Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Mobile Device Ransomware Quick Tips Cybersecurity Microsoft Workplace Strategy Small Business Data Backup Communication Passwords Smartphone Saving Money VoIP Android Backup Business Management Smartphones Mobile Devices communications Disaster Recovery Upgrade Managed Service Data Recovery Social Media Managed IT Services Browser Microsoft Office Windows Tech Term Network Internet of Things Remote Current Events Automation Facebook Artificial Intelligence Productivity Cloud Computing Covid-19 Server Managed Service Provider Remote Work Miscellaneous Gadgets Holiday Information Outsourced IT Encryption AI Employee/Employer Relationship Spam Windows 10 Government Office Compliance Training Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Virtualization Bandwidth Mobile Office Two-factor Authentication Apps Data Security Managed Services Apple Voice over Internet Protocol App Mobile Device Management Gmail Vendor Chrome Networking Budget Employer-Employee Relationship Conferencing Hacker BYOD Avoiding Downtime Marketing Access Control Computing Information Technology Tip of the week Applications Office 365 WiFi How To BDR Bring Your Own Device Computers Healthcare Virtual Private Network Website Operating System Health Risk Management HIPAA Router Retail Analytics Office Tips Big Data IT Support Augmented Reality Managed IT Services Help Desk Storage Password Patch Management Save Money Remote Monitoring Customer Service End of Support Remote Workers Vulnerability Vendor Management Telephone Going Green Display Printer Cooperation Free Resource Project Management Windows 7 Paperless Office Infrastructure Cybercrime Microsoft 365 Firewall Solutions Document Management The Internet of Things Scam Data loss Social Windows 11 2FA Monitoring Excel Robot Mouse Saving Time Virtual Machines Professional Services Administration Managed IT Service Hacking Presentation IT Management Downloads VPN iPhone Meetings Wireless Technology Physical Security Licensing Entertainment Vulnerabilities Computer Repair Settings Data Privacy Wireless Printing Images 101 Content Filtering Word Telephone System YouTube Multi-Factor Authentication Mobility Cost Management Cryptocurrency Machine Learning Employees Virtual Desktop Safety Data storage LiFi Integration Maintenance User Tip Modem Antivirus Outlook Processor Mobile Security Money Holidays Humor Data Storage Smart Technology Supply Chain Video Conferencing Sports Managed Services Provider Customer Relationship Management Gig Economy Education Screen Reader Distributed Denial of Service Workplace Travel Google Maps Competition Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Mobile Computing Regulations Compliance Bookmark Smart Tech Memes Search Co-managed IT Unified Threat Management Best Practice Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care Buisness History Business Communications User Financial Data Network Congestion Legal Browsers Smartwatch IT solutions Connectivity IT Break Fix Scams Business Growth Upload Procurement User Error Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources IP Address Social Network Telework CES IoT Communitications Cortana Dark Web Cables Point of Sale Alt Codes Trends Supply Chain Management Downtime Regulations Network Management Google Calendar Term Google Apps Tech Support Recovery Customer Resource management FinTech Monitors Data Analysis Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Hard Drives Domains Typing Gamification Flexibility Staff Value Business Intelligence Organization Social Networking Legislation Shortcuts Websites Refrigeration Google Drive Fileless Malware Digital Security Cameras Smart Devices Knowledge Ransmoware Wearable Technology Memory Vendors Public Speaking Electronic Medical Records Content Remote Working SharePoint Health IT Motherboard Data Breach 5G Comparison Google Play Be Proactive Lithium-ion battery Writing Entrepreneur Google Docs Directions Videos Unified Communications Assessment Electronic Health Records Lenovo Experience Permissions Workforce Running Cable Wasting Time Threats Virtual Reality Bitcoin Google Wallet Trend Micro Server Management Specifications Security Cameras Workplace Strategies Private Cloud Undo Microchip Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Laptop Managing Costs Amazon Twitter Windows 8 Username Drones eCommerce Black Friday SSID Error Social Engineering Database Surveillance Virtual Assistant Outsource IT Halloween IT Technicians Virtual Machine Environment Media Remote Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Application Tablet Tactics Development Hotspot Transportation Small Businesses Scary Stories Mirgation Hypervisor Displays IBM Alert Hacks Dark Data Shopping Nanotechnology Optimization Managed IT Fun PowerPoint File Sharing How To Deep Learning Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Notifications Management PCI DSS

Blog Archive