Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Information Automation Covid-19 Cloud Computing Holiday Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps Managed Services Chrome Voice over Internet Protocol Budget Networking Apple Mobile Device Management App Gmail BYOD Employer-Employee Relationship Tip of the week Hacker Avoiding Downtime Conferencing Marketing How To BDR WiFi Computing HIPAA Information Technology Applications Access Control Office 365 Augmented Reality Computers Help Desk Retail Healthcare Storage Password 2FA Website Bring Your Own Device Managed IT Services Operating System Big Data Virtual Private Network Risk Management Router Health Analytics Office Tips Document Management Monitoring Remote Workers Windows 11 Scam Data loss Free Resource Excel Project Management Telephone Windows 7 Firewall Microsoft 365 Cooperation Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Cybercrime Physical Security Social Display Printer Paperless Office Infrastructure Customer Service Presentation Money Smart Technology Humor Wireless Technology iPhone Saving Time Maintenance Sports Antivirus Mouse Vulnerabilities Supply Chain Managed IT Service Downloads Word Administration Images 101 Licensing Multi-Factor Authentication Mobility Entertainment Robot Safety Settings Wireless Printing Telephone System Content Filtering Employees Integration Cost Management IT Management VPN Meetings YouTube Data Privacy Cryptocurrency Holidays Computer Repair Data Storage Virtual Desktop LiFi User Tip Modem Customer Relationship Management Data storage Video Conferencing Processor Mobile Security Managed Services Provider Professional Services Virtual Machines Outlook Machine Learning Hacking Lenovo Mirgation Regulations Compliance Writing Evernote Amazon User Nanotechnology Memes Virtual Reality Net Neutrality Private Cloud SQL Server Hacks Scary Stories Addiction Outsource IT Server Management Language Environment Superfish Fun Chatbots Media Financial Data Identity Theft History Management Deep Learning Screen Reader Smartwatch Distributed Denial of Service IT Twitter IP Address Procurement Error Azure Service Level Agreement Small Businesses Computing Infrastructure Displays Identity Telework Cyber security Social Engineering Tech Education Recovery Bookmark Smart Tech CES Communitications Remote Computing Supply Chain Management Hard Drives Mobile Computing Download Outsourcing Alerts Search FinTech Tablet Domains Term Best Practice Browsers Connectivity Workplace Break Fix IT Assessment Alert Flexibility File Sharing Value Dark Data Refrigeration Buisness Upload Hiring/Firing Managed IT Social Network Paperless Organization Multi-Factor Security How To Public Speaking Legal IT solutions Business Growth IoT Co-managed IT Digital Security Cameras Dark Web Smart Devices Notifications Lithium-ion battery Remote Working Travel Memory Entrepreneur Trends Technology Care Customer Resource management Techology Cortana Regulations Business Communications Google Maps Google Calendar Data Breach Google Play Alt Codes Data Analysis Star Wars Scams Videos Microsoft Excel Electronic Health Records Staff Unified Threat Management Wasting Time Undo Downtime Gamification Hybrid Work Hosted Solution Unified Threat Management Social Networking Human Resources Legislation Trend Micro Security Cameras Software as a Service Typing Fileless Malware Cables Wearable Technology Managing Costs Network Congestion Content SSID Health IT User Error Knowledge Motherboard Google Apps Comparison eCommerce Google Drive Surveillance Virtual Assistant Application Directions Assessment IT Maintenance Permissions 5G Point of Sale Virtual Machine Business Intelligence Medical IT Unified Communications Experience Shortcuts Reviews Specifications IBM Google Docs Development Tech Support Transportation Bitcoin Microchip Running Cable Internet Exlporer Ransmoware Network Management Fraud Hypervisor Monitors Google Wallet Username Vendors PowerPoint Be Proactive Shopping Black Friday Optimization Websites Employer/Employee Relationships Windows 8 Laptop Database Workforce IT Technicians PCI DSS Competition Drones Navigation Threats Proxy Server SharePoint Cookies Workplace Strategies Gig Economy Cyber Monday Electronic Medical Records Internet Service Provider Teamwork Halloween Tactics Meta Hotspot

Blog Archive