Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Training Compliance Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Managed Services Mobile Office Data Security BYOD Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing Managed IT Services How To BDR Operating System Router 2FA Virtual Private Network Risk Management Health Computers Help Desk Analytics Office Tips Healthcare Augmented Reality Website Retail Storage Password Bring Your Own Device Big Data Social Vendor Management Cybercrime Windows 11 Display Printer Excel Paperless Office Customer Service Infrastructure Monitoring Remote Workers Document Management Managed IT Service Free Resource Telephone Project Management Scam Windows 7 Data loss Firewall Microsoft 365 Cooperation Solutions The Internet of Things Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Content Filtering IT Management Holidays YouTube Meetings VPN Data Storage Cryptocurrency User Tip Modem Supply Chain Customer Relationship Management Processor Video Conferencing Computer Repair Mobile Security Managed Services Provider Virtual Machines Virtual Desktop Professional Services Hacking Data storage LiFi Presentation Smart Technology Outlook Machine Learning Wireless Technology Money Saving Time iPhone Humor Vulnerabilities Maintenance Data Privacy Sports Downloads Word Antivirus Mouse Images 101 Licensing Mobility Multi-Factor Authentication Entertainment Administration Safety Robot Employees Telephone System Cost Management Integration Settings Wireless Printing Application Unified Threat Management Directions Surveillance Hosted Solution Assessment Virtual Assistant Outsource IT Permissions Media Typing Virtual Machine Environment Medical IT Network Congestion Specifications IBM Reviews Google Drive User Error Microchip Development Internet Exlporer Transportation Small Businesses Knowledge Fraud Username Hypervisor Displays Optimization Point of Sale PowerPoint 5G Black Friday Shopping Google Docs Unified Communications Database Employer/Employee Relationships Outsourcing Experience Running Cable Tech Support IT Technicians Navigation Competition PCI DSS Bitcoin Network Management Google Wallet Proxy Server Cookies Workplace Monitors Cyber Monday Gig Economy Internet Service Provider Tactics Teamwork Hiring/Firing Hotspot Laptop Websites Mirgation Evernote Paperless Regulations Compliance Windows 8 Drones Memes Nanotechnology Co-managed IT User SharePoint Net Neutrality Addiction SQL Server Technology Care Electronic Medical Records Language Halloween Chatbots Business Communications Financial Data Management History Lenovo IT Screen Reader Scams Writing Distributed Denial of Service IP Address Smartwatch Procurement Service Level Agreement Azure Hybrid Work Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Tech Human Resources Telework Hacks Server Management Cyber security Recovery Superfish Bookmark Communitications Identity Theft Smart Tech Cables Fun CES Hard Drives Supply Chain Management Deep Learning Download Twitter Alerts Error Term Google Apps Domains FinTech Browsers IT Assessment Education Connectivity IT Maintenance Social Engineering Break Fix Refrigeration Flexibility Upload Value Business Intelligence Remote Computing Shortcuts Multi-Factor Security Public Speaking Organization Mobile Computing Social Network Smart Devices Tablet IoT Ransmoware Search Dark Web Lithium-ion battery Digital Security Cameras Remote Working Entrepreneur Best Practice Trends Memory Vendors Alert Buisness File Sharing Regulations Google Play Be Proactive Dark Data Google Calendar Managed IT Customer Resource management Data Breach Videos Legal Data Analysis Electronic Health Records IT solutions Star Wars Workforce How To Microsoft Excel Undo Business Growth Gamification Wasting Time Threats Notifications Staff Trend Micro Travel Social Networking Security Cameras Workplace Strategies Legislation Techology Fileless Malware Software as a Service Google Maps Meta Cortana Alt Codes Content Managing Costs Amazon Wearable Technology eCommerce Downtime Unified Threat Management Motherboard SSID Comparison Health IT

Blog Archive