Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Apps Data Security Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Tip of the week Gmail Budget Apple Managed Services Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Conferencing WiFi How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Marketing Office 365 Access Control Analytics Office Tips Augmented Reality Storage Password Retail Bring Your Own Device Big Data Managed IT Services 2FA Healthcare Router Operating System Computers Risk Management Virtual Private Network Website Help Desk Health Firewall Document Management Telephone The Internet of Things Scam Cooperation Data loss Windows 11 Social Remote Workers Going Green Excel Patch Management Save Money Customer Service Free Resource Remote Monitoring Vulnerability End of Support Cybercrime Project Management Windows 7 Vendor Management Microsoft 365 Physical Security Display Printer Solutions Monitoring Paperless Office Infrastructure Outlook Saving Time Money Humor Machine Learning Managed IT Service Holidays Downloads Safety Data Storage Licensing Sports Video Conferencing Maintenance Mouse Antivirus Managed Services Provider Entertainment Virtual Machines Professional Services Administration Telephone System Supply Chain Cost Management iPhone Customer Relationship Management Robot Settings Wireless Vulnerabilities Printing Content Filtering Hacking Presentation Images 101 YouTube User Tip IT Management Modem VPN Mobility Meetings Mobile Security Cryptocurrency Multi-Factor Authentication Processor Wireless Technology Virtual Desktop Data Privacy Computer Repair Data storage Smart Technology LiFi Employees Word Integration Screen Reader Websites Distributed Denial of Service Managing Costs Shortcuts eCommerce Ransmoware SSID Service Level Agreement Computing Infrastructure Halloween Refrigeration Public Speaking Surveillance Vendors SharePoint Virtual Assistant Identity Electronic Medical Records Smart Tech Lithium-ion battery Virtual Machine Bookmark Be Proactive Workforce Entrepreneur Lenovo Medical IT Download Alerts Hacks Writing Reviews Scary Stories Virtual Reality Development Fun Threats Transportation Server Management Connectivity Private Cloud Break Fix Deep Learning Hypervisor Browsers Workplace Strategies Undo Optimization Meta Superfish PowerPoint Upload Identity Theft Shopping Twitter Multi-Factor Security Education Amazon Employer/Employee Relationships Social Network Navigation IoT Error Dark Web PCI DSS Outsource IT Trends Mobile Computing Social Engineering Gig Economy Remote Computing Google Calendar Internet Service Provider Search Environment Teamwork Customer Resource management Media Regulations Evernote Star Wars Microsoft Excel Best Practice Regulations Compliance Application Data Analysis Memes Small Businesses Gamification Tablet Staff Buisness Alert Legislation IT solutions IBM Net Neutrality Displays SQL Server Social Networking Legal Managed IT File Sharing Business Growth Dark Data Financial Data History Fileless Malware IT Outsourcing Content Wearable Technology How To Smartwatch Notifications Comparison Procurement Cortana Azure Health IT Motherboard Workplace Tech Assessment Travel Permissions Alt Codes Telework Cyber security Directions Competition Communitications Hiring/Firing Techology Google Maps CES Downtime Specifications Hosted Solution Supply Chain Management Paperless Co-managed IT Term Internet Exlporer Unified Threat Management Fraud Typing FinTech Microchip IT Assessment Technology Care Unified Threat Management Username Google Drive Black Friday Flexibility Knowledge User Value Business Communications Scams Database Network Congestion Organization Smart Devices 5G Hybrid Work User Error IT Technicians Digital Security Cameras Google Docs Cyber Monday Unified Communications IP Address Remote Working Experience Memory Proxy Server Human Resources Cookies Cables Google Play Tactics Point of Sale Hotspot Bitcoin Running Cable Data Breach Electronic Health Records Mirgation Google Wallet Videos Tech Support Recovery Wasting Time Google Apps Network Management Nanotechnology IT Maintenance Security Cameras Addiction Language Windows 8 Monitors Laptop Hard Drives Trend Micro Domains Software as a Service Business Intelligence Management Chatbots Drones

Blog Archive