Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Google Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Business Management Disaster Recovery Data Recovery VoIP Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Apps Data Security Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Gmail Chrome Budget Apple Networking Employer-Employee Relationship App BYOD Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing WiFi How To BDR HIPAA Hacker Router Virtual Private Network Risk Management Website Healthcare Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Computers Operating System Physical Security Display Remote Workers Printer Paperless Office Infrastructure Monitoring Firewall Free Resource Project Management Windows 7 Document Management Microsoft 365 The Internet of Things Telephone Solutions Scam Data loss Social Cooperation Windows 11 Going Green Patch Management Save Money Remote Monitoring Customer Service Vulnerability End of Support Vendor Management Excel Cybercrime Virtual Machines Professional Services VPN YouTube Meetings Wireless Technology Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor iPhone Virtual Desktop LiFi Word Data storage Smart Technology Vulnerabilities Data Privacy Outlook Machine Learning Images 101 Money Saving Time Humor Multi-Factor Authentication Mobility Safety Managed IT Service Maintenance Antivirus Sports Downloads Mouse Licensing Employees Integration Entertainment Administration Customer Relationship Management Holidays Telephone System Robot Cost Management Settings Data Storage Hacking Supply Chain Printing Wireless Content Filtering Presentation Video Conferencing IT Management Managed Services Provider Network Congestion Specifications Workplace Gig Economy Internet Exlporer Knowledge Fraud Internet Service Provider Teamwork Hiring/Firing Google Drive User Error Microchip Evernote Paperless Username IP Address Regulations Compliance 5G Black Friday Memes Co-managed IT Point of Sale Unified Communications Database Experience Net Neutrality SQL Server Technology Care Google Docs Business Communications Bitcoin Network Management Running Cable Tech Support IT Technicians Financial Data Recovery History Smartwatch Monitors Cyber Monday Hard Drives IT Scams Google Wallet Proxy Server Cookies Tactics Hotspot Domains Procurement Azure Hybrid Work Cyber security Tech Human Resources Windows 8 Laptop Websites Mirgation Telework CES Refrigeration Communitications Cables Drones Nanotechnology Addiction Electronic Medical Records Language Public Speaking Supply Chain Management SharePoint Term Google Apps Management Halloween Chatbots Lithium-ion battery FinTech Writing Distributed Denial of Service IT Assessment Entrepreneur IT Maintenance Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Flexibility Value Business Intelligence Shortcuts Hacks Server Management Scary Stories Private Cloud Identity Organization Digital Security Cameras Fun Undo Smart Devices Ransmoware Superfish Bookmark Identity Theft Smart Tech Deep Learning Download Twitter Alerts Remote Working Memory Vendors Data Breach Google Play Be Proactive Error Videos Social Engineering Break Fix Electronic Health Records Workforce Browsers Education Connectivity Upload Remote Computing Wasting Time Threats Application Trend Micro Security Cameras Workplace Strategies Mobile Computing Social Network Multi-Factor Security Search Dark Web Software as a Service Meta Tablet IoT Best Practice Trends Alert IBM Managing Costs Amazon eCommerce SSID Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Surveillance Virtual Assistant Outsource IT Legal Data Analysis IT solutions Star Wars Media Business Growth Gamification Notifications Staff Virtual Machine Environment Medical IT Travel Social Networking Reviews Legislation Cortana Competition Development Transportation Small Businesses Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Hypervisor Displays Optimization PowerPoint Health IT Downtime Unified Threat Management Motherboard Shopping Comparison Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Unified Threat Management Directions Navigation Typing PCI DSS User

Blog Archive