Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Google Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Automation Facebook Artificial Intelligence Miscellaneous Holiday Training Covid-19 Gadgets Compliance Cloud Computing Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Wi-Fi Blockchain Two-factor Authentication Vendor Apps Managed Services Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Employer-Employee Relationship Apple Networking Voice over Internet Protocol App BYOD HIPAA Access Control Applications Office 365 Conferencing Managed IT Services How To BDR Hacker Avoiding Downtime Computing Marketing Physical Security Information Technology Router Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Big Data Storage Password Bring Your Own Device Healthcare Computers Operating System Website Risk Management Virtual Private Network Printer Solutions Firewall Paperless Office Infrastructure Document Management Windows 11 The Internet of Things Monitoring Social Excel Scam Data loss Managed IT Service Remote Workers Telephone Customer Service Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management Windows 7 Vendor Management Cybercrime Microsoft 365 Display Computer Repair Virtual Desktop Employees Data storage LiFi Integration User Tip Modem Safety Outlook Mobile Security Processor Machine Learning Money Holidays Humor Data Storage Smart Technology Supply Chain Video Conferencing Maintenance Antivirus Managed Services Provider Sports Professional Services Saving Time Mouse Virtual Machines Administration Customer Relationship Management Downloads iPhone Hacking Licensing Robot Presentation Vulnerabilities Entertainment Data Privacy Settings Wireless Wireless Technology Printing Content Filtering Images 101 IT Management YouTube Meetings Mobility Telephone System VPN Multi-Factor Authentication Cost Management Cryptocurrency Word Google Docs Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Directions Videos Refrigeration Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Specifications Security Cameras Workplace Strategies Monitors Public Speaking Google Wallet Trend Micro Lithium-ion battery Internet Exlporer Software as a Service Fraud Meta Microchip Username Windows 8 Managing Costs Amazon Entrepreneur Laptop Websites Black Friday SSID Drones eCommerce SharePoint Database Surveillance Virtual Assistant Outsource IT Electronic Medical Records Undo IT Technicians Virtual Machine Environment Halloween Media Cyber Monday Medical IT Writing Proxy Server Reviews Lenovo Cookies Tactics Development Hotspot Transportation Small Businesses Virtual Reality Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Identity Theft PowerPoint Fun Shopping Superfish Nanotechnology Optimization Addiction Application Deep Learning Language Employer/Employee Relationships Outsourcing Twitter Management PCI DSS Chatbots Error Navigation Education Distributed Denial of Service Workplace Social Engineering Gig Economy IBM Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Mobile Computing Identity Evernote Paperless Smart Tech Memes Tablet Co-managed IT Search Bookmark Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Buisness File Sharing Business Communications Dark Data Financial Data Competition Managed IT History Legal Connectivity IT IT solutions Break Fix Scams How To Browsers Smartwatch Upload Procurement Business Growth Azure Hybrid Work Notifications Travel Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Techology IoT Communitications User Google Maps Dark Web Cables Cortana CES Trends Supply Chain Management Alt Codes Downtime Unified Threat Management Google Calendar Term Google Apps Customer Resource management FinTech Regulations Unified Threat Management Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance Data Analysis IP Address Gamification Flexibility Typing Staff Value Business Intelligence Legislation Shortcuts Network Congestion Organization Social Networking Google Drive User Error Smart Devices Recovery Ransmoware Knowledge Fileless Malware Digital Security Cameras Content Remote Working Hard Drives Wearable Technology Memory Vendors Point of Sale Comparison Google Play Be Proactive 5G Health IT Domains Motherboard Data Breach

Blog Archive