Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Data Recovery Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Managed Services Gmail Budget Voice over Internet Protocol Networking WiFi How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Big Data Router Operating System Computers Virtual Private Network Risk Management Health Website Help Desk 2FA Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Cooperation Free Resource Social Project Management Patch Management Windows 7 Save Money Going Green Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Telephone Remote Workers Scam Data loss The Internet of Things Administration Vulnerabilities Data Privacy Telephone System Images 101 Robot Cost Management Multi-Factor Authentication Mobility Customer Relationship Management Settings Wireless Printing IT Management VPN Meetings Content Filtering Hacking Employees Presentation YouTube Integration User Tip Modem Processor Cryptocurrency Computer Repair Mobile Security Wireless Technology Holidays Virtual Desktop Data storage LiFi Smart Technology Data Storage Word Machine Learning Supply Chain Outlook Saving Time Video Conferencing Managed Services Provider Virtual Machines Money Professional Services Humor Managed IT Service Maintenance Antivirus Downloads Safety Licensing Sports Mouse iPhone Entertainment Alert Telework Cyber security Mobile Computing Tech Human Resources Trends Managed IT Customer Resource management File Sharing Regulations Search CES Dark Data Google Calendar Communitications Cables Data Analysis Application Best Practice Star Wars How To Microsoft Excel Supply Chain Management Notifications Staff FinTech Term Google Apps Gamification Buisness IT solutions Travel Social Networking Legislation IT Assessment IBM Legal IT Maintenance Flexibility Value Business Intelligence Techology Fileless Malware Business Growth Google Maps Wearable Technology Organization Shortcuts Content Ransmoware Health IT Unified Threat Management Motherboard Cortana Digital Security Cameras Comparison Smart Devices Remote Working Memory Vendors Unified Threat Management Directions Alt Codes Assessment Permissions Data Breach Competition Google Play Be Proactive Downtime Workforce Hosted Solution Videos Network Congestion Specifications Electronic Health Records Wasting Time Threats User Error Microchip Typing Internet Exlporer Fraud Trend Micro Security Cameras Workplace Strategies Username Meta User Point of Sale Knowledge Black Friday Software as a Service Google Drive Managing Costs Amazon Database Tech Support IT Technicians 5G eCommerce SSID Network Management Virtual Assistant Outsource IT Proxy Server Unified Communications Cookies Experience Monitors Cyber Monday Surveillance IP Address Google Docs Virtual Machine Environment Bitcoin Media Tactics Running Cable Hotspot Websites Mirgation Reviews Google Wallet Medical IT Transportation Small Businesses Recovery Nanotechnology Development Hypervisor Displays SharePoint Hard Drives Windows 8 Addiction Laptop Electronic Medical Records Language Chatbots Shopping Optimization Domains Drones PowerPoint Management Employer/Employee Relationships Outsourcing Lenovo Screen Reader Writing Distributed Denial of Service PCI DSS Refrigeration Navigation Service Level Agreement Halloween Virtual Reality Computing Infrastructure Private Cloud Identity Gig Economy Public Speaking Workplace Server Management Lithium-ion battery Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Regulations Compliance Hacks Evernote Paperless Download Entrepreneur Scary Stories Twitter Alerts Error Fun Memes Co-managed IT SQL Server Technology Care Browsers Deep Learning Connectivity Social Engineering Break Fix Net Neutrality Remote Computing Financial Data History Undo Business Communications Upload Social Network Education Smartwatch Multi-Factor Security IT Scams Azure Hybrid Work Tablet IoT Dark Web Procurement

Blog Archive