Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Mobile Office Vendor Two-factor Authentication Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Managed Services Apple Networking Voice over Internet Protocol Employer-Employee Relationship App Hacker Computing Avoiding Downtime Information Technology HIPAA Marketing Access Control Applications Office 365 Conferencing How To BDR Computers Operating System Virtual Private Network Risk Management Website Router Health Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Password Big Data Bring Your Own Device Managed IT Services Healthcare Customer Service Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security Display Solutions Printer Paperless Office Infrastructure Firewall Document Management Windows 11 Monitoring The Internet of Things Excel Scam Data loss Social Remote Workers Telephone Going Green Patch Management Save Money Data Privacy Settings Wireless Hacking Printing Presentation Images 101 Content Filtering IT Management VPN YouTube Meetings Telephone System Multi-Factor Authentication Mobility Wireless Technology Cost Management Cryptocurrency Computer Repair Virtual Desktop Employees Integration Word Data storage LiFi User Tip Modem Mobile Security Outlook Processor Machine Learning Money Holidays Humor Data Storage Safety Smart Technology Supply Chain Maintenance Video Conferencing Sports Managed Services Provider Antivirus Mouse Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads iPhone Customer Relationship Management Licensing Robot Vulnerabilities Entertainment Trends Supply Chain Management Alt Codes Downtime Unified Threat Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence User Typing Organization Network Congestion Social Networking Legislation Shortcuts Ransmoware Google Drive User Error Fileless Malware Digital Security Cameras Knowledge Smart Devices Content Remote Working IP Address Wearable Technology Memory Vendors Point of Sale Health IT 5G Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Google Docs Unified Communications Directions Videos Experience Assessment Electronic Health Records Running Cable Tech Support Wasting Time Threats Recovery Bitcoin Network Management Google Wallet Monitors Trend Micro Hard Drives Specifications Security Cameras Workplace Strategies Domains Fraud Meta Microchip Internet Exlporer Software as a Service Laptop Websites Username Managing Costs Amazon Windows 8 Drones eCommerce Refrigeration Black Friday SSID Public Speaking Virtual Assistant Outsource IT SharePoint Electronic Medical Records Database Surveillance Halloween Lithium-ion battery IT Technicians Virtual Machine Environment Media Entrepreneur Lenovo Proxy Server Reviews Writing Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Virtual Reality Tactics Development Scary Stories Private Cloud Mirgation Hypervisor Displays Hacks Server Management Superfish Identity Theft Shopping Fun Nanotechnology Optimization Undo PowerPoint Language Employer/Employee Relationships Outsourcing Deep Learning Twitter Addiction Error Management PCI DSS Chatbots Navigation Education Gig Economy Social Engineering Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Regulations Compliance Identity Application Evernote Paperless Mobile Computing Tablet Bookmark Search Smart Tech Memes Co-managed IT IBM Alerts SQL Server Technology Care Best Practice Alert Download Net Neutrality Buisness File Sharing Financial Data Dark Data History Business Communications Managed IT Legal IT solutions Browsers Smartwatch How To Connectivity IT Break Fix Scams Upload Procurement Azure Hybrid Work Business Growth Notifications Travel Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Techology Google Maps CES Cortana IoT Communitications Competition

Blog Archive