Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Smartphones VoIP Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Gadgets Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Compliance Windows 10 Office Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Managed Services Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Networking Apple App HIPAA Applications Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR WiFi Router Operating System Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Managed IT Services Bring Your Own Device Big Data Social Remote Monitoring Going Green End of Support Vulnerability Vendor Management Solutions Physical Security Cybercrime Display Customer Service Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Settings Wireless IT Management Printing Content Filtering VPN Employees Meetings Integration Customer Relationship Management YouTube User Tip Modem Computer Repair Mobile Security Cryptocurrency Processor Hacking Presentation Holidays Data Storage Virtual Desktop Smart Technology Supply Chain LiFi Wireless Technology Data storage Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Outlook Money Managed IT Service Word Humor Maintenance Antivirus Downloads iPhone Licensing Sports Mouse Vulnerabilities Entertainment Data Privacy Safety Administration Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Content Remote Working Wearable Technology Memory Vendors Application Comparison Google Play Be Proactive Cortana Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Alt Codes IBM Unified Threat Management Directions Videos Wasting Time Threats Downtime Network Congestion Specifications Security Cameras Workplace Strategies Hosted Solution Trend Micro Internet Exlporer Software as a Service Fraud Meta Typing User Error Microchip Username Managing Costs Amazon Black Friday SSID Competition Knowledge Point of Sale eCommerce Google Drive Database Surveillance Virtual Assistant Outsource IT 5G Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Unified Communications Experience Proxy Server Reviews Cookies Google Docs Tactics Development Hotspot Transportation Small Businesses Bitcoin Running Cable User Websites Mirgation Hypervisor Displays Google Wallet PowerPoint Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Windows 8 IP Address Laptop SharePoint Management PCI DSS Chatbots Drones Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Halloween Recovery Hard Drives Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Domains Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Hacks Scary Stories Refrigeration Fun Financial Data Error History Business Communications Social Engineering Break Fix Scams Deep Learning Public Speaking Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Lithium-ion battery Education Entrepreneur Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Trends Supply Chain Management Alert Mobile Computing Undo Search Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Best Practice Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Buisness Legislation Shortcuts IT solutions Organization Travel Social Networking Legal Google Maps Smart Devices Ransmoware Business Growth Techology Fileless Malware Digital Security Cameras

Blog Archive