Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Managed Service Passwords Cybersecurity Communication Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Automation Artificial Intelligence Miscellaneous Cloud Computing Training Gadgets Covid-19 Remote Work Managed Service Provider Compliance Server IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Vendor Two-factor Authentication Apps Data Security Mobile Office BYOD Mobile Device Management Gmail WiFi Managed Services Chrome Tip of the week Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App Computing HIPAA Information Technology Applications Office 365 Access Control Conferencing How To Hacker BDR Avoiding Downtime Marketing Router Risk Management Virtual Private Network 2FA Health Analytics Office Tips Help Desk Augmented Reality Big Data Healthcare Storage Retail Password Bring Your Own Device Managed IT Services Computers Operating System Website Vendor Management Physical Security Firewall Windows 11 Display Printer Paperless Office Infrastructure Excel The Internet of Things Monitoring Remote Workers Social Document Management Telephone Scam Free Resource Project Management Data loss Customer Service Windows 7 Cooperation Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring End of Support Vulnerability Cybercrime YouTube Word IT Management VPN Cryptocurrency Meetings Holidays User Tip Modem Virtual Desktop Computer Repair Mobile Security Data Storage Processor Data storage Supply Chain LiFi Safety Video Conferencing Managed Services Provider Virtual Machines Outlook Professional Services Smart Technology Money Humor Machine Learning Saving Time iPhone Sports Managed IT Service Mouse Maintenance Customer Relationship Management Antivirus Vulnerabilities Downloads Data Privacy Administration Licensing Images 101 Hacking Entertainment Multi-Factor Authentication Mobility Presentation Wireless Technology Robot Telephone System Settings Cost Management Wireless Printing Content Filtering Employees Integration Assessment Permissions Hard Drives Unified Threat Management Directions Managing Costs Amazon eCommerce Google Drive SSID Knowledge Domains Network Congestion Specifications Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Internet Exlporer Media Fraud 5G Refrigeration User Error Microchip Public Speaking Reviews Google Docs Username Medical IT Unified Communications Experience Running Cable Black Friday Lithium-ion battery Development Transportation Small Businesses Bitcoin Point of Sale Entrepreneur Hypervisor Displays Google Wallet Database Shopping Optimization Network Management PowerPoint Tech Support IT Technicians Laptop Monitors Cyber Monday Proxy Server Employer/Employee Relationships Outsourcing Windows 8 Cookies Drones Tactics Navigation Hotspot Undo PCI DSS Gig Economy Workplace Websites Mirgation Halloween Internet Service Provider Teamwork Hiring/Firing Nanotechnology Addiction Evernote Paperless Electronic Medical Records Language Regulations Compliance SharePoint Memes Management Co-managed IT Chatbots Scary Stories Writing Distributed Denial of Service Application Net Neutrality Lenovo SQL Server Technology Care Hacks Screen Reader History Service Level Agreement Business Communications Virtual Reality Computing Infrastructure Fun Financial Data IBM Smartwatch IT Server Management Scams Deep Learning Private Cloud Identity Procurement Superfish Bookmark Azure Hybrid Work Identity Theft Smart Tech Cyber security Download Tech Human Resources Education Twitter Alerts Telework CES Communitications Cables Error Social Engineering Break Fix Supply Chain Management Browsers Mobile Computing Connectivity Upload Term Google Apps Remote Computing Search Competition FinTech IT Assessment Social Network IT Maintenance Best Practice Multi-Factor Security Tablet IoT Buisness Dark Web Flexibility Value Business Intelligence Legal Trends Shortcuts IT solutions Alert Organization Dark Data Google Calendar Digital Security Cameras User Smart Devices Managed IT Customer Resource management Ransmoware Business Growth File Sharing Regulations Star Wars How To Microsoft Excel Remote Working Data Analysis Memory Vendors Data Breach Gamification Google Play Be Proactive Notifications Staff Cortana Legislation IP Address Videos Electronic Health Records Workforce Alt Codes Travel Social Networking Google Maps Downtime Techology Fileless Malware Wasting Time Threats Trend Micro Content Security Cameras Workplace Strategies Hosted Solution Wearable Technology Comparison Recovery Software as a Service Health IT Meta Typing Unified Threat Management Motherboard

Blog Archive