Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Passwords Managed Service Cybersecurity Communication Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Apps Vendor Data Security Mobile Office Mobile Device Management Gmail Managed Services Voice over Internet Protocol WiFi Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Computing Information Technology Conferencing Access Control Office 365 How To HIPAA Hacker BDR Avoiding Downtime Applications Marketing 2FA Help Desk Virtual Private Network Risk Management Health Healthcare Office Tips Analytics Big Data Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Computers Router Website Operating System Monitoring Physical Security Firewall Excel Display Printer Paperless Office Remote Workers Infrastructure The Internet of Things Telephone Social Document Management Cooperation Free Resource Project Management Windows 7 Scam Microsoft 365 Data loss Customer Service Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Cybercrime Data Storage VPN YouTube Meetings Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Computer Repair Saving Time Virtual Machines Professional Services Virtual Desktop Safety Data storage Managed IT Service LiFi Downloads Outlook iPhone Licensing Machine Learning Money Entertainment Humor Vulnerabilities Data Privacy Images 101 Maintenance Antivirus Sports Customer Relationship Management Telephone System Multi-Factor Authentication Mouse Mobility Cost Management Hacking Administration Presentation Employees Wireless Technology Integration Robot User Tip Modem Settings Processor Mobile Security Printing Wireless Content Filtering Holidays IT Management Word Mirgation Hypervisor Displays Network Congestion Knowledge Shopping Refrigeration Nanotechnology Optimization Google Drive User Error PowerPoint Language Employer/Employee Relationships Outsourcing Public Speaking Addiction Management PCI DSS Chatbots Navigation Point of Sale 5G Lithium-ion battery Experience Gig Economy Screen Reader Entrepreneur Google Docs Distributed Denial of Service Workplace Unified Communications Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Regulations Compliance Identity Google Wallet Evernote Paperless Monitors Bookmark Undo Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Windows 8 Laptop Websites Download Net Neutrality Financial Data History Drones Business Communications Electronic Medical Records Browsers Smartwatch Connectivity IT SharePoint Break Fix Scams Azure Hybrid Work Halloween Upload Procurement Social Network Telework Application Cyber security Lenovo Multi-Factor Security Tech Human Resources Writing Virtual Reality CES IoT Communitications Dark Web Cables Hacks Server Management Scary Stories Private Cloud IBM Trends Supply Chain Management Customer Resource management FinTech Regulations Superfish Google Calendar Term Google Apps Identity Theft Fun Twitter Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Staff Value Business Intelligence Error Gamification Flexibility Organization Social Networking Legislation Shortcuts Education Social Engineering Remote Computing Fileless Malware Digital Security Cameras Competition Smart Devices Ransmoware Wearable Technology Memory Vendors Mobile Computing Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Tablet Search Alert Directions Videos Assessment Electronic Health Records Permissions Workforce Best Practice Wasting Time Threats Managed IT Buisness File Sharing Dark Data User Trend Micro Legal Specifications Security Cameras Workplace Strategies IT solutions How To Business Growth Notifications Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Travel IP Address Username Cortana eCommerce Techology Black Friday SSID Google Maps Alt Codes Database Surveillance Virtual Assistant Outsource IT Recovery IT Technicians Virtual Machine Environment Media Downtime Unified Threat Management Proxy Server Reviews Hard Drives Cookies Unified Threat Management Cyber Monday Medical IT Hosted Solution Hotspot Transportation Small Businesses Typing Domains Tactics Development

Blog Archive