Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade Smartphones AI VoIP Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Wi-Fi Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Tip of the week Networking Chrome Managed Services Mobile Device Management Voice over Internet Protocol Budget Gmail BYOD Apple App HIPAA Computing Applications Information Technology Hacker Avoiding Downtime Office 365 How To Marketing Conferencing BDR WiFi Access Control 2FA Operating System Router Retail Risk Management Computers Help Desk Managed IT Services Office Tips Website Analytics Augmented Reality Storage Password Healthcare Bring Your Own Device Virtual Private Network Big Data Health Solutions Cybercrime Excel Document Management Customer Service Monitoring Scam Data loss Patch Management Save Money Telephone Remote Workers Remote Monitoring Firewall Vulnerability End of Support Vendor Management Cooperation Physical Security Free Resource The Internet of Things Project Management Display Windows 7 Printer Going Green Social Windows 11 Paperless Office Microsoft 365 Infrastructure Settings Printing Supply Chain Wireless Content Filtering Machine Learning Customer Relationship Management YouTube Employees Modem Integration User Tip Processor Mobile Security Cryptocurrency Hacking Maintenance Presentation Antivirus Virtual Desktop Holidays Smart Technology Data storage Wireless Technology LiFi Data Storage Video Conferencing Outlook Saving Time Data Privacy Managed Services Provider Professional Services Money Virtual Machines Managed IT Service Humor Word Robot Downloads Sports Licensing iPhone Mouse IT Management Entertainment VPN Meetings Safety Vulnerabilities Administration Computer Repair Telephone System Images 101 Cost Management Mobility Multi-Factor Authentication Displays Assessment Remote Working Permissions Websites Memory IBM Alt Codes Directions Google Play Downtime Data Breach Electronic Health Records Specifications Electronic Medical Records Hosted Solution SharePoint Outsourcing Videos Microchip Internet Exlporer Fraud Wasting Time Typing Writing Security Cameras Username Lenovo Workplace Trend Micro Software as a Service Black Friday Virtual Reality Google Drive Competition Hiring/Firing Knowledge Database Server Management Paperless Private Cloud Managing Costs SSID Superfish Co-managed IT 5G IT Technicians Identity Theft eCommerce Cookies Surveillance Cyber Monday Twitter Virtual Assistant Google Docs Unified Communications Proxy Server Technology Care Experience Bitcoin User Running Cable Tactics Business Communications Hotspot Error Virtual Machine Social Engineering Medical IT Google Wallet Scams Reviews Mirgation Nanotechnology Development Remote Computing Transportation Hybrid Work Windows 8 Laptop Addiction Human Resources Language Hypervisor IP Address PowerPoint Drones Management Cables Shopping Chatbots Tablet Optimization Screen Reader Distributed Denial of Service Alert Employer/Employee Relationships Recovery Halloween Service Level Agreement Managed IT Google Apps PCI DSS Computing Infrastructure File Sharing Dark Data Navigation How To Hard Drives IT Maintenance Gig Economy Identity Smart Tech Internet Service Provider Notifications Teamwork Domains Bookmark Business Intelligence Hacks Scary Stories Download Shortcuts Regulations Compliance Alerts Travel Evernote Refrigeration Techology Ransmoware Fun Google Maps Memes Connectivity Net Neutrality Break Fix SQL Server Public Speaking Deep Learning Browsers Vendors Upload Be Proactive Financial Data Unified Threat Management History Lithium-ion battery IT Multi-Factor Security Education Social Network Unified Threat Management Entrepreneur Workforce Smartwatch IoT Procurement Dark Web Azure Threats Tech Mobile Computing Trends Workplace Strategies Telework Cyber security Network Congestion Communitications Google Calendar Undo Customer Resource management User Error Meta CES Search Regulations Amazon Star Wars Supply Chain Management Microsoft Excel Best Practice Data Analysis Term Buisness Gamification FinTech Staff Point of Sale IT Assessment Legislation Legal IT solutions Outsource IT Social Networking Environment Network Management Media Flexibility Tech Support Value Business Growth Fileless Malware Application Content Organization Wearable Technology Monitors Smart Devices Comparison Health IT Small Businesses Digital Security Cameras Cortana Motherboard

Blog Archive