Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery AI Data Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Mobile Office Vendor Data Security Gmail Apple BYOD WiFi App Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Networking Mobile Device Management Budget Conferencing Access Control Computing Information Technology Hacker Avoiding Downtime Office 365 Marketing HIPAA How To BDR Applications Bring Your Own Device Help Desk 2FA Big Data Virtual Private Network Operating System Health Risk Management Computers Retail Website Office Tips Analytics Augmented Reality Managed IT Services Router Healthcare Storage Password Patch Management Save Money Remote Monitoring Free Resource End of Support Vulnerability Project Management Windows 11 The Internet of Things Vendor Management Windows 7 Monitoring Physical Security Microsoft 365 Going Green Social Display Excel Solutions Printer Paperless Office Infrastructure Cybercrime Telephone Customer Service Cooperation Document Management Scam Data loss Remote Workers Firewall Robot Processor Mouse Mobile Security Vulnerabilities Safety Administration Images 101 IT Management Smart Technology Mobility VPN Meetings Multi-Factor Authentication Supply Chain Saving Time Settings Computer Repair Printing Managed IT Service Wireless Content Filtering Employees Customer Relationship Management Downloads Integration YouTube Licensing Cryptocurrency Entertainment Machine Learning Hacking Presentation Holidays Data Privacy Virtual Desktop Data Storage Wireless Technology Data storage LiFi Maintenance Video Conferencing Telephone System Cost Management Antivirus Managed Services Provider Virtual Machines Professional Services Outlook Money Word Humor iPhone User Tip Modem Sports Entrepreneur Tech Database Amazon Education Telework Travel Cyber security IT Technicians Google Maps Communitications Techology CES Proxy Server Mobile Computing Cookies Outsource IT Supply Chain Management Cyber Monday Term Tactics Environment FinTech Hotspot Media Unified Threat Management Undo Search Mirgation IT Assessment Unified Threat Management Best Practice Nanotechnology Small Businesses Buisness Flexibility Value Network Congestion Legal Addiction Displays IT solutions Organization Language Digital Security Cameras Chatbots Smart Devices Management User Error Business Growth Screen Reader Outsourcing Remote Working Distributed Denial of Service Application Memory Data Breach Google Play Service Level Agreement Computing Infrastructure Point of Sale Cortana Alt Codes Videos Identity Workplace IBM Electronic Health Records Bookmark Smart Tech Hiring/Firing Network Management Downtime Tech Support Wasting Time Trend Micro Monitors Security Cameras Download Hosted Solution Alerts Paperless Typing Co-managed IT Software as a Service Browsers Connectivity Technology Care Break Fix Websites Managing Costs Competition Knowledge eCommerce SSID Google Drive Upload Business Communications Scams Surveillance Multi-Factor Security Electronic Medical Records Virtual Assistant Social Network SharePoint IoT Hybrid Work Dark Web 5G Virtual Machine Experience Writing Medical IT Google Docs Trends Lenovo Unified Communications Reviews Human Resources Bitcoin Regulations Cables Running Cable Development Google Calendar Virtual Reality User Transportation Customer Resource management Data Analysis Google Wallet Star Wars Server Management Microsoft Excel Private Cloud Hypervisor Google Apps Identity Theft Optimization PowerPoint Gamification Superfish Shopping Staff Windows 8 Social Networking IT Maintenance IP Address Laptop Legislation Twitter Employer/Employee Relationships Navigation Fileless Malware Drones Business Intelligence PCI DSS Error Shortcuts Social Engineering Content Gig Economy Wearable Technology Motherboard Ransmoware Halloween Internet Service Provider Comparison Remote Computing Recovery Teamwork Health IT Evernote Directions Assessment Vendors Regulations Compliance Permissions Hard Drives Be Proactive Tablet Domains Memes Hacks Workforce Scary Stories Net Neutrality Specifications Alert SQL Server Dark Data Microchip Internet Exlporer Threats Managed IT Financial Data Fraud File Sharing Refrigeration Fun History Workplace Strategies Public Speaking IT How To Username Deep Learning Smartwatch Meta Lithium-ion battery Procurement Black Friday Notifications Azure

Blog Archive