Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Hardware Efficiency Network Security User Tips Internet IT Services Malware Phishing IT Support Google Privacy Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware AI Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Facebook Artificial Intelligence Training Compliance Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Business Technology Blockchain Windows 10 Wi-Fi Virtualization Mobile Office Vendor Data Security Two-factor Authentication Managed Services Apps Budget Apple App Tip of the week Mobile Device Management Gmail Networking WiFi Employer-Employee Relationship Chrome BYOD Voice over Internet Protocol Physical Security Password Hacker Access Control Avoiding Downtime Marketing HIPAA Computing Applications Managed IT Services Information Technology How To BDR Office 365 Conferencing Healthcare Storage Virtual Private Network Computers Bring Your Own Device Health Website Retail Router Operating System Risk Management 2FA Help Desk Big Data Office Tips Analytics Augmented Reality Telephone Customer Service Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Microsoft 365 Going Green Document Management Solutions Firewall Cybercrime Scam Data loss The Internet of Things Windows 11 Monitoring Social Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Managed IT Service VPN Meetings Downloads iPhone Hacking Sports Licensing Presentation Computer Repair Mouse Entertainment Vulnerabilities Data Privacy Wireless Technology Administration Images 101 Multi-Factor Authentication Mobility Telephone System Cost Management Machine Learning Word Settings Printing Wireless Maintenance Employees Content Filtering Antivirus Integration YouTube Modem User Tip Cryptocurrency Processor Safety Mobile Security Holidays Virtual Desktop Data Storage Smart Technology Supply Chain Data storage LiFi Video Conferencing Robot Managed Services Provider Saving Time Virtual Machines Professional Services Outlook Money IT Management Customer Relationship Management Humor Network Congestion Hacks Scary Stories Download Net Neutrality Alerts SQL Server Technology Care History Competition Business Communications User Error Financial Data Fun Browsers Smartwatch Connectivity IT Break Fix Scams Deep Learning Upload Procurement Point of Sale Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Education Social Network Telework CES Network Management IoT Communitications Tech Support Dark Web Cables User Monitors Mobile Computing Trends Supply Chain Management Regulations Google Calendar Term Google Apps Customer Resource management FinTech Search Data Analysis Star Wars IT Assessment IP Address Websites Microsoft Excel IT Maintenance Best Practice Buisness Gamification Flexibility Staff Value Business Intelligence Social Networking Electronic Medical Records Legislation Shortcuts Legal IT solutions SharePoint Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Recovery Business Growth Hard Drives Writing Lenovo Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Domains Virtual Reality Comparison Google Play Be Proactive Health IT Cortana Directions Videos Server Management Assessment Electronic Health Records Private Cloud Permissions Workforce Alt Codes Refrigeration Downtime Superfish Identity Theft Wasting Time Threats Trend Micro Public Speaking Twitter Specifications Security Cameras Workplace Strategies Hosted Solution Microchip Internet Exlporer Software as a Service Lithium-ion battery Error Fraud Meta Typing Social Engineering Entrepreneur Username Managing Costs Amazon eCommerce Remote Computing Black Friday SSID Google Drive Knowledge Database Surveillance Virtual Assistant Outsource IT Undo Media 5G Tablet IT Technicians Virtual Machine Environment Proxy Server Reviews Experience Cookies Alert Cyber Monday Medical IT Google Docs Unified Communications Bitcoin Running Cable Managed IT Tactics Development File Sharing Hotspot Transportation Small Businesses Dark Data Mirgation Hypervisor Displays How To Google Wallet Shopping Nanotechnology Optimization Notifications PowerPoint Windows 8 Laptop Addiction Travel Language Employer/Employee Relationships Outsourcing Application Google Maps Chatbots Navigation Drones Techology Management PCI DSS Gig Economy Screen Reader IBM Distributed Denial of Service Workplace Halloween Service Level Agreement Internet Service Provider Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Unified Threat Management Regulations Compliance Bookmark Smart Tech Memes Co-managed IT

Blog Archive