Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Things to Consider Before Upgrading to Windows 10

b2ap3_thumbnail_why_not_windows_10_400.jpgWe all know that Windows 10 is the hot new operating system released by Microsoft this past July, with slick new features and (gasp!) the Start menu. We’ve been writing a lot of articles about how great and functional the new operating system is. Keep in mind that Windows 10 is a great operating system, but you should also take note of these four shortcomings when considering whether you should immediately upgrade or not.

Continue reading
0 Comments

Now You Can Blame Hackers for Your Next Speeding Ticket

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

Continue reading
0 Comments

Things Get Ugly When Hackers Turn on Each Other [VIDEO]

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

Continue reading
0 Comments

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Western Kentucky small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Cybersecurity Microsoft Workplace Strategy Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Smartphones Android VoIP Business Management Mobile Devices communications Upgrade Disaster Recovery Managed Service Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Productivity Automation Artificial Intelligence Facebook Current Events Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Information Holiday Outsourced IT Encryption Spam AI Employee/Employer Relationship Windows 10 Government Office Training Business Continuity Data Management Compliance Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Data Security Apps Two-factor Authentication Mobile Office Employer-Employee Relationship Vendor Chrome Mobile Device Management Budget Gmail Managed Services Voice over Internet Protocol Apple Networking App How To BDR Computing Information Technology BYOD Hacker Applications Avoiding Downtime Office 365 Access Control Marketing Tip of the week Conferencing WiFi Operating System Risk Management HIPAA Computers Router Virtual Private Network Office Tips Analytics Website IT Support Health Augmented Reality Help Desk Storage Password Retail Bring Your Own Device Healthcare Managed IT Services Big Data Going Green Social Cooperation Free Resource Project Management Windows 7 Patch Management Cybercrime Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure 2FA Monitoring Excel Firewall Document Management Remote Workers Telephone Scam The Internet of Things Data loss Data Privacy Images 101 Settings Printing Wireless Multi-Factor Authentication Robot Mobility Telephone System Content Filtering Customer Relationship Management Cost Management YouTube Cryptocurrency Hacking IT Management Meetings Presentation VPN Employees Physical Security Integration Virtual Desktop Modem Data storage LiFi Wireless Technology User Tip Processor Computer Repair Mobile Security Holidays Outlook Money Data Storage Word Smart Technology Supply Chain Humor Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Sports Mouse Managed IT Service Safety Maintenance Downloads Administration Antivirus iPhone Licensing Entertainment Vulnerabilities Application Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Cortana Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Alt Codes IBM Downtime Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Hosted Solution Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Typing Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Google Drive Competition Health IT Knowledge Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce 5G Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Experience User Error Microchip Running Cable User Internet Exlporer Software as a Service Fraud Meta Bitcoin Google Wallet Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Windows 8 IP Address Laptop Database Surveillance Virtual Assistant Outsource IT Media Drones Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Halloween Recovery Tactics Development Hotspot Transportation Small Businesses Hard Drives Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Domains Shopping Hacks SharePoint Scary Stories Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Refrigeration Management PCI DSS Fun Chatbots Screen Reader Writing Distributed Denial of Service Workplace Deep Learning Public Speaking Lenovo Gig Economy Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Education Server Management Regulations Compliance Entrepreneur Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Mobile Computing Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Undo Financial Data Search Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Best Practice Buisness Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Legal IT solutions Social Network Telework CES Tablet IoT Communitications Dark Web Cables Business Growth

Blog Archive