Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Email Google Workplace Tips Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery AI Data Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Data Security Vendor Mobile Office Two-factor Authentication Employer-Employee Relationship App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Gmail Chrome Budget WiFi Apple Networking How To BDR HIPAA Hacker Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing 2FA Operating System Computers Router Virtual Private Network Risk Management Website Healthcare Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Big Data Bring Your Own Device Managed IT Services Cooperation Going Green Patch Management Save Money Windows 11 Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Physical Security Display Printer Remote Workers Paperless Office Infrastructure Monitoring Firewall Document Management Free Resource Project Management Windows 7 The Internet of Things Telephone Microsoft 365 Scam Data loss Social Solutions Employees Integration Customer Relationship Management Telephone System Robot Cost Management Settings Holidays Printing Wireless Hacking Presentation Data Storage Content Filtering Supply Chain IT Management VPN YouTube Meetings Video Conferencing Wireless Technology Managed Services Provider Virtual Machines Professional Services Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage Word LiFi iPhone Smart Technology Outlook Machine Learning Vulnerabilities Money Saving Time Data Privacy Humor Images 101 Safety Managed IT Service Multi-Factor Authentication Mobility Maintenance Antivirus Sports Downloads Mouse Licensing Entertainment Administration Alert Trend Micro Security Cameras Workplace Strategies IBM Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Software as a Service Dark Data Google Calendar Meta Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Managing Costs Amazon Notifications Staff eCommerce SSID Business Growth Gamification Travel Social Networking Surveillance Legislation Virtual Assistant Outsource IT Media Competition Techology Fileless Malware Google Maps Cortana Virtual Machine Environment Wearable Technology Medical IT Alt Codes Content Reviews Health IT Downtime Unified Threat Management Motherboard Development Comparison Transportation Small Businesses Unified Threat Management Directions Hosted Solution Assessment Permissions Hypervisor Displays Optimization PowerPoint User Typing Shopping Network Congestion Specifications Employer/Employee Relationships Outsourcing Navigation Google Drive User Error Microchip Internet Exlporer PCI DSS Knowledge Fraud Workplace IP Address Username Gig Economy Point of Sale Internet Service Provider 5G Black Friday Teamwork Hiring/Firing Evernote Paperless Google Docs Unified Communications Database Regulations Compliance Experience Running Cable Tech Support IT Technicians Memes Co-managed IT Recovery Bitcoin Network Management Hard Drives Google Wallet Proxy Server Cookies Net Neutrality Monitors Cyber Monday SQL Server Technology Care History Business Communications Domains Tactics Financial Data Hotspot Smartwatch Laptop Websites Mirgation IT Scams Windows 8 Refrigeration Drones Nanotechnology Procurement Azure Hybrid Work Cyber security Tech Human Resources Public Speaking SharePoint Addiction Telework Electronic Medical Records Language Management CES Halloween Chatbots Communitications Cables Lithium-ion battery Lenovo Entrepreneur Screen Reader Supply Chain Management Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Term Google Apps Service Level Agreement FinTech Hacks Server Management Scary Stories Private Cloud Identity IT Assessment IT Maintenance Undo Superfish Bookmark Identity Theft Smart Tech Flexibility Fun Value Business Intelligence Twitter Alerts Shortcuts Deep Learning Download Organization Digital Security Cameras Error Smart Devices Ransmoware Browsers Education Connectivity Remote Working Social Engineering Break Fix Memory Vendors Remote Computing Data Breach Google Play Be Proactive Upload Mobile Computing Social Network Videos Electronic Health Records Multi-Factor Security Workforce Application Tablet IoT Search Dark Web Wasting Time Threats

Blog Archive