Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Quick Tips Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management AI Smartphones VoIP Data Recovery Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Information Facebook Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Wi-Fi Blockchain Windows 10 Business Technology Apps Data Security Mobile Office Two-factor Authentication Vendor Chrome Budget Employer-Employee Relationship Networking Apple App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Gmail Tip of the week How To Conferencing BDR Hacker Avoiding Downtime Marketing Computing Information Technology Access Control HIPAA Applications Office 365 WiFi Analytics Office Tips Retail Big Data Augmented Reality Help Desk Storage Managed IT Services Password 2FA Bring Your Own Device Computers Website Operating System Virtual Private Network Healthcare Risk Management Health Router Social Solutions Monitoring Scam Data loss Windows 11 Customer Service Excel Patch Management Save Money Telephone Remote Monitoring Vulnerability End of Support Vendor Management Going Green Cooperation Physical Security Remote Workers Display Cybercrime Printer Firewall Paperless Office Infrastructure Free Resource Project Management Windows 7 The Internet of Things Document Management Microsoft 365 Outlook Mobile Security Processor Maintenance Money Humor Antivirus Employees Integration Smart Technology Sports Customer Relationship Management Saving Time Mouse Supply Chain Holidays Administration Hacking Managed IT Service Data Storage Presentation Robot Downloads Video Conferencing Licensing Managed Services Provider Wireless Technology Virtual Machines Professional Services IT Management Entertainment VPN Settings Meetings Wireless Printing Content Filtering Word Computer Repair Telephone System Data Privacy iPhone YouTube Cost Management Cryptocurrency Vulnerabilities Virtual Desktop Safety Images 101 Data storage LiFi Machine Learning Multi-Factor Authentication Mobility User Tip Modem Memory Server Management Workplace Strategies Private Cloud Database Remote Working IT Technicians Data Breach Superfish Meta Google Play Halloween Identity Theft Application Twitter Proxy Server Videos Cookies Electronic Health Records Cyber Monday Amazon Hotspot Wasting Time Error Tactics Social Engineering Mirgation Trend Micro Hacks Outsource IT Security Cameras Scary Stories IBM Media Fun Remote Computing Nanotechnology Software as a Service Environment Language Managing Costs Deep Learning Addiction Management Chatbots eCommerce Small Businesses SSID Tablet Virtual Assistant Education Alert Screen Reader Surveillance Distributed Denial of Service Displays Computing Infrastructure Virtual Machine Managed IT Competition File Sharing Dark Data Service Level Agreement How To Reviews Identity Mobile Computing Outsourcing Medical IT Transportation Search Notifications Bookmark Smart Tech Development Alerts Hypervisor Best Practice Workplace Travel Download User Shopping Optimization Techology Hiring/Firing PowerPoint Buisness Google Maps Employer/Employee Relationships IT solutions Paperless Browsers Connectivity Legal Break Fix Upload PCI DSS Business Growth Co-managed IT Navigation Unified Threat Management Social Network Gig Economy Unified Threat Management Multi-Factor Security Technology Care IP Address Dark Web Teamwork Business Communications Cortana IoT Internet Service Provider Trends Regulations Compliance Alt Codes Scams Evernote Network Congestion Recovery Customer Resource management Regulations Memes User Error Google Calendar Hybrid Work Downtime Microsoft Excel SQL Server Hosted Solution Human Resources Hard Drives Data Analysis Star Wars Net Neutrality Gamification Financial Data Staff History Typing Cables Domains Point of Sale Smartwatch Social Networking IT Legislation Google Drive Azure Network Management Google Apps Knowledge Refrigeration Tech Support Fileless Malware Procurement Monitors Content Telework Wearable Technology Cyber security IT Maintenance Tech Public Speaking Lithium-ion battery 5G Health IT CES Motherboard Communitications Comparison Business Intelligence Google Docs Permissions Unified Communications Shortcuts Experience Websites Directions Entrepreneur Assessment Supply Chain Management FinTech Bitcoin Ransmoware Term Running Cable Electronic Medical Records IT Assessment Google Wallet SharePoint Specifications Vendors Fraud Value Be Proactive Undo Microchip Internet Exlporer Flexibility Writing Username Organization Windows 8 Lenovo Workforce Laptop Virtual Reality Digital Security Cameras Smart Devices Drones Black Friday Threats

Blog Archive