Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Budget Managed Services Gmail Voice over Internet Protocol WiFi Apple Networking App HIPAA Computing Applications Information Technology Hacker Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Operating System Router Physical Security Computers Virtual Private Network Risk Management Health Website Help Desk Office Tips 2FA Analytics Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Cybercrime Customer Service Solutions Display Printer Paperless Office Infrastructure Monitoring Windows 11 Document Management Excel Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Social Project Management Going Green Patch Management Windows 7 Save Money Multi-Factor Authentication Settings Mobility Printing Customer Relationship Management Wireless Content Filtering IT Management VPN YouTube Meetings Hacking Employees Cryptocurrency Presentation User Tip Modem Integration Computer Repair Mobile Security Processor Wireless Technology Virtual Desktop Data storage LiFi Holidays Smart Technology Outlook Data Storage Machine Learning Supply Chain Word Money Saving Time Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Maintenance Antivirus Sports Downloads Mouse Safety Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Robot Cost Management Organization Alt Codes Content Wearable Technology Shortcuts Digital Security Cameras Health IT Smart Devices Downtime Unified Threat Management Motherboard Ransmoware Comparison Memory Vendors Permissions Unified Threat Management Directions Remote Working Hosted Solution Assessment Typing Data Breach Competition Google Play Be Proactive Videos Electronic Health Records Workforce Network Congestion Specifications Wasting Time Threats Knowledge Fraud Google Drive User Error Microchip Internet Exlporer Username Trend Micro Security Cameras Workplace Strategies Software as a Service Point of Sale Meta User 5G Black Friday Managing Costs Amazon Experience Google Docs Unified Communications Database Bitcoin Network Management eCommerce Running Cable Tech Support IT Technicians SSID Google Wallet Proxy Server Surveillance IP Address Cookies Virtual Assistant Outsource IT Monitors Cyber Monday Virtual Machine Environment Hotspot Media Tactics Reviews Windows 8 Laptop Websites Mirgation Medical IT Drones Development Nanotechnology Transportation Small Businesses Recovery Hypervisor Displays Hard Drives Electronic Medical Records Language SharePoint Addiction Shopping Management Optimization Domains Halloween Chatbots PowerPoint Lenovo Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Service Level Agreement Refrigeration Virtual Reality Computing Infrastructure Navigation PCI DSS Gig Economy Hacks Server Management Public Speaking Scary Stories Private Cloud Identity Workplace Fun Superfish Bookmark Internet Service Provider Lithium-ion battery Identity Theft Smart Tech Teamwork Hiring/Firing Deep Learning Download Twitter Alerts Evernote Paperless Entrepreneur Regulations Compliance Memes Error Co-managed IT Social Engineering Break Fix Browsers Net Neutrality Education Connectivity SQL Server Technology Care Financial Data Upload History Undo Remote Computing Business Communications Smartwatch Mobile Computing Social Network IT Scams Multi-Factor Security Azure Hybrid Work Search Dark Web Procurement Tablet IoT Telework Best Practice Trends Cyber security Alert Tech Human Resources CES Managed IT Customer Resource management Communitications Buisness File Sharing Regulations Cables Dark Data Google Calendar Application How To Microsoft Excel Legal Data Analysis Supply Chain Management IT solutions Star Wars FinTech Business Growth Gamification Notifications Staff Term Google Apps IT Assessment IBM Travel Social Networking IT Maintenance Legislation Value Business Intelligence Cortana Techology Fileless Malware Flexibility Google Maps

Blog Archive