Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones VoIP AI Business Management Data Recovery Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Automation Facebook Artificial Intelligence Information Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship Spam Encryption IT Support Office Windows 10 Business Continuity Government Data Management Wi-Fi Windows 10 Business Technology Blockchain Virtualization Bandwidth Vendor Apps Data Security Mobile Office Two-factor Authentication Networking Employer-Employee Relationship Apple App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome Budget Applications How To BDR Hacker Avoiding Downtime Conferencing Computing Marketing Information Technology Access Control Office 365 WiFi HIPAA Router Storage Password Bring Your Own Device Managed IT Services Help Desk Computers 2FA Healthcare Operating System Website Virtual Private Network Risk Management Health Analytics Office Tips Augmented Reality Retail Big Data Scam Social Data loss Customer Service Patch Management Monitoring Save Money Remote Monitoring Going Green Windows 11 End of Support Vulnerability Remote Workers Vendor Management Physical Security Cybercrime Excel Display Telephone Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Firewall Cooperation Microsoft 365 Solutions Document Management The Internet of Things Sports Holidays Mouse Modem User Tip Processor Data Storage Mobile Security Customer Relationship Management Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Smart Technology Hacking Presentation Saving Time Settings IT Management Printing Supply Chain Wireless Technology Wireless Content Filtering iPhone VPN Meetings Managed IT Service YouTube Downloads Vulnerabilities Cryptocurrency Computer Repair Word Licensing Images 101 Entertainment Multi-Factor Authentication Mobility Virtual Desktop LiFi Data storage Machine Learning Data Privacy Safety Outlook Telephone System Cost Management Money Employees Integration Humor Maintenance Antivirus Deep Learning Social Engineering Vendors Surveillance Specifications Application Virtual Assistant Microchip Internet Exlporer Remote Computing Fraud Be Proactive Virtual Machine Workforce IBM Medical IT Username Education Reviews Threats Development Black Friday Transportation Tablet Mobile Computing Database Alert Workplace Strategies Hypervisor Meta Search Optimization PowerPoint Managed IT File Sharing Shopping IT Technicians Dark Data Best Practice Cookies How To Amazon Cyber Monday Employer/Employee Relationships Proxy Server Navigation Tactics Notifications Buisness PCI DSS Hotspot Competition Outsource IT Legal Travel IT solutions Gig Economy Mirgation Google Maps Business Growth Nanotechnology Environment Internet Service Provider Media Teamwork Techology Evernote Addiction Regulations Compliance Language Small Businesses Cortana Memes User Management Unified Threat Management Chatbots Alt Codes Screen Reader Displays Net Neutrality Distributed Denial of Service SQL Server Unified Threat Management Service Level Agreement Downtime Financial Data Computing Infrastructure History Identity Network Congestion Outsourcing IP Address IT Hosted Solution Smartwatch Bookmark Typing Smart Tech Procurement Azure User Error Tech Download Telework Alerts Workplace Cyber security CES Hiring/Firing Knowledge Communitications Recovery Google Drive Point of Sale Browsers Connectivity Supply Chain Management Break Fix Paperless Hard Drives Term Network Management Upload Tech Support FinTech Co-managed IT Domains 5G Unified Communications Monitors Technology Care Experience IT Assessment Multi-Factor Security Google Docs Social Network Bitcoin IoT Running Cable Flexibility Dark Web Business Communications Refrigeration Value Google Wallet Trends Websites Organization Scams Public Speaking Digital Security Cameras Regulations Hybrid Work Lithium-ion battery Smart Devices Google Calendar Customer Resource management Data Analysis Windows 8 Star Wars Electronic Medical Records Laptop Remote Working Microsoft Excel Human Resources Memory SharePoint Entrepreneur Data Breach Google Play Drones Gamification Staff Cables Videos Social Networking Writing Electronic Health Records Legislation Lenovo Fileless Malware Virtual Reality Halloween Google Apps Undo Wasting Time Trend Micro Security Cameras Server Management Content Private Cloud Wearable Technology IT Maintenance Motherboard Business Intelligence Software as a Service Comparison Superfish Health IT Identity Theft Directions Hacks Assessment Twitter Scary Stories Permissions Shortcuts Managing Costs Fun eCommerce SSID Error Ransmoware

Blog Archive