Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade AI VoIP Business Management Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Artificial Intelligence Automation Facebook Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Vendor Mobile Office Apps Two-factor Authentication Data Security Chrome BYOD Budget Mobile Device Management Apple Gmail App Tip of the week Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Hacker Office 365 Avoiding Downtime HIPAA Marketing Applications Access Control WiFi Conferencing Computing Information Technology How To BDR Computers Analytics Office Tips Augmented Reality Website Router Storage Virtual Private Network Password Bring Your Own Device 2FA Health Help Desk Healthcare Retail Big Data Operating System Risk Management Managed IT Services Patch Management Save Money Remote Monitoring Solutions End of Support Vulnerability Vendor Management Physical Security Display Printer Windows 11 Paperless Office Firewall Infrastructure Monitoring Excel Going Green Document Management The Internet of Things Remote Workers Social Cybercrime Telephone Scam Data loss Free Resource Project Management Windows 7 Cooperation Customer Service Microsoft 365 Robot Telephone System Presentation Cost Management Outlook Wireless Technology Money Employees Humor IT Management Integration VPN Meetings Modem Word Sports User Tip Processor Holidays Mouse Computer Repair Mobile Security Data Storage Supply Chain Administration Video Conferencing Managed Services Provider Smart Technology Safety Virtual Machines Professional Services Machine Learning Saving Time Settings Printing Managed IT Service Wireless Maintenance iPhone Content Filtering Downloads Antivirus YouTube Vulnerabilities Licensing Data Privacy Cryptocurrency Customer Relationship Management Entertainment Images 101 Multi-Factor Authentication Mobility Virtual Desktop Data storage Hacking LiFi Laptop Legislation Remote Working Memory Vendors Windows 8 Travel Social Networking Data Breach Drones Google Maps User Google Play Be Proactive Techology Fileless Malware Videos Electronic Health Records Content Workforce Wearable Technology Halloween Comparison Health IT Wasting Time Threats Unified Threat Management Motherboard IP Address Trend Micro Assessment Security Cameras Workplace Strategies Permissions Unified Threat Management Directions Software as a Service Meta Scary Stories Network Congestion Specifications Managing Costs Amazon Hacks User Error Microchip eCommerce Internet Exlporer Recovery SSID Fraud Fun Surveillance Username Hard Drives Virtual Assistant Outsource IT Deep Learning Point of Sale Media Black Friday Domains Virtual Machine Environment Reviews Database Medical IT Education Development Network Management Refrigeration Transportation Small Businesses Tech Support IT Technicians Hypervisor Displays Mobile Computing Cookies Monitors Cyber Monday Proxy Server Public Speaking Shopping Lithium-ion battery Optimization Tactics PowerPoint Hotspot Search Employer/Employee Relationships Outsourcing Best Practice Websites Mirgation Entrepreneur Nanotechnology Navigation Buisness PCI DSS Gig Economy SharePoint Legal Addiction Workplace IT solutions Electronic Medical Records Language Internet Service Provider Management Undo Teamwork Hiring/Firing Business Growth Chatbots Screen Reader Evernote Paperless Writing Distributed Denial of Service Regulations Compliance Lenovo Memes Service Level Agreement Co-managed IT Virtual Reality Computing Infrastructure Cortana Net Neutrality Server Management SQL Server Technology Care Alt Codes Private Cloud Identity History Identity Theft Smart Tech Business Communications Downtime Financial Data Superfish Bookmark Smartwatch IT Download Application Scams Hosted Solution Twitter Alerts Procurement Azure Hybrid Work Typing Error Cyber security Connectivity Tech Human Resources Social Engineering Break Fix Telework Browsers IBM CES Communitications Google Drive Upload Cables Remote Computing Knowledge Multi-Factor Security Supply Chain Management Social Network Tablet IoT Term Google Apps Dark Web 5G FinTech IT Assessment Google Docs Trends IT Maintenance Unified Communications Alert Experience Running Cable Dark Data Google Calendar Flexibility Managed IT Customer Resource management Competition Value Business Intelligence Bitcoin File Sharing Regulations Google Wallet Star Wars Shortcuts How To Microsoft Excel Organization Data Analysis Digital Security Cameras Smart Devices Gamification Ransmoware Notifications Staff

Blog Archive