Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Saving Money Quick Tips Passwords Managed Service Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Covid-19 Gadgets Cloud Computing Training Managed Service Provider Remote Work Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Office 365 HIPAA Applications How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Analytics Office Tips Router Augmented Reality Retail Storage Password 2FA Bring Your Own Device Help Desk Big Data Managed IT Services Healthcare Operating System Computers Risk Management Virtual Private Network Website Health Solutions Firewall Document Management Windows 11 The Internet of Things Scam Monitoring Data loss Excel Social Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Cooperation Free Resource Physical Security Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Word Outlook Employees Integration Machine Learning Money Humor User Tip Modem Mobile Security Processor Safety Maintenance Holidays Sports Antivirus Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Robot Customer Relationship Management Downloads iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities Hacking IT Management Entertainment YouTube Meetings Data Privacy Presentation VPN Cryptocurrency Images 101 Wireless Technology Telephone System Computer Repair Multi-Factor Authentication Mobility Cost Management Virtual Desktop Data storage LiFi Permissions Workforce Hard Drives Windows 8 Directions Videos Laptop Websites Assessment Electronic Health Records Wasting Time Threats Domains Drones SharePoint Electronic Medical Records Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Refrigeration Microchip Halloween Internet Exlporer Software as a Service Username Writing Managing Costs Amazon Public Speaking Lenovo Lithium-ion battery Virtual Reality eCommerce Black Friday SSID Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Scary Stories Private Cloud Database Surveillance Superfish Identity Theft Fun IT Technicians Virtual Machine Environment Media Deep Learning Proxy Server Reviews Twitter Cookies Cyber Monday Medical IT Error Tactics Development Hotspot Transportation Small Businesses Undo Education Social Engineering Mirgation Hypervisor Displays PowerPoint Shopping Remote Computing Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Tablet Management PCI DSS Search Chatbots Navigation Distributed Denial of Service Workplace Application Best Practice Gig Economy Alert Screen Reader Buisness File Sharing Service Level Agreement Internet Service Provider Dark Data Computing Infrastructure Teamwork Hiring/Firing Managed IT IBM Legal IT solutions Regulations Compliance How To Identity Evernote Paperless Co-managed IT Business Growth Bookmark Notifications Smart Tech Memes Travel Download Net Neutrality Alerts SQL Server Technology Care Techology Google Maps Financial Data Cortana History Business Communications Break Fix Scams Alt Codes Browsers Smartwatch Connectivity IT Downtime Unified Threat Management Upload Procurement Azure Hybrid Work Competition Unified Threat Management Hosted Solution Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Typing CES IoT Communitications Trends Supply Chain Management Network Congestion Google Drive User Error User Customer Resource management FinTech Knowledge Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Point of Sale Gamification Flexibility 5G Staff Value Business Intelligence IP Address Google Docs Unified Communications Organization Experience Social Networking Legislation Shortcuts Ransmoware Bitcoin Network Management Fileless Malware Digital Security Cameras Running Cable Tech Support Smart Devices Content Remote Working Monitors Wearable Technology Memory Vendors Google Wallet Recovery Health IT Motherboard Data Breach Comparison Google Play Be Proactive

Blog Archive