Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do When the Internet Goes Out

Tip of the Week: What to Do When the Internet Goes Out

Losing Internet can be a large problem in the business world, as we all become more and more reliant on it. Downtime of this kind can be immensely frustrating. However, not all hope is lost, as there are ways to troubleshoot the cause of an Internet outage.

Check your Hardware
First and foremost, check to make sure that all cables are still securely plugged in. If your router was just unplugged somehow, your troubleshooting may be completed much faster. However, should your problem be something other than a loose Ethernet cable, there are other methods to figuring out what happened to your Internet.

There may also be an issue with your modem or router, which the status lights on these components will indicate. Sometimes all it will take to fix this issue is a hard restart by disconnecting and reconnecting the power supply to the component. However, sometimes your device may be due to be replaced.

Ping a Website
Once you’ve determined that your connection issues aren’t due to a problem with your equipment, you should try sending a ping command to a website. In your Start menu, access the Command Prompt window. Type in ping google.com. This tells your computer to send data packets to Google. If any of these packets are lost, as displayed in the Command Prompt window, there could be a problem present. This problem could be in your network, with your Internet Service Provider, or with the website itself. If a few or more websites lose packets when pinged, the problem probably isn’t your network.

If the pings you send are successful, but your connection isn’t, the website itself is likely having issues. If you are able, check Down Detector or Down For Everyone Or Just Me to see if the website is at fault.

Scan for Malware
If your connection issues are limited to a single workstation or device, your software may have something to do with it; or, it could be a malware infection. This can be identified with a quick scan of the affected system.

DNS Issues
Finally, your Internet Service Provider could be the one having issues, more specifically, with its Domain Name Server. If you are unable to access a website with its IP address, your ISP is the one having a problem.

For more useful IT tips, make sure you subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 28 March 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Phishing Efficiency Privacy Workplace Tips Google Computer Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Microsoft Data Backup Communication Small Business Mobile Device Smartphones Mobile Devices communications Android Workplace Strategy Business Management VoIP Saving Money Smartphone Managed IT Services Microsoft Office Data Recovery Browser Managed Service Social Media Passwords Network Upgrade Backup Disaster Recovery Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Remote Work Server Managed Service Provider Artificial Intelligence Windows Facebook Miscellaneous Spam Encryption Gadgets Outsourced IT Employee/Employer Relationship Information Holiday Windows 10 Government Data Management Business Continuity Productivity Wi-Fi Blockchain Windows 10 Business Technology Apps Current Events Compliance Data Security Two-factor Authentication Virtualization Bandwidth Employer-Employee Relationship Apple App Office Networking Mobile Device Management Managed Services Gmail Voice over Internet Protocol Vendor Chrome Budget Conferencing Hacker Avoiding Downtime How To BDR Computing Mobile Office Information Technology Office 365 Applications Access Control Retail Computers Managed IT Services Operating System Website Marketing Risk Management BYOD HIPAA Router Analytics Office Tips Virtual Private Network Augmented Reality Training WiFi Health Big Data Storage Password Bring Your Own Device Help Desk Document Management Excel Microsoft 365 AI Customer Service Solutions Going Green Scam Data loss Telephone Cybercrime Cooperation Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Firewall Remote Workers Display IT Support Healthcare Printer The Internet of Things Paperless Office Infrastructure Free Resource Social Windows 11 Project Management Monitoring Windows 7 Tip of the week Multi-Factor Authentication Mobility Administration Customer Relationship Management Saving Time Maintenance Hacking Managed IT Service Antivirus Employees Presentation Downloads Integration Settings Wireless Wireless Technology Licensing Printing Content Filtering Entertainment Data Privacy Holidays YouTube Data Storage Robot Cryptocurrency Word Telephone System Video Conferencing Cost Management Managed Services Provider Virtual Machines Professional Services Virtual Desktop Data storage LiFi IT Management VPN Meetings Safety Outlook Computer Repair Money iPhone Modem Humor User Tip Processor Mobile Security Vulnerabilities Sports Images 101 2FA Mouse Smart Technology Machine Learning Supply Chain Organization Outsourcing Writing Addiction Language Mobile Computing Lenovo Search Digital Security Cameras Virtual Reality Management Smart Devices Chatbots Screen Reader Memory Distributed Denial of Service Best Practice Server Management Private Cloud Remote Working Workplace Identity Theft Hiring/Firing Service Level Agreement Data Breach Competition Computing Infrastructure Google Play Buisness Superfish IT solutions Videos Twitter Electronic Health Records Paperless Identity Legal Smart Tech Wasting Time Business Growth Error Bookmark Co-managed IT Technology Care Social Engineering Download Trend Micro Alerts Security Cameras User Cortana Remote Computing Software as a Service Business Communications Connectivity Managing Costs Break Fix Alt Codes Browsers Scams Tablet Hybrid Work Upload eCommerce SSID Downtime Multi-Factor Security Hosted Solution Alert Social Network Surveillance Human Resources IP Address Virtual Assistant Cables Dark Data IoT Virtual Machine Dark Web Typing Managed IT File Sharing Reviews How To Trends Medical IT Recovery Google Calendar Knowledge Notifications Customer Resource management Development Google Apps Regulations Google Drive Transportation IT Maintenance Star Wars Hypervisor Hard Drives Microsoft Excel Travel Data Analysis 5G Google Maps Shopping Business Intelligence Gamification Optimization Domains Staff PowerPoint Techology Employer/Employee Relationships Legislation Unified Communications Experience Shortcuts Social Networking Google Docs PCI DSS Ransmoware Refrigeration Bitcoin Navigation Running Cable Unified Threat Management Fileless Malware Gig Economy Vendors Content Public Speaking Wearable Technology Google Wallet Unified Threat Management Teamwork Comparison Health IT Internet Service Provider Be Proactive Lithium-ion battery Motherboard Directions Regulations Compliance Workforce Network Congestion Assessment Permissions Windows 8 Evernote Entrepreneur Laptop User Error Threats Physical Security Memes Drones SQL Server Specifications Net Neutrality Workplace Strategies Point of Sale Microchip Financial Data Meta Internet Exlporer History Undo Fraud Halloween Smartwatch Amazon Username IT Azure Black Friday Network Management Tech Support Procurement Telework Outsource IT Monitors Database Cyber security Hacks Tech Scary Stories Fun CES Environment Communitications Media IT Technicians Cookies Application Cyber Monday Deep Learning Websites Proxy Server Supply Chain Management FinTech Small Businesses Tactics Hotspot Term Education SharePoint Displays Electronic Medical Records IT Assessment IBM Mirgation Nanotechnology Value Flexibility

Blog Archive