Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Holiday Information Automation Covid-19 Cloud Computing Training Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Apple Networking Mobile Device Management App Gmail BYOD WiFi Employer-Employee Relationship Managed Services Tip of the week Voice over Internet Protocol Hacker Avoiding Downtime Conferencing Marketing How To BDR Computing Information Technology HIPAA Applications Access Control Office 365 Computers Augmented Reality Help Desk Healthcare Retail Storage Password Website Bring Your Own Device Managed IT Services Operating System Big Data Risk Management Virtual Private Network 2FA Router Health Analytics Office Tips Document Management Monitoring Free Resource Scam Project Management Data loss Windows 7 Telephone Microsoft 365 Firewall Going Green Cooperation Patch Management Solutions Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Cybercrime Physical Security Social Windows 11 Display Printer Paperless Office Infrastructure Excel Customer Service Remote Workers Presentation Money Humor Smart Technology iPhone Wireless Technology Maintenance Saving Time Sports Antivirus Vulnerabilities Data Privacy Mouse Managed IT Service Images 101 Word Administration Downloads Multi-Factor Authentication Mobility Licensing Entertainment Robot Employees Settings Safety Printing Wireless Integration Telephone System Content Filtering IT Management Cost Management Meetings YouTube VPN Holidays Cryptocurrency Computer Repair Data Storage Supply Chain Virtual Desktop Video Conferencing Managed Services Provider Customer Relationship Management User Tip Data storage Modem LiFi Mobile Security Virtual Machines Processor Professional Services Outlook Machine Learning Hacking Writing Mirgation Net Neutrality Lenovo SQL Server Technology Care History Business Communications Virtual Reality User Nanotechnology Financial Data Hacks Language Smartwatch Scary Stories IT Server Management Scams Private Cloud Addiction Identity Theft Management Chatbots Procurement Fun Superfish Azure Hybrid Work Telework Cyber security IP Address Tech Human Resources Twitter Screen Reader Deep Learning Distributed Denial of Service Computing Infrastructure CES Communitications Cables Error Service Level Agreement Social Engineering Identity Education Supply Chain Management FinTech Bookmark Term Google Apps Remote Computing Recovery Smart Tech Mobile Computing Alerts IT Assessment IT Maintenance Hard Drives Download Value Business Intelligence Tablet Domains Flexibility Search Organization Browsers Shortcuts Alert Connectivity Best Practice Break Fix Refrigeration Upload Dark Data Digital Security Cameras Buisness Smart Devices Managed IT Ransmoware File Sharing Memory Vendors Public Speaking Social Network Legal How To IT solutions Multi-Factor Security Remote Working Dark Web Data Breach Lithium-ion battery Google Play Be Proactive Notifications IoT Business Growth Trends Entrepreneur Videos Electronic Health Records Workforce Travel Techology Wasting Time Threats Google Maps Customer Resource management Regulations Google Calendar Cortana Microsoft Excel Trend Micro Data Analysis Security Cameras Workplace Strategies Star Wars Alt Codes Unified Threat Management Undo Gamification Staff Downtime Software as a Service Meta Unified Threat Management Managing Costs Amazon Social Networking Hosted Solution Legislation eCommerce Fileless Malware SSID Typing Content Network Congestion Wearable Technology Surveillance Virtual Assistant Outsource IT User Error Virtual Machine Environment Health IT Media Google Drive Motherboard Comparison Knowledge Permissions Reviews Directions Medical IT Application Assessment Point of Sale Development 5G Transportation Small Businesses Hypervisor Displays IBM Google Docs Unified Communications Specifications Experience Fraud Shopping Running Cable Optimization Network Management Microchip PowerPoint Tech Support Internet Exlporer Bitcoin Username Google Wallet Monitors Employer/Employee Relationships Outsourcing Navigation Black Friday PCI DSS Gig Economy Laptop Workplace Websites Database Windows 8 Competition Drones IT Technicians Internet Service Provider Teamwork Hiring/Firing SharePoint Proxy Server Evernote Paperless Electronic Medical Records Cookies Cyber Monday Regulations Compliance Hotspot Halloween Memes Co-managed IT Tactics

Blog Archive