Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP AI Business Management Smartphones communications Mobile Devices Data Recovery Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Government Business Continuity Data Management Blockchain Windows 10 Business Technology Virtualization Wi-Fi Bandwidth Mobile Office Vendor Apps Two-factor Authentication Data Security BYOD Mobile Device Management Apple Gmail App Tip of the week Employer-Employee Relationship Networking Managed Services Chrome Voice over Internet Protocol Budget Marketing HIPAA Access Control Applications WiFi Computing Information Technology Conferencing Office 365 How To Hacker BDR Avoiding Downtime Storage Website Password Bring Your Own Device Virtual Private Network Router Health Operating System Big Data 2FA Risk Management Retail Help Desk Managed IT Services Analytics Office Tips Computers Augmented Reality Healthcare Remote Monitoring Cooperation End of Support Vulnerability Vendor Management Free Resource Project Management Physical Security Windows 7 Firewall Display Printer Microsoft 365 Paperless Office Going Green Infrastructure The Internet of Things Solutions Cybercrime Document Management Social Windows 11 Monitoring Excel Scam Data loss Customer Service Telephone Remote Workers Patch Management Save Money Data Privacy iPhone Sports Mouse IT Management Vulnerabilities Word Meetings Telephone System VPN Cost Management Administration Images 101 Multi-Factor Authentication Computer Repair Mobility Safety Settings Wireless User Tip Printing Modem Employees Mobile Security Content Filtering Processor Machine Learning Integration YouTube Cryptocurrency Smart Technology Supply Chain Maintenance Holidays Antivirus Customer Relationship Management Virtual Desktop Saving Time Data Storage Data storage LiFi Video Conferencing Managed Services Provider Hacking Managed IT Service Outlook Virtual Machines Presentation Professional Services Downloads Money Humor Wireless Technology Licensing Robot Entertainment Smartwatch Trends IT Deep Learning Recovery Google Calendar Customer Resource management Google Apps Procurement Regulations Unified Threat Management Azure Unified Threat Management Telework Star Wars Cyber security Education Hard Drives Microsoft Excel Tech Data Analysis IT Maintenance Business Intelligence CES Gamification Communitications Domains Staff Legislation Network Congestion Shortcuts Supply Chain Management Mobile Computing Social Networking User Error FinTech Refrigeration Term Search Fileless Malware Ransmoware Vendors Content IT Assessment Best Practice Public Speaking Wearable Technology Point of Sale Value Buisness Comparison Health IT Be Proactive Flexibility Lithium-ion battery Motherboard Organization Legal Assessment IT solutions Permissions Entrepreneur Directions Workforce Threats Digital Security Cameras Network Management Smart Devices Business Growth Tech Support Memory Specifications Monitors Workplace Strategies Remote Working Internet Exlporer Data Breach Undo Fraud Google Play Cortana Microchip Meta Amazon Videos Username Electronic Health Records Alt Codes Websites Wasting Time Downtime Black Friday SharePoint Database Trend Micro Hosted Solution Electronic Medical Records Security Cameras Outsource IT Environment Media Software as a Service Typing IT Technicians Managing Costs Application Cyber Monday Writing Proxy Server Lenovo Cookies Google Drive Tactics eCommerce Hotspot Virtual Reality SSID Knowledge Small Businesses Displays Server Management Surveillance IBM Mirgation Private Cloud Virtual Assistant Identity Theft Virtual Machine 5G Superfish Nanotechnology Reviews Google Docs Addiction Unified Communications Language Twitter Medical IT Experience Outsourcing Management Development Bitcoin Chatbots Error Transportation Running Cable Hypervisor Distributed Denial of Service Social Engineering Workplace Google Wallet Screen Reader Shopping Service Level Agreement Optimization Competition Computing Infrastructure Remote Computing PowerPoint Hiring/Firing Paperless Windows 8 Identity Employer/Employee Relationships Laptop Tablet Navigation Bookmark Co-managed IT PCI DSS Drones Smart Tech Technology Care Gig Economy Download Alerts Alert Dark Data Business Communications Managed IT Internet Service Provider File Sharing Teamwork Halloween User Break Fix How To Evernote Browsers Scams Regulations Compliance Connectivity Hybrid Work Upload Memes Notifications Social Network Human Resources Net Neutrality Hacks IP Address Travel SQL Server Scary Stories Multi-Factor Security IoT Google Maps History Dark Web Fun Cables Techology Financial Data

Blog Archive