Home
My Documents
Sitemap
About Us
Who We Are
Our Difference
IT Industry Secret
Refer a Colleague or Friend
Employment
IT Services
Managed IT Services
VMware
Outsourcing your IT
IT Consulting
Comprehensive IT Support
Remote Monitoring & Maintenance
IT Vendor Management
Security Services
Cisco-Certified Solutions
Network Security
Content Filtering
Spam Protection
Security Cameras
SOPHOS Security Solutions
Cloud Computing Services
Cloud IT Solutions
Hosted Microsoft Exchange
Hosted Server
Hosted Desktop
Hardware Virtualization
Dropbox Cloud Storage
Cloud Backup & File Sharing
Medical & Legal IT
Health Care IT
Electronic Medical Records
IT for Law
Data Services
BDR
Data Retrieval
Hardware Services
Hardware as a Service
Cabling and Wiring
Computer Repair
High-Speed Internet Consulting
HP Official Dealer
Printer Management
Official Dell Dealer
Apple Computer Repair
Software Services
Microsoft SQL Server
Microsoft Partner Network
CRM Sales Process
Microsoft Office 365
Document Management
Google Apps
Identity Management
Business Communication
VoIP
Fax Server
Conferencing
Mobile Device Management
VirtualTone
Digital Signage
Media & Internet Services
Website Design
InSite ID for Websites
Understanding IT
Understanding Network Security
Understanding SOx
Understanding BYOD
Understanding PCI DSS
Understanding HIPAA
Cloud Computing
News & Events
News & Press Releases
Blog
Contact Us
Support
How to Request Support
Help Desk
Join a Meeting
Remote Support Tool
You are here:
Blog
Bloggers
Josh Coppage
Voyage Technology Blog
Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Navigation
Home
Tags
Archived Posts
Subscribe to blog
Login
Username
Password
Forgot Password?
Remember me
Login
January, 2025
Switch to calendar view
6 Reasons for Tape Backup (and 1 Huge Reason to Replace It)
Thursday, 02 January 2025
Stop Pushing that Boulder Uphill! Cybersecurity is About Being Proactive
Monday, 06 January 2025
Engaging Your Employees with Simulated Phishing Can Make a Big Difference in Your Cybersecurity
Wednesday, 08 January 2025
Happy New Year! Stay Ahead of Cybersecurity in 2025
Friday, 10 January 2025
Why to Use Automated Email (and When Not To)
Monday, 13 January 2025
The Innocent Targets - Episode One: Sextortion Scams
Wednesday, 15 January 2025
The Ultimate User Guide for Managing Your Passwords [Part 1 of 5]
Friday, 17 January 2025
The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]
Monday, 20 January 2025
The Ultimate User Guide for Managing Your Passwords [Part 3 of 5]
Wednesday, 22 January 2025
The Ultimate User Guide for Managing Your Passwords [Part 4 of 5]
Friday, 24 January 2025
The Ultimate User Guide for Managing Your Passwords [Part 5 of 5]
Monday, 27 January 2025
VoIP Can Completely Change the Course of Your Business’ Communications
Wednesday, 29 January 2025
How to Use Google Saved’s Features to Bookmark Content
Friday, 31 January 2025
Sign Up For Our Newsletter!
Email
First Name
Last Name
What is 2+3?
Blog Categories
Voyage Technology Blog
Uncategorized
Off Topic/Fun
Alerts
IT Blog
Miscellaneous
Cloud
How to
Tip of the Week
Best practices
Business
Security
Technology
Mobile? Grab this Article!
Tag Cloud
Security
Technology
Tip of the Week
Best Practices
Data
Business Computing
Business
Productivity
Software
Innovation
Cloud
Hackers
Efficiency
Hardware
Network Security
User Tips
Internet
Malware
IT Support
IT Services
Privacy
Google
Email
Workplace Tips
Computer
Phishing
Collaboration
Hosted Solutions
Users
Workplace Strategy
Ransomware
Small Business
Mobile Device
Productivity
Microsoft
Backup
Managed Service
Quick Tips
Passwords
Saving Money
Communication
Cybersecurity
Smartphone
Data Backup
Data Recovery
Android
AI
Disaster Recovery
Upgrade
Business Management
VoIP
Smartphones
Mobile Devices
communications
Windows
Browser
Social Media
Microsoft Office
Managed IT Services
Network
Current Events
Tech Term
Internet of Things
Remote
Facebook
Miscellaneous
Holiday
Information
Automation
Artificial Intelligence
Gadgets
Cloud Computing
Training
Covid-19
Compliance
Server
Managed Service Provider
Remote Work
Outsourced IT
IT Support
Encryption
Spam
Employee/Employer Relationship
Office
Windows 10
Business Continuity
Government
Data Management
Virtualization
Wi-Fi
Blockchain
Business Technology
Windows 10
Bandwidth
Data Security
Apps
Vendor
Two-factor Authentication
Mobile Office
WiFi
Managed Services
Voice over Internet Protocol
Apple
Networking
App
Employer-Employee Relationship
BYOD
Mobile Device Management
Tip of the week
Chrome
Gmail
Budget
Conferencing
How To
BDR
Computing
Hacker
Information Technology
Avoiding Downtime
HIPAA
Access Control
Marketing
Applications
Office 365
Storage
Password
Bring Your Own Device
Big Data
Managed IT Services
Healthcare
Operating System
Computers
Virtual Private Network
Risk Management
Website
Router
Health
Analytics
Office Tips
Augmented Reality
2FA
Help Desk
Retail
Excel
The Internet of Things
Scam
Data loss
Remote Workers
Social
Telephone
Going Green
Patch Management
Save Money
Cooperation
Free Resource
Remote Monitoring
Vulnerability
End of Support
Project Management
Windows 7
Customer Service
Vendor Management
Cybercrime
Microsoft 365
Physical Security
Display
Solutions
Printer
Paperless Office
Infrastructure
Windows 11
Firewall
Document Management
Monitoring
Video Conferencing
Safety
Maintenance
Antivirus
Sports
Managed Services Provider
Virtual Machines
Professional Services
Mouse
Saving Time
Managed IT Service
Administration
Downloads
iPhone
Licensing
Robot
Vulnerabilities
Customer Relationship Management
Entertainment
Settings
Data Privacy
Printing
Wireless
Images 101
Content Filtering
Hacking
IT Management
Mobility
Presentation
VPN
YouTube
Meetings
Telephone System
Multi-Factor Authentication
Cost Management
Cryptocurrency
Wireless Technology
Computer Repair
Virtual Desktop
Employees
Integration
Data storage
LiFi
Word
User Tip
Modem
Mobile Security
Outlook
Processor
Machine Learning
Money
Holidays
Humor
Data Storage
Smart Technology
Supply Chain
Twitter
Addiction
Language
Employer/Employee Relationships
Outsourcing
Deep Learning
Undo
Error
Management
PCI DSS
Chatbots
Navigation
Screen Reader
Distributed Denial of Service
Workplace
Education
Gig Economy
Social Engineering
Remote Computing
Service Level Agreement
Internet Service Provider
Computing Infrastructure
Teamwork
Hiring/Firing
Evernote
Paperless
Mobile Computing
Regulations Compliance
Identity
Smart Tech
Memes
Co-managed IT
Tablet
Bookmark
Search
Alert
Download
Net Neutrality
Alerts
SQL Server
Technology Care
Application
Best Practice
Business Communications
Managed IT
Buisness
File Sharing
Financial Data
Dark Data
History
Connectivity
IT
Break Fix
Scams
IBM
Legal
IT solutions
Browsers
Smartwatch
How To
Notifications
Upload
Procurement
Azure
Hybrid Work
Business Growth
Multi-Factor Security
Tech
Human Resources
Travel
Social Network
Telework
Cyber security
IoT
Communitications
Dark Web
Cables
Techology
Google Maps
CES
Cortana
Trends
Supply Chain Management
Alt Codes
Google Calendar
Term
Google Apps
Competition
Downtime
Unified Threat Management
Customer Resource management
FinTech
Regulations
Star Wars
IT Assessment
Microsoft Excel
IT Maintenance
Unified Threat Management
Hosted Solution
Data Analysis
Gamification
Flexibility
Staff
Value
Business Intelligence
Typing
Legislation
Shortcuts
Organization
Network Congestion
Social Networking
Smart Devices
Ransmoware
Google Drive
User Error
User
Fileless Malware
Digital Security Cameras
Knowledge
Content
Remote Working
Wearable Technology
Memory
Vendors
Comparison
Google Play
Be Proactive
Point of Sale
Health IT
5G
Motherboard
Data Breach
Assessment
Electronic Health Records
Permissions
Workforce
IP Address
Google Docs
Unified Communications
Directions
Videos
Experience
Running Cable
Tech Support
Wasting Time
Threats
Bitcoin
Network Management
Specifications
Security Cameras
Workplace Strategies
Google Wallet
Monitors
Trend Micro
Internet Exlporer
Software as a Service
Fraud
Meta
Recovery
Microchip
Laptop
Websites
Username
Managing Costs
Amazon
Hard Drives
Windows 8
Black Friday
SSID
Domains
Drones
eCommerce
Database
Surveillance
Virtual Assistant
Outsource IT
SharePoint
Electronic Medical Records
Halloween
IT Technicians
Virtual Machine
Environment
Media
Refrigeration
Cyber Monday
Medical IT
Public Speaking
Lenovo
Proxy Server
Reviews
Writing
Cookies
Virtual Reality
Tactics
Development
Hotspot
Transportation
Small Businesses
Lithium-ion battery
Hacks
Server Management
Entrepreneur
Scary Stories
Private Cloud
Mirgation
Hypervisor
Displays
PowerPoint
Superfish
Identity Theft
Shopping
Fun
Nanotechnology
Optimization
Blog Archive
2026
January
(12)
February
(1)
2025
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(11)
December
(13)
2024
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2023
January
(13)
February
(12)
March
(14)
April
(12)
May
(14)
June
(13)
July
(13)
August
(13)
September
(13)
October
(14)
November
(13)
December
(12)
2022
January
(13)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(13)
October
(13)
November
(13)
December
(12)
2021
January
(13)
February
(12)
March
(14)
April
(13)
May
(13)
June
(13)
July
(13)
August
(13)
September
(13)
October
(13)
November
(13)
December
(14)
2020
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2019
January
(14)
February
(12)
March
(13)
April
(13)
May
(14)
June
(12)
July
(14)
August
(13)
September
(13)
October
(13)
November
(13)
December
(13)
2018
January
(14)
February
(12)
March
(13)
April
(13)
May
(13)
June
(13)
July
(13)
August
(14)
September
(12)
October
(15)
November
(13)
December
(13)
2017
January
(13)
February
(9)
March
(11)
April
(12)
May
(6)
June
(3)
July
(12)
August
(12)
September
(13)
October
(13)
November
(13)
December
(13)
2016
January
(13)
February
(10)
March
(12)
April
(13)
May
(13)
June
(13)
July
(13)
August
(15)
September
(13)
October
(13)
November
(13)
December
(13)
2015
February
(4)
March
(2)
May
(3)
June
(10)
July
(12)
August
(12)
September
(11)
October
(13)
November
(13)
December
(12)
Copyright Voyage Technology. All Rights Reserved.