Electronic Health Records Break Fix Managed IT Wasting Time Threats File Sharing Dark Data Upload Social Network Windows 8 Laptop Trend Micro Multi-Factor Security Application Security Cameras Workplace Strategies How To Meta Notifications Drones IoT Software as a Service Dark Web IBM Managing Costs Amazon Travel Trends Customer Resource management Techology Regulations Halloween eCommerce Google Maps Google Calendar SSID

Blog Archive