Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Managed Service Saving Money Cybersecurity Communication Data Backup Smartphone Android Data Recovery AI Disaster Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Artificial Intelligence Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Bandwidth Business Technology Windows 10 Data Security Apps Two-factor Authentication Vendor Mobile Office WiFi Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Apple Tip of the week Gmail App Managed Services Voice over Internet Protocol Computing How To Information Technology BDR Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Conferencing 2FA Healthcare Operating System Big Data Managed IT Services Risk Management Analytics Office Tips Computers Augmented Reality Router Virtual Private Network Website Storage Password Bring Your Own Device Health Help Desk Retail The Internet of Things Telephone Scam Cybercrime Data loss Excel Social Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Solutions Physical Security Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Going Green Windows 11 Remote Workers Settings Maintenance Downloads Printing Antivirus Wireless Supply Chain Content Filtering iPhone Licensing YouTube Entertainment Vulnerabilities Cryptocurrency Images 101 Customer Relationship Management Multi-Factor Authentication Robot Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Hacking Data Privacy Presentation Outlook IT Management Meetings Money VPN Employees Wireless Technology Integration Humor Modem User Tip Processor Computer Repair Mobile Security Sports Holidays Mouse Word Data Storage Smart Technology Administration Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Safety Managed IT Service Alt Codes Displays Download Net Neutrality Twitter Alerts SQL Server Error History Downtime Financial Data Browsers Smartwatch Outsourcing Connectivity IT Social Engineering Break Fix Hosted Solution Typing Upload Procurement Remote Computing Azure Cyber security Application Multi-Factor Security Tech Social Network Telework Workplace CES Knowledge Hiring/Firing Tablet IoT Communitications Dark Web Google Drive Trends Supply Chain Management Paperless IBM Alert File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech 5G Co-managed IT Data Analysis Experience Technology Care Star Wars IT Assessment How To Microsoft Excel Google Docs Unified Communications Bitcoin Running Cable Gamification Flexibility Business Communications Notifications Staff Value Scams Travel Social Networking Legislation Google Wallet Organization Techology Fileless Malware Digital Security Cameras Hybrid Work Google Maps Smart Devices Competition Windows 8 Laptop Content Remote Working Human Resources Wearable Technology Memory Cables Unified Threat Management Motherboard Data Breach Comparison Google Play Drones Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions User Halloween Google Apps Wasting Time IT Maintenance Trend Micro Network Congestion Specifications Security Cameras User Error Microchip Business Intelligence Internet Exlporer Software as a Service Fraud Hacks Scary Stories Username Shortcuts IP Address Managing Costs Fun Ransmoware Point of Sale eCommerce Black Friday SSID Deep Learning Vendors Database Surveillance Virtual Assistant Recovery Network Management Be Proactive Tech Support IT Technicians Virtual Machine Workforce Cookies Hard Drives Monitors Cyber Monday Medical IT Education Proxy Server Reviews Threats Tactics Development Domains Hotspot Transportation Mobile Computing Workplace Strategies Websites Mirgation Hypervisor Search Meta Nanotechnology Optimization Refrigeration PowerPoint Shopping Best Practice SharePoint Amazon Addiction Public Speaking Electronic Medical Records Language Employer/Employee Relationships Navigation Buisness Management PCI DSS Lithium-ion battery Chatbots Lenovo Gig Economy Outsource IT Screen Reader Writing Distributed Denial of Service Legal Entrepreneur IT solutions Business Growth Environment Service Level Agreement Internet Service Provider Media Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Evernote Server Management Regulations Compliance Superfish Bookmark Cortana Small Businesses Identity Theft Smart Tech Memes Undo

Blog Archive