Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Hosted Solutions Collaboration Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Gadgets Covid-19 Cloud Computing Training Remote Work Server Compliance Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Wi-Fi Business Technology Blockchain Windows 10 Vendor Apps Data Security Mobile Office Two-factor Authentication Managed Services Gmail Tip of the week Voice over Internet Protocol Chrome Budget WiFi Apple Networking Employer-Employee Relationship App BYOD Mobile Device Management HIPAA Applications How To BDR Conferencing Hacker Computing Avoiding Downtime Information Technology Marketing Access Control Office 365 Analytics Office Tips Augmented Reality Healthcare Router Retail Storage Big Data Password Bring Your Own Device Managed IT Services Help Desk Computers Operating System Website Virtual Private Network Risk Management Health 2FA Excel Remote Workers Document Management The Internet of Things Scam Free Resource Social Project Management Data loss Windows 7 Monitoring Microsoft 365 Going Green Customer Service Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Telephone Physical Security Display Printer Cooperation Paperless Office Windows 11 Infrastructure Firewall Outlook Machine Learning Money Safety Humor iPhone Maintenance Modem Antivirus Sports Vulnerabilities User Tip Processor Mouse Mobile Security Images 101 Administration Mobility Data Privacy Multi-Factor Authentication Customer Relationship Management Smart Technology Robot Saving Time Hacking Presentation Settings Employees Printing Managed IT Service Integration Wireless Content Filtering Wireless Technology IT Management Downloads VPN YouTube Meetings Licensing Holidays Cryptocurrency Entertainment Computer Repair Data Storage Word Video Conferencing Virtual Desktop Data storage LiFi Managed Services Provider Virtual Machines Professional Services Telephone System Cost Management Supply Chain Evernote Entrepreneur Electronic Medical Records Outsourcing Content Regulations Compliance SharePoint Wearable Technology Motherboard Memes Halloween Comparison Health IT Directions Assessment Net Neutrality Lenovo Permissions SQL Server Writing Workplace Virtual Reality Hiring/Firing Financial Data History Undo IT Server Management Scary Stories Specifications Private Cloud Paperless Smartwatch Hacks Microchip Internet Exlporer Procurement Superfish Fraud Azure Identity Theft Fun Co-managed IT Tech Twitter Technology Care Username Telework Deep Learning Cyber security Communitications Black Friday Error Business Communications CES Database Supply Chain Management Education Application Social Engineering Scams Term Remote Computing Hybrid Work FinTech IT Technicians Mobile Computing Cookies IT Assessment IBM Cyber Monday Human Resources Proxy Server Cables Tactics Flexibility Hotspot Value Tablet Search Alert Organization Best Practice Mirgation Nanotechnology Smart Devices Managed IT Buisness File Sharing Dark Data Google Apps Digital Security Cameras IT Maintenance Legal Addiction Remote Working IT solutions Language Memory How To Google Play Notifications Business Intelligence Management Business Growth Chatbots Data Breach Competition Screen Reader Electronic Health Records Distributed Denial of Service Travel Shortcuts Videos Ransmoware Service Level Agreement Techology Computing Infrastructure Wasting Time Google Maps Cortana Security Cameras Vendors Alt Codes Identity Trend Micro Smart Tech Software as a Service Downtime User Unified Threat Management Be Proactive Bookmark Workforce Download Unified Threat Management Hosted Solution Alerts Managing Costs eCommerce SSID Threats Typing Connectivity Surveillance IP Address Break Fix Virtual Assistant Network Congestion Workplace Strategies Browsers Meta Google Drive Upload User Error Virtual Machine Knowledge Multi-Factor Security Medical IT Amazon Social Network Reviews IoT Development Dark Web Transportation Recovery Point of Sale 5G Outsource IT Google Docs Trends Unified Communications Hypervisor Hard Drives Experience Optimization Domains Network Management Running Cable Google Calendar PowerPoint Tech Support Environment Media Customer Resource management Shopping Bitcoin Regulations Google Wallet Star Wars Microsoft Excel Employer/Employee Relationships Monitors Data Analysis Navigation Small Businesses Gamification PCI DSS Staff Refrigeration Public Speaking Laptop Legislation Websites Displays Gig Economy Windows 8 Social Networking Fileless Malware Drones Internet Service Provider Lithium-ion battery Teamwork

Blog Archive