Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery Smartphones Business Management VoIP Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Managed Services Gmail Voice over Internet Protocol Budget WiFi Apple Networking BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To Operating System Router Computers Risk Management Virtual Private Network Website Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Solutions Cybercrime Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone The Internet of Things Scam Data loss Free Resource Social Cooperation Project Management Images 101 Robot Multi-Factor Authentication Mobility Telephone System Cost Management Customer Relationship Management Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Employees Presentation VPN Integration Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Word Outlook Video Conferencing Managed Services Provider Machine Learning Virtual Machines Professional Services Money Saving Time Humor Managed IT Service Maintenance Safety Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Data Privacy IT solutions Star Wars How To Microsoft Excel IT Assessment IBM IT Maintenance Legal Data Analysis Value Business Intelligence Business Growth Gamification Notifications Staff Flexibility Organization Legislation Shortcuts Travel Social Networking Techology Fileless Malware Google Maps Digital Security Cameras Cortana Smart Devices Ransmoware Memory Vendors Alt Codes Content Wearable Technology Remote Working Downtime Unified Threat Management Motherboard Comparison Data Breach Competition Google Play Be Proactive Health IT Unified Threat Management Directions Hosted Solution Assessment Videos Permissions Electronic Health Records Workforce Wasting Time Threats Typing Network Congestion Specifications Trend Micro Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Knowledge Fraud Software as a Service Meta User Managing Costs Amazon Username Point of Sale 5G Black Friday eCommerce SSID Google Docs Unified Communications Database Experience Surveillance IP Address Virtual Assistant Outsource IT Virtual Machine Environment Media Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Reviews Monitors Cyber Monday Medical IT Google Wallet Proxy Server Tactics Hotspot Development Transportation Small Businesses Recovery Hypervisor Displays Hard Drives Windows 8 Laptop Websites Mirgation Nanotechnology Shopping Optimization Domains PowerPoint Drones SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Refrigeration Navigation Management Halloween Chatbots PCI DSS Screen Reader Gig Economy Writing Distributed Denial of Service Public Speaking Workplace Lenovo Service Level Agreement Virtual Reality Computing Infrastructure Internet Service Provider Lithium-ion battery Teamwork Hiring/Firing Regulations Compliance Evernote Paperless Entrepreneur Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Memes Co-managed IT Superfish Bookmark SQL Server Technology Care Deep Learning Download Twitter Alerts Net Neutrality Financial Data History Undo Business Communications Error Education Connectivity Smartwatch Social Engineering Break Fix IT Scams Browsers Azure Hybrid Work Upload Remote Computing Procurement Telework Multi-Factor Security Cyber security Tech Human Resources Mobile Computing Social Network Tablet IoT CES Search Dark Web Communitications Cables Application Best Practice Trends Alert Supply Chain Management FinTech Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management Buisness File Sharing Regulations

Blog Archive