Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Smartphone Productivity Data Backup Managed Service Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Budget Networking Apple App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Managed Services Voice over Internet Protocol WiFi How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Computers Virtual Private Network Risk Management Health 2FA Website Help Desk Analytics Office Tips Augmented Reality Retail Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Patch Management Save Money Microsoft 365 Going Green Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Maintenance Antivirus Downloads Safety iPhone Sports Licensing Mouse Entertainment Vulnerabilities Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Customer Relationship Management Settings Wireless Printing IT Management VPN Employees Meetings Content Filtering Hacking Integration YouTube Presentation User Tip Modem Processor Cryptocurrency Computer Repair Mobile Security Wireless Technology Holidays Virtual Desktop Data Storage Data storage LiFi Smart Technology Supply Chain Video Conferencing Word Machine Learning Managed Services Provider Outlook Saving Time Virtual Machines Professional Services Money Humor Managed IT Service Twitter Alerts SQL Server Technology Care Hacks Download Net Neutrality Entrepreneur Scary Stories Financial Data Error History Fun Business Communications Browsers Smartwatch Deep Learning Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Undo Upload Procurement Social Network Telework Education Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables Alert Mobile Computing Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Search Dark Data Google Calendar Term Google Apps Data Analysis Application Best Practice Star Wars IT Assessment How To Microsoft Excel IT Maintenance Buisness Notifications Staff Value Business Intelligence Gamification Flexibility IBM Legal Organization IT solutions Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Business Growth Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Cortana Comparison Google Play Be Proactive Unified Threat Management Directions Videos Alt Codes Assessment Electronic Health Records Permissions Workforce Downtime Wasting Time Threats Competition Hosted Solution Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Typing Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Username Google Drive User Point of Sale eCommerce Knowledge Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment 5G Media Network Management IP Address Google Docs Proxy Server Reviews Unified Communications Cookies Experience Monitors Cyber Monday Medical IT Bitcoin Tactics Development Running Cable Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Google Wallet Shopping Recovery Nanotechnology Optimization PowerPoint SharePoint Hard Drives Windows 8 Addiction Laptop Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Domains Drones Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Refrigeration Service Level Agreement Internet Service Provider Halloween Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Public Speaking Lithium-ion battery Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT

Blog Archive