Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Chrome Gmail Budget Networking WiFi Apple App Employer-Employee Relationship BYOD Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Office 365 Conferencing How To BDR HIPAA Operating System Virtual Private Network Computers Risk Management Health 2FA Help Desk Website Analytics Office Tips Retail Augmented Reality Healthcare Storage Managed IT Services Password Bring Your Own Device Big Data Router Physical Security Customer Service Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Patch Management Social Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Going Green Content Filtering User Tip Hacking Modem YouTube Mobile Security Computer Repair Processor Presentation Cryptocurrency Holidays Wireless Technology Data Storage Supply Chain Smart Technology Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Machine Learning Professional Services Saving Time Virtual Machines Word Outlook Managed IT Service Maintenance Money Humor Antivirus Downloads iPhone Licensing Safety Vulnerabilities Entertainment Sports Data Privacy Mouse Images 101 Administration Telephone System Multi-Factor Authentication Mobility Robot Cost Management Customer Relationship Management IT Management Employees VPN Meetings Settings Integration Wireless Printing Username Hosted Solution Managing Costs Amazon Typing eCommerce Point of Sale SSID Black Friday Virtual Assistant Outsource IT Database Surveillance Google Drive Network Management User IT Technicians Virtual Machine Environment Tech Support Knowledge Media Proxy Server Reviews Cookies Medical IT Monitors Cyber Monday Hotspot Transportation Small Businesses 5G Tactics Development IP Address Google Docs Unified Communications Mirgation Hypervisor Displays Websites Experience Shopping Bitcoin Nanotechnology Optimization Running Cable PowerPoint Addiction Language Employer/Employee Relationships Outsourcing Electronic Medical Records SharePoint Google Wallet Management PCI DSS Recovery Chatbots Navigation Distributed Denial of Service Workplace Writing Gig Economy Lenovo Hard Drives Windows 8 Screen Reader Laptop Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Domains Drones Regulations Compliance Server Management Identity Private Cloud Evernote Paperless Co-managed IT Bookmark Superfish Refrigeration Smart Tech Memes Identity Theft Halloween Download Net Neutrality Alerts SQL Server Technology Care Twitter Public Speaking Lithium-ion battery Financial Data History Error Business Communications Break Fix Scams Social Engineering Browsers Smartwatch Hacks Connectivity IT Entrepreneur Scary Stories Upload Procurement Azure Hybrid Work Remote Computing Fun Social Network Telework Deep Learning Cyber security Tech Human Resources Multi-Factor Security Dark Web Cables CES Undo IoT Communitications Tablet Trends Supply Chain Management Education Alert Customer Resource management FinTech Managed IT Regulations File Sharing Term Google Apps Dark Data Google Calendar Microsoft Excel IT Maintenance How To Data Analysis Mobile Computing Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Notifications Search Organization Application Best Practice Social Networking Travel Shortcuts Legislation Ransmoware Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Buisness IBM Legal Content Remote Working IT solutions Wearable Technology Memory Vendors Health IT Business Growth Motherboard Data Breach Unified Threat Management Google Play Be Proactive Comparison Permissions Workforce Directions Videos Unified Threat Management Assessment Electronic Health Records Wasting Time Threats Cortana Alt Codes Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Downtime Fraud Meta Microchip User Error Competition Internet Exlporer Software as a Service

Blog Archive