Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Email Workplace Tips Phishing IT Services Hosted Solutions Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Backup Managed Service Android VoIP Business Management Smartphones Upgrade communications Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Current Events Network Tech Term Remote Internet of Things Productivity Facebook Automation Artificial Intelligence Gadgets AI Covid-19 Cloud Computing Holiday Miscellaneous Remote Work Server Managed Service Provider Information Outsourced IT Training Encryption Spam Employee/Employer Relationship Compliance Windows 10 Office Data Management Business Continuity Government Blockchain Windows 10 Business Technology Virtualization Wi-Fi IT Support Bandwidth Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Apple Managed Services Voice over Internet Protocol Gmail App Employer-Employee Relationship Networking Chrome Budget BYOD HIPAA Access Control Applications WiFi Tip of the week Computing Information Technology Conferencing Office 365 How To Hacker BDR Avoiding Downtime Marketing Virtual Private Network Healthcare Router Health Operating System Big Data Risk Management Help Desk Retail Managed IT Services Computers Analytics Office Tips Augmented Reality Website Storage Password Bring Your Own Device Physical Security Firewall Display Remote Workers Printer Paperless Office Going Green Infrastructure The Internet of Things Free Resource Project Management Cybercrime Document Management Windows 7 Social Monitoring Microsoft 365 Scam Solutions Data loss Customer Service Windows 11 Telephone 2FA Patch Management Excel Save Money Cooperation Remote Monitoring End of Support Vulnerability Vendor Management Meetings Virtual Machines Telephone System Professional Services VPN Administration Cost Management Computer Repair Safety iPhone Data Privacy Settings User Tip Wireless Vulnerabilities Modem Printing Mobile Security Processor Content Filtering Machine Learning Images 101 YouTube Multi-Factor Authentication Mobility Cryptocurrency Smart Technology Maintenance Customer Relationship Management Antivirus Virtual Desktop Saving Time Data storage LiFi Employees Integration Hacking Managed IT Service Presentation Outlook Downloads Money Wireless Technology Licensing Humor Supply Chain Holidays Robot Entertainment Data Storage Sports Mouse Video Conferencing Word IT Management Managed Services Provider Network Congestion Social Networking Legislation Mobile Computing Technology Care Gig Economy User Error Business Communications Internet Service Provider Fileless Malware Search Teamwork Refrigeration Content Public Speaking Evernote Wearable Technology Best Practice Scams Regulations Compliance Buisness Point of Sale Memes Health IT Lithium-ion battery Motherboard Comparison Hybrid Work Permissions Legal Entrepreneur IT solutions Human Resources Net Neutrality Directions SQL Server Assessment Business Growth Network Management Cables Financial Data Tech Support History Smartwatch IT Monitors Specifications Fraud Google Apps Procurement Microchip Cortana Azure Internet Exlporer Undo Cyber security Username Tech Alt Codes IT Maintenance Telework Websites Business Intelligence CES Downtime Communitications Black Friday SharePoint Hosted Solution Shortcuts Supply Chain Management Electronic Medical Records Database Term IT Technicians Typing Ransmoware FinTech Vendors IT Assessment Proxy Server Writing Cookies Application Cyber Monday Lenovo Hotspot Google Drive Be Proactive Flexibility Knowledge Virtual Reality Value Tactics IBM Mirgation Server Management Workforce Organization Private Cloud Threats Digital Security Cameras Identity Theft Smart Devices 5G Nanotechnology Superfish Language Google Docs Unified Communications Workplace Strategies Remote Working Experience Twitter Memory Addiction Data Breach Management Google Play Chatbots Bitcoin Meta Running Cable Error Amazon Videos Electronic Health Records Social Engineering Screen Reader Distributed Denial of Service Google Wallet Competition Computing Infrastructure Remote Computing Wasting Time Service Level Agreement Trend Micro Security Cameras Identity Windows 8 Outsource IT Laptop Drones Environment Tablet Media Software as a Service Bookmark Smart Tech Alerts Alert Managing Costs Download Halloween File Sharing eCommerce Dark Data SSID User Managed IT Small Businesses Displays Surveillance Browsers How To Virtual Assistant Connectivity Break Fix Notifications Virtual Machine Upload Scary Stories Travel Social Network IP Address Medical IT Multi-Factor Security Hacks Outsourcing Reviews Techology Google Maps Development Fun Transportation IoT Dark Web Deep Learning Workplace Hypervisor Trends Unified Threat Management Optimization Customer Resource management PowerPoint Regulations Recovery Google Calendar Hiring/Firing Shopping Unified Threat Management Education Paperless Data Analysis Employer/Employee Relationships Star Wars Hard Drives Microsoft Excel Domains Navigation Staff Co-managed IT PCI DSS Gamification

Blog Archive