Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Automation Facebook Information Holiday Miscellaneous Gadgets Training Covid-19 Cloud Computing Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Virtualization Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Vendor Apps Mobile Office Data Security Two-factor Authentication Chrome Employer-Employee Relationship Budget Tip of the week Apple App Networking Mobile Device Management Managed Services Voice over Internet Protocol Gmail BYOD Office 365 Applications Access Control Hacker Conferencing Avoiding Downtime Marketing How To Computing BDR Information Technology WiFi HIPAA Router Big Data Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Help Desk Password Bring Your Own Device Computers Retail Website 2FA Managed IT Services Operating System Risk Management Healthcare Free Resource Physical Security Project Management Windows 7 Social Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Customer Service Document Management Windows 11 Telephone Scam Going Green Data loss Excel Cooperation Cybercrime Firewall Remote Workers Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management The Internet of Things Meetings Data Privacy VPN Outlook Images 101 Modem User Tip Processor Money Computer Repair Mobile Security Multi-Factor Authentication Mobility Humor Customer Relationship Management Sports Smart Technology Mouse Employees Integration Hacking Machine Learning Presentation Saving Time Administration Managed IT Service Wireless Technology Maintenance Holidays Downloads Antivirus Data Storage Licensing Supply Chain Video Conferencing Settings Wireless Managed Services Provider Word Entertainment Printing Professional Services Content Filtering Virtual Machines YouTube Robot Telephone System Cryptocurrency Cost Management iPhone Safety Virtual Desktop Vulnerabilities Data storage IT Management LiFi Laptop Supply Chain Management Network Congestion Specifications Windows 8 User Error Microchip Drones Internet Exlporer FinTech Fraud Term Google Apps IT Maintenance Application Username IT Assessment Point of Sale Halloween Flexibility Black Friday Value Business Intelligence Database Organization IBM Shortcuts Ransmoware Network Management Digital Security Cameras Tech Support IT Technicians Smart Devices Cookies Scary Stories Remote Working Monitors Cyber Monday Memory Vendors Proxy Server Hacks Tactics Hotspot Fun Data Breach Google Play Be Proactive Workforce Deep Learning Videos Websites Mirgation Electronic Health Records Nanotechnology Wasting Time Threats Competition SharePoint Addiction Education Electronic Medical Records Language Trend Micro Security Cameras Workplace Strategies Meta Management Chatbots Software as a Service Screen Reader Writing Distributed Denial of Service Managing Costs Amazon Lenovo Mobile Computing Service Level Agreement Virtual Reality Computing Infrastructure Search eCommerce SSID User Virtual Assistant Outsource IT Server Management Best Practice Private Cloud Identity Surveillance Identity Theft Smart Tech Buisness Virtual Machine Environment Media Superfish Bookmark Legal Download IT solutions Reviews Twitter Alerts IP Address Medical IT Transportation Small Businesses Business Growth Error Development Connectivity Social Engineering Break Fix Hypervisor Displays Browsers Recovery Upload Shopping Remote Computing Cortana Optimization PowerPoint Multi-Factor Security Employer/Employee Relationships Outsourcing Hard Drives Social Network Alt Codes Tablet IoT Downtime PCI DSS Dark Web Domains Navigation Workplace Trends Hosted Solution Gig Economy Alert Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Refrigeration Managed IT Customer Resource management Typing File Sharing Regulations Star Wars Regulations Compliance How To Microsoft Excel Public Speaking Evernote Paperless Data Analysis Co-managed IT Google Drive Gamification Notifications Staff Knowledge Memes Lithium-ion battery Net Neutrality Legislation SQL Server Technology Care Entrepreneur Travel Social Networking Google Maps Financial Data 5G History Business Communications Techology Fileless Malware Scams Google Docs Content Unified Communications Smartwatch Wearable Technology Experience IT Running Cable Procurement Comparison Azure Hybrid Work Undo Health IT Bitcoin Unified Threat Management Motherboard Unified Threat Management Directions Google Wallet Assessment Telework Permissions Cyber security Tech Human Resources Cables CES Communitications

Blog Archive