Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Compliance Gadgets Covid-19 Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Voice over Internet Protocol Gmail Budget Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Storage Password Bring Your Own Device Big Data Operating System Computers Router Virtual Private Network Risk Management Website 2FA Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Telephone The Internet of Things Scam Data loss Free Resource Project Management Windows 7 Social Cooperation Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Customer Service Vendor Management Cybercrime Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Firewall Document Management Remote Workers Managed IT Service Safety Maintenance iPhone Sports Downloads Antivirus Mouse Vulnerabilities Licensing Data Privacy Entertainment Administration Images 101 Multi-Factor Authentication Mobility Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Employees Content Filtering Hacking IT Management Integration Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Processor Holidays Computer Repair Mobile Security Data Storage Virtual Desktop Data storage LiFi Supply Chain Video Conferencing Managed Services Provider Word Smart Technology Outlook Virtual Machines Professional Services Machine Learning Money Saving Time Humor Smartwatch IT Deep Learning Download Scams Twitter Alerts Azure Hybrid Work Error Procurement Undo Telework Browsers Cyber security Education Connectivity Tech Human Resources Social Engineering Break Fix CES Communitications Upload Cables Remote Computing Multi-Factor Security Supply Chain Management Mobile Computing Social Network FinTech Tablet IoT Term Google Apps Search Dark Web IT Assessment Application Best Practice Trends IT Maintenance Alert Value Business Intelligence Buisness File Sharing Regulations Dark Data Google Calendar Flexibility Managed IT Customer Resource management Organization IBM Legal Data Analysis IT solutions Star Wars Shortcuts How To Microsoft Excel Digital Security Cameras Smart Devices Business Growth Gamification Ransmoware Notifications Staff Memory Vendors Travel Social Networking Legislation Remote Working Techology Fileless Malware Data Breach Google Maps Google Play Be Proactive Cortana Wearable Technology Videos Electronic Health Records Alt Codes Content Workforce Competition Health IT Wasting Time Threats Downtime Unified Threat Management Motherboard Comparison Unified Threat Management Directions Trend Micro Hosted Solution Assessment Security Cameras Workplace Strategies Permissions Software as a Service Typing Meta Managing Costs Amazon Network Congestion Specifications Google Drive User Error Microchip eCommerce User Internet Exlporer SSID Knowledge Fraud Surveillance Username Virtual Assistant Outsource IT Virtual Machine Environment Point of Sale Media 5G Black Friday Reviews IP Address Google Docs Unified Communications Database Medical IT Experience Transportation Small Businesses Running Cable Tech Support IT Technicians Development Bitcoin Network Management Google Wallet Proxy Server Hypervisor Displays Cookies Monitors Cyber Monday Shopping Optimization Recovery Tactics PowerPoint Hotspot Employer/Employee Relationships Outsourcing Laptop Websites Mirgation Hard Drives Windows 8 PCI DSS Domains Drones Nanotechnology Navigation Gig Economy SharePoint Addiction Workplace Electronic Medical Records Language Teamwork Hiring/Firing Halloween Chatbots Internet Service Provider Refrigeration Management Regulations Compliance Public Speaking Lenovo Screen Reader Evernote Paperless Writing Distributed Denial of Service Lithium-ion battery Memes Service Level Agreement Co-managed IT Virtual Reality Computing Infrastructure SQL Server Technology Care Entrepreneur Scary Stories Private Cloud Identity Net Neutrality Hacks Server Management Financial Data Superfish Bookmark History Identity Theft Smart Tech Business Communications Fun

Blog Archive