Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Change Your Mouse Pointer in Windows 10

b2ap3_thumbnail_mouse_pointers_400.jpgThe mouse is a critical part of navigating your workstation. Without it, you’d struggle to open applications, move around Office documents, create images, and countless other functions. Just like many other features in Windows 10, you can customize how your mouse pointer looks and functions, making it much easier to maneuver around your system.

Continue reading
0 Comments

Tip of the Week: View Your Current Google Sessions for Optimal Security

b2ap3_thumbnail_google_sessions_400.jpgLogging into an account only to find out that you’ve been hacked can be a real hassle. If you’re wondering why and how this could have happened, you’re in luck; some accounts, like Google, record when and how the account is accessed, and finding out how is as easy as checking out your security settings. Here’s how you can see who is accessing your account, and how.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Upgrade Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Blockchain Virtualization Wi-Fi Business Technology Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Budget WiFi Apple BYOD App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Chrome Networking How To BDR HIPAA Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 Storage Password Bring Your Own Device Router Big Data Virtual Private Network 2FA Help Desk Operating System Health Computers Risk Management Website Retail Healthcare Analytics Office Tips Augmented Reality Managed IT Services Free Resource Project Management Windows 7 Patch Management The Internet of Things Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Social Physical Security Going Green Windows 11 Display Printer Monitoring Customer Service Paperless Office Excel Infrastructure Cybercrime Document Management Telephone Remote Workers Scam Cooperation Data loss Firewall Telephone System Cost Management Safety Images 101 Sports Mouse Robot Multi-Factor Authentication Mobility Administration User Tip Modem IT Management VPN Processor Meetings Employees Mobile Security Integration Customer Relationship Management Settings Computer Repair Wireless Smart Technology Printing Supply Chain Content Filtering Holidays Hacking Presentation YouTube Saving Time Data Storage Video Conferencing Cryptocurrency Wireless Technology Machine Learning Managed Services Provider Managed IT Service Professional Services Virtual Machines Downloads Virtual Desktop Data storage LiFi Licensing Maintenance Antivirus Entertainment Word iPhone Outlook Data Privacy Money Vulnerabilities Humor Alert Entrepreneur Supply Chain Management Social Networking Legislation Hacks Shortcuts Scary Stories Ransmoware Managed IT Fileless Malware File Sharing FinTech Fun Dark Data Term Wearable Technology Vendors Deep Learning Content How To IT Assessment Health IT Notifications Flexibility Motherboard Value Comparison Be Proactive Undo Workforce Education Directions Travel Organization Assessment Permissions Threats Techology Google Maps Digital Security Cameras Smart Devices Remote Working Memory Specifications Mobile Computing Workplace Strategies Meta Microchip Unified Threat Management Search Internet Exlporer Data Breach Fraud Google Play Amazon Unified Threat Management Best Practice Application Videos Username Electronic Health Records Buisness Wasting Time Black Friday Legal Outsource IT IBM IT solutions Database Network Congestion Trend Micro Security Cameras IT Technicians Environment User Error Business Growth Media Software as a Service Proxy Server Cookies Managing Costs Cyber Monday Small Businesses Point of Sale Cortana Tactics eCommerce Hotspot SSID Surveillance Mirgation Virtual Assistant Displays Alt Codes Competition Downtime Tech Support Nanotechnology Virtual Machine Network Management Medical IT Outsourcing Hosted Solution Reviews Addiction Monitors Language Development Chatbots Transportation Typing Management Websites Screen Reader Hypervisor Distributed Denial of Service Workplace PowerPoint Google Drive Hiring/Firing User Shopping Knowledge Service Level Agreement Optimization Computing Infrastructure Identity Employer/Employee Relationships SharePoint Paperless Electronic Medical Records Bookmark PCI DSS 5G Smart Tech Navigation Co-managed IT Google Docs Technology Care Lenovo IP Address Unified Communications Gig Economy Experience Download Writing Alerts Virtual Reality Internet Service Provider Teamwork Bitcoin Business Communications Running Cable Server Management Browsers Private Cloud Regulations Compliance Connectivity Break Fix Evernote Google Wallet Scams Hybrid Work Superfish Identity Theft Recovery Upload Memes Twitter Net Neutrality SQL Server Multi-Factor Security Windows 8 Human Resources Hard Drives Laptop Social Network Cables Domains Error Financial Data IoT History Dark Web Drones Smartwatch Trends Social Engineering IT Remote Computing Procurement Regulations Azure Google Calendar Google Apps Refrigeration Halloween Customer Resource management IT Maintenance Public Speaking Data Analysis Telework Star Wars Cyber security Microsoft Excel Tech Business Intelligence Lithium-ion battery Tablet CES Gamification Communitications Staff

Blog Archive