Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Smartphones AI VoIP Business Management Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Information Automation Facebook Gadgets Cloud Computing Covid-19 Holiday Training Miscellaneous Server Remote Work Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Blockchain Windows 10 Business Technology Virtualization Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Vendor Employer-Employee Relationship Networking Chrome Budget BYOD Apple Mobile Device Management App Gmail Tip of the week Managed Services Voice over Internet Protocol How To Office 365 Conferencing BDR Hacker Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Computing Information Technology Help Desk Managed IT Services 2FA Analytics Office Tips Augmented Reality Computers Storage Password Website Bring Your Own Device Virtual Private Network Health Router Operating System Big Data Retail Risk Management Healthcare Monitoring Scam Data loss Windows 11 Free Resource Project Management Windows 7 Customer Service Excel Patch Management Microsoft 365 Telephone Save Money Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cooperation Physical Security Display Printer Paperless Office Firewall Infrastructure Going Green The Internet of Things Document Management Cybercrime Remote Workers Social iPhone Smart Technology Virtual Desktop LiFi Vulnerabilities Customer Relationship Management Data storage Saving Time Supply Chain Images 101 Outlook Hacking Managed IT Service Presentation Money Multi-Factor Authentication Robot Mobility Humor Downloads Wireless Technology Licensing IT Management Sports Entertainment VPN Employees Meetings Mouse Integration Word Administration Computer Repair Data Privacy Telephone System Cost Management Holidays Data Storage Video Conferencing Settings Safety Machine Learning Printing Managed Services Provider Wireless Professional Services Content Filtering Virtual Machines User Tip Modem Mobile Security YouTube Processor Cryptocurrency Maintenance Antivirus Unified Communications Experience Outsource IT IBM Smartwatch Mirgation Google Docs IT Social Engineering Procurement Remote Computing Bitcoin Azure Running Cable Environment Media Nanotechnology Addiction Telework Language Google Wallet Cyber security Tech Small Businesses Management CES Chatbots Tablet Communitications Supply Chain Management Distributed Denial of Service Alert Windows 8 Laptop Displays Screen Reader Service Level Agreement Managed IT Competition FinTech Computing Infrastructure File Sharing Drones Dark Data Term Outsourcing Identity IT Assessment How To Flexibility Notifications Value Halloween Bookmark Smart Tech Workplace Download Organization Alerts Travel Hiring/Firing Techology Digital Security Cameras Google Maps User Smart Devices Remote Working Break Fix Hacks Memory Scary Stories Browsers Paperless Connectivity Fun Co-managed IT Upload Unified Threat Management Data Breach Google Play Deep Learning Technology Care Social Network Unified Threat Management IP Address Videos Electronic Health Records Multi-Factor Security IoT Dark Web Wasting Time Business Communications Scams Trends Trend Micro Network Congestion Education Security Cameras Google Calendar Hybrid Work Customer Resource management User Error Regulations Recovery Software as a Service Star Wars Hard Drives Microsoft Excel Mobile Computing Managing Costs Data Analysis Human Resources Search Cables Gamification Domains Staff Point of Sale eCommerce SSID Legislation Best Practice Virtual Assistant Social Networking Surveillance Network Management Refrigeration Tech Support Virtual Machine Buisness Fileless Malware Google Apps IT Maintenance Content Public Speaking Reviews Wearable Technology Legal Monitors IT solutions Medical IT Comparison Business Growth Transportation Business Intelligence Health IT Lithium-ion battery Motherboard Development Shortcuts Assessment Permissions Websites Entrepreneur Hypervisor Directions Cortana Ransmoware Shopping Optimization PowerPoint Specifications Electronic Medical Records Alt Codes Employer/Employee Relationships Vendors SharePoint Be Proactive Internet Exlporer Undo PCI DSS Fraud Downtime Navigation Microchip Workforce Username Lenovo Gig Economy Writing Hosted Solution Internet Service Provider Black Friday Virtual Reality Typing Teamwork Threats Workplace Strategies Database Server Management Regulations Compliance Private Cloud Evernote Knowledge Meta Superfish IT Technicians Identity Theft Google Drive Memes Net Neutrality Cyber Monday Twitter SQL Server Amazon Proxy Server Cookies Application 5G Tactics Financial Data Hotspot Error History

Blog Archive