Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Compliance Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Mobile Office Data Security Vendor Apps Managed Services Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Voice over Internet Protocol Avoiding Downtime Office 365 Marketing Managed IT Services How To HIPAA BDR Applications Computing Physical Security Information Technology Hacker Conferencing Access Control Healthcare Website Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Router Big Data Operating System 2FA Help Desk Virtual Private Network Risk Management Computers Health Telephone Document Management Cooperation Free Resource Project Management Windows 7 Firewall Scam Data loss Microsoft 365 The Internet of Things Solutions Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Cybercrime Monitoring Customer Service Display Excel Printer Paperless Office Managed IT Service Remote Workers Infrastructure Downloads iPhone Outlook Machine Learning Licensing Money Vulnerabilities Word Humor Entertainment Data Privacy Images 101 Maintenance Antivirus Sports Mouse Telephone System Multi-Factor Authentication Mobility Cost Management Safety Administration Employees Integration Robot User Tip Modem Settings Mobile Security Processor Printing Wireless Content Filtering Holidays IT Management Customer Relationship Management VPN Data Storage YouTube Meetings Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Hacking Computer Repair Professional Services Saving Time Virtual Machines Presentation Virtual Desktop Data storage LiFi Wireless Technology Windows 8 Download Net Neutrality IP Address Laptop Websites Alerts SQL Server Technology Care Drones Financial Data History Business Communications Electronic Medical Records Break Fix Scams SharePoint Browsers Smartwatch Connectivity IT Upload Procurement Halloween Azure Hybrid Work Recovery Lenovo Social Network Telework Cyber security Hard Drives Writing Multi-Factor Security Tech Human Resources Domains Virtual Reality Dark Web Cables CES IoT Communitications Hacks Server Management Trends Supply Chain Management Scary Stories Private Cloud Superfish Customer Resource management FinTech Identity Theft Regulations Refrigeration Fun Google Calendar Term Google Apps Public Speaking Twitter Microsoft Excel IT Maintenance Data Analysis Deep Learning Star Wars IT Assessment Gamification Flexibility Lithium-ion battery Error Staff Value Business Intelligence Entrepreneur Organization Education Social Networking Social Engineering Legislation Shortcuts Smart Devices Remote Computing Ransmoware Fileless Malware Digital Security Cameras Mobile Computing Content Remote Working Wearable Technology Memory Vendors Search Comparison Google Play Be Proactive Health IT Tablet Motherboard Data Breach Undo Best Practice Assessment Electronic Health Records Alert Permissions Workforce Directions Videos Managed IT Buisness File Sharing Wasting Time Threats Dark Data How To Specifications Security Cameras Workplace Strategies Legal IT solutions Trend Micro Business Growth Internet Exlporer Software as a Service Notifications Fraud Meta Microchip Username Travel Managing Costs Amazon Application Cortana Black Friday SSID Techology Google Maps eCommerce Alt Codes Database Surveillance IBM Virtual Assistant Outsource IT Downtime Unified Threat Management IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Unified Threat Management Proxy Server Reviews Hosted Solution Cookies Typing Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Network Congestion Knowledge PowerPoint Google Drive User Error Shopping Nanotechnology Optimization Competition Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Point of Sale Chatbots 5G Navigation Experience Distributed Denial of Service Workplace Google Docs Gig Economy Unified Communications Screen Reader Bitcoin Network Management Service Level Agreement Internet Service Provider Running Cable Tech Support Computing Infrastructure Teamwork Hiring/Firing User Google Wallet Regulations Compliance Identity Monitors Evernote Paperless Co-managed IT Bookmark Smart Tech Memes

Blog Archive