Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Managed Service Smartphone Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Facebook Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Covid-19 Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Blockchain Windows 10 Business Technology Virtualization Wi-Fi Mobile Office Vendor Apps Two-factor Authentication Data Security BYOD Budget Managed Services Voice over Internet Protocol Apple Mobile Device Management App Gmail Tip of the week Networking Employer-Employee Relationship Chrome Avoiding Downtime Marketing HIPAA Applications Access Control WiFi Computing Conferencing Information Technology How To BDR Office 365 Hacker Storage Password Website Virtual Private Network Bring Your Own Device Router Healthcare Health Help Desk Operating System Retail Big Data Risk Management Managed IT Services 2FA Analytics Office Tips Augmented Reality Computers Vendor Management Physical Security Remote Workers Display Printer Paperless Office Infrastructure Firewall Going Green Free Resource Project Management Document Management Windows 7 Monitoring The Internet of Things Cybercrime Microsoft 365 Scam Social Solutions Data loss Telephone Windows 11 Customer Service Cooperation Patch Management Excel Save Money Remote Monitoring Vulnerability End of Support Video Conferencing Telephone System Managed Services Provider Cost Management Wireless Technology IT Management VPN Meetings Virtual Machines Professional Services Sports Mouse Computer Repair Administration Word iPhone Data Privacy Modem User Tip Processor Mobile Security Vulnerabilities Machine Learning Settings Images 101 Safety Printing Smart Technology Wireless Multi-Factor Authentication Mobility Content Filtering Saving Time YouTube Maintenance Antivirus Cryptocurrency Managed IT Service Employees Downloads Integration Virtual Desktop Data storage LiFi Customer Relationship Management Licensing Entertainment Supply Chain Holidays Robot Outlook Hacking Money Presentation Data Storage Humor Paperless Social Networking Scary Stories Unified Threat Management Legislation Employer/Employee Relationships Hacks Fileless Malware Navigation Co-managed IT Fun PCI DSS Gig Economy Network Congestion Technology Care Content Deep Learning IP Address Wearable Technology Business Communications Motherboard User Error Comparison Internet Service Provider Teamwork Health IT Directions Evernote Scams Assessment Education Permissions Regulations Compliance Recovery Point of Sale Memes Hybrid Work Mobile Computing Human Resources Hard Drives Specifications Net Neutrality SQL Server Tech Support History Microchip Cables Internet Exlporer Domains Fraud Search Network Management Financial Data Smartwatch IT Monitors Username Best Practice Google Apps Buisness Refrigeration Black Friday Procurement Azure Websites Cyber security Legal Tech IT Maintenance Database IT solutions Public Speaking Telework CES Communitications Business Intelligence Business Growth Lithium-ion battery IT Technicians Shortcuts Cookies SharePoint Cyber Monday Entrepreneur Supply Chain Management Electronic Medical Records Proxy Server Term Ransmoware Tactics Hotspot Cortana FinTech Lenovo IT Assessment Writing Vendors Alt Codes Mirgation Be Proactive Nanotechnology Downtime Undo Flexibility Virtual Reality Value Private Cloud Workforce Addiction Hosted Solution Language Server Management Organization Chatbots Superfish Digital Security Cameras Identity Theft Smart Devices Threats Management Typing Workplace Strategies Screen Reader Distributed Denial of Service Remote Working Twitter Memory Error Data Breach Google Drive Google Play Meta Service Level Agreement Computing Infrastructure Knowledge Identity Application Videos Electronic Health Records Social Engineering Amazon Bookmark Smart Tech 5G Remote Computing Wasting Time Trend Micro Google Docs Security Cameras Outsource IT Download Unified Communications IBM Alerts Experience Running Cable Tablet Software as a Service Environment Bitcoin Media Browsers Google Wallet Connectivity Break Fix Alert Managing Costs File Sharing eCommerce Dark Data SSID Small Businesses Upload Managed IT Laptop Multi-Factor Security Surveillance How To Virtual Assistant Displays Social Network Windows 8 Virtual Machine Drones IoT Competition Dark Web Notifications Reviews Travel Medical IT Outsourcing Trends Regulations Halloween Techology Google Calendar Google Maps Development Transportation Customer Resource management Hypervisor Data Analysis Workplace Star Wars Microsoft Excel User Shopping Unified Threat Management Optimization PowerPoint Hiring/Firing Gamification Staff

Blog Archive