Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support User Tips Efficiency Malware Privacy Email Phishing Google Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Passwords Backup Data Recovery Upgrade Managed Service Managed IT Services Disaster Recovery Browser Social Media Microsoft Office Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Remote Work Current Events Miscellaneous Gadgets Windows Server Managed Service Provider Holiday Outsourced IT Productivity Information Employee/Employer Relationship Encryption Spam Windows 10 AI Business Continuity Training Data Management Compliance Office Government Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Apps Two-factor Authentication Data Security Mobile Office Vendor Mobile Device Management Budget Gmail Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Chrome Applications Access Control WiFi Tip of the week Conferencing Computing Information Technology How To Hacker BDR Avoiding Downtime Office 365 Marketing BYOD Router Storage Virtual Private Network Password Bring Your Own Device Health Help Desk Big Data Retail Operating System Healthcare Risk Management Managed IT Services Computers Analytics Website Office Tips Augmented Reality HIPAA Firewall Display Printer Windows 11 Paperless Office Infrastructure Monitoring The Internet of Things 2FA Excel Social Going Green Document Management Remote Workers Telephone Cybercrime Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability IT Support Vendor Management Solutions VPN Employees Meetings Physical Security Integration Sports User Tip Modem Mouse Computer Repair Mobile Security Processor Holidays Safety Administration Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Settings Managed IT Service Wireless Printing Maintenance Content Filtering Antivirus Customer Relationship Management Downloads YouTube iPhone Licensing Cryptocurrency Vulnerabilities Hacking Entertainment Data Privacy Presentation Virtual Desktop Images 101 Data storage LiFi Wireless Technology Robot Mobility Telephone System Multi-Factor Authentication Cost Management Outlook Money Humor IT Management Word Scary Stories Network Congestion Specifications Security Cameras Workplace Strategies Hacks Trend Micro Internet Exlporer Software as a Service Fraud Meta Refrigeration Fun User Error Microchip Username Deep Learning Managing Costs Amazon Public Speaking Black Friday SSID Point of Sale eCommerce Lithium-ion battery Database Surveillance Education Virtual Assistant Outsource IT Entrepreneur Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Mobile Computing Cookies Tactics Development Hotspot Transportation Small Businesses Undo Search Best Practice Websites Mirgation Hypervisor Displays Buisness PowerPoint Shopping Nanotechnology Optimization Legal Addiction IT solutions Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Business Growth Chatbots Navigation Writing Distributed Denial of Service Workplace Application Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Server Management Regulations Compliance Alt Codes Private Cloud Identity IBM Evernote Paperless Downtime Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Hosted Solution Twitter Alerts SQL Server Technology Care Financial Data Typing Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Google Drive Upload Procurement Remote Computing Azure Hybrid Work Competition Knowledge Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables 5G CES Tablet IoT Communitications Google Docs Trends Supply Chain Management Unified Communications Alert Experience User Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Running Cable Dark Data Google Calendar Term Google Apps Google Wallet Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Laptop Legislation Shortcuts Organization Windows 8 Travel Social Networking IP Address Drones Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Halloween Comparison Google Play Be Proactive Recovery Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Hard Drives Unified Threat Management Directions Videos Wasting Time Threats Domains

Blog Archive