Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Covid-19 Cloud Computing Gadgets Training Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Vendor Mobile Office Gmail App WiFi BYOD Employer-Employee Relationship Managed Services Tip of the week Voice over Internet Protocol Chrome Budget Mobile Device Management Networking Apple BDR Conferencing Computing Information Technology Access Control Office 365 HIPAA Hacker Applications Avoiding Downtime Marketing How To 2FA Operating System Big Data Risk Management Virtual Private Network Health Office Tips Router Computers Analytics Augmented Reality Healthcare Retail Website Storage Password Help Desk Bring Your Own Device Managed IT Services Going Green Patch Management Windows 11 Solutions Save Money Telephone The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Excel Cooperation Social Physical Security Display Printer Paperless Office Infrastructure Customer Service Remote Workers Document Management Free Resource Monitoring Scam Project Management Data loss Windows 7 Firewall Microsoft 365 Managed IT Service Robot Safety Downloads Employees Settings Printing Wireless Licensing Supply Chain Integration Content Filtering Entertainment IT Management Meetings YouTube VPN Cryptocurrency Holidays Data Storage Computer Repair Telephone System Customer Relationship Management Cost Management Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Professional Services Hacking Presentation Data Privacy Outlook Machine Learning Money Wireless Technology Modem Humor User Tip Processor Mobile Security iPhone Maintenance Sports Antivirus Vulnerabilities Mouse Word Smart Technology Images 101 Administration Saving Time Multi-Factor Authentication Mobility Identity Outsource IT Entrepreneur Memory Legal How To IT solutions Remote Working Business Growth Bookmark Smart Tech Environment Data Breach Media Google Play Notifications Travel Videos Download Electronic Health Records Alerts Cortana Techology Small Businesses Wasting Time Google Maps Undo Alt Codes Browsers Connectivity Displays Trend Micro Break Fix Security Cameras Unified Threat Management Downtime Upload Software as a Service Unified Threat Management Outsourcing Managing Costs Multi-Factor Security Hosted Solution Social Network Typing IoT eCommerce Dark Web SSID Virtual Assistant Network Congestion Trends Application Surveillance Workplace Knowledge User Error Regulations Hiring/Firing Virtual Machine Google Calendar Google Drive Customer Resource management Data Analysis IBM Reviews Star Wars Microsoft Excel Paperless Medical IT Transportation Point of Sale Gamification Development 5G Staff Co-managed IT Experience Social Networking Technology Care Hypervisor Legislation Google Docs Unified Communications Bitcoin Fileless Malware Shopping Running Cable Optimization Network Management Business Communications PowerPoint Tech Support Employer/Employee Relationships Google Wallet Monitors Content Wearable Technology Scams Competition PCI DSS Motherboard Hybrid Work Comparison Navigation Health IT Windows 8 Directions Gig Economy Laptop Assessment Permissions Human Resources Websites Teamwork Drones Internet Service Provider Cables Regulations Compliance SharePoint Specifications Evernote Electronic Medical Records Microchip Halloween Internet Exlporer User Memes Fraud Google Apps SQL Server Writing Username Net Neutrality Lenovo IT Maintenance Financial Data Business Intelligence History Black Friday Virtual Reality Hacks IP Address Smartwatch Scary Stories Database IT Server Management Shortcuts Private Cloud Ransmoware Azure Identity Theft Procurement Fun Superfish IT Technicians Proxy Server Telework Cookies Vendors Cyber security Cyber Monday Tech Twitter Deep Learning CES Tactics Recovery Communitications Hotspot Be Proactive Error Mirgation Workforce Social Engineering Education Hard Drives Supply Chain Management Domains FinTech Nanotechnology Threats Term Remote Computing Mobile Computing Addiction IT Assessment Language Workplace Strategies Chatbots Meta Value Tablet Management Refrigeration Flexibility Search Public Speaking Organization Screen Reader Amazon Distributed Denial of Service Alert Best Practice File Sharing Dark Data Lithium-ion battery Digital Security Cameras Buisness Service Level Agreement Smart Devices Managed IT Computing Infrastructure

Blog Archive