Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Automation Facebook Miscellaneous Covid-19 Cloud Computing Training Compliance Gadgets Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Data Security Apps Vendor Mobile Office Managed Services Two-factor Authentication Employer-Employee Relationship Chrome Budget BYOD Apple App Mobile Device Management Voice over Internet Protocol Tip of the week Gmail WiFi Networking BDR Password HIPAA Hacker Applications Physical Security Avoiding Downtime Marketing Access Control Computing Conferencing Information Technology Office 365 Managed IT Services How To Augmented Reality 2FA Storage Computers Router Bring Your Own Device Virtual Private Network Website Help Desk Health Operating System Healthcare Retail Risk Management Big Data Analytics Office Tips Solutions Patch Management Windows 11 Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Excel Display Printer Paperless Office Going Green Monitoring Infrastructure Remote Workers Firewall Cybercrime Document Management Managed IT Service Telephone The Internet of Things Free Resource Project Management Windows 7 Scam Data loss Cooperation Social Microsoft 365 Money Telephone System Cost Management Customer Relationship Management Humor Employees Robot Integration Supply Chain Sports Hacking Presentation Mouse IT Management VPN Meetings Holidays Modem Wireless Technology User Tip Administration Processor Data Storage Mobile Security Computer Repair Video Conferencing Managed Services Provider Virtual Machines Professional Services Smart Technology Word Settings Printing Wireless Content Filtering Saving Time Data Privacy Machine Learning YouTube iPhone Cryptocurrency Safety Vulnerabilities Downloads Maintenance Licensing Antivirus Images 101 Virtual Desktop LiFi Data storage Entertainment Multi-Factor Authentication Mobility Outlook Legislation Videos Outsource IT How To Electronic Health Records Social Networking Media Wasting Time Fileless Malware Environment Notifications Travel Hacks Content Scary Stories Trend Micro Wearable Technology Security Cameras Fun Comparison Techology Google Maps Health IT Small Businesses Software as a Service Motherboard Competition Deep Learning Assessment Managing Costs Permissions Directions Displays Unified Threat Management eCommerce SSID Virtual Assistant Specifications Unified Threat Management Outsourcing Education Surveillance Microchip Internet Exlporer Virtual Machine Fraud User Mobile Computing Reviews Username Workplace Network Congestion Medical IT Search Transportation Black Friday User Error Hiring/Firing Development Best Practice Database Paperless IP Address Hypervisor Point of Sale Shopping Co-managed IT Buisness Optimization IT Technicians PowerPoint Cookies Employer/Employee Relationships Cyber Monday Legal Proxy Server Technology Care IT solutions Tech Support Business Growth PCI DSS Tactics Business Communications Hotspot Recovery Navigation Network Management Gig Economy Scams Monitors Mirgation Hard Drives Nanotechnology Domains Cortana Teamwork Hybrid Work Internet Service Provider Websites Alt Codes Regulations Compliance Addiction Human Resources Language Evernote Management Cables Downtime Memes Chatbots Refrigeration Screen Reader Public Speaking SQL Server Distributed Denial of Service SharePoint Electronic Medical Records Hosted Solution Net Neutrality Typing Financial Data Service Level Agreement Google Apps Lithium-ion battery History Computing Infrastructure Entrepreneur Lenovo Smartwatch IT Maintenance Writing IT Identity Procurement Smart Tech Knowledge Azure Google Drive Bookmark Business Intelligence Virtual Reality Private Cloud Telework Download Shortcuts Cyber security Alerts Tech Server Management Superfish Identity Theft CES Ransmoware Communitications Undo 5G Unified Communications Supply Chain Management Connectivity Experience Break Fix Google Docs Browsers Vendors Twitter Error Bitcoin FinTech Upload Be Proactive Running Cable Term Multi-Factor Security Google Wallet Social Network Workforce Social Engineering IT Assessment Flexibility IoT Value Dark Web Threats Remote Computing Windows 8 Organization Trends Workplace Strategies Laptop Application Google Calendar Tablet Drones Digital Security Cameras Customer Resource management Meta Smart Devices Regulations Remote Working Star Wars IBM Memory Microsoft Excel Data Analysis Amazon Alert File Sharing Gamification Dark Data Halloween Data Breach Staff Google Play Managed IT

Blog Archive