Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Compliance Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Vendor Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Information Technology Applications Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Computing HIPAA Hacker Router Risk Management Virtual Private Network Website Health 2FA Analytics Office Tips Help Desk Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Operating System Computers Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers The Internet of Things Scam Data loss Telephone Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Customer Service Vendor Management Cybercrime Solutions Employees Cryptocurrency Integration Wireless Technology Computer Repair User Tip Modem Virtual Desktop Processor Mobile Security Data storage LiFi Holidays Word Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Saving Time Virtual Machines Professional Services Safety Maintenance Sports Managed IT Service Antivirus Mouse Downloads iPhone Administration Licensing Entertainment Vulnerabilities Data Privacy Images 101 Robot Customer Relationship Management Telephone System Multi-Factor Authentication Mobility Settings Wireless Cost Management Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Trend Micro Specifications Security Cameras Workplace Strategies Point of Sale Microchip 5G Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon IP Address Google Docs Unified Communications Experience Username eCommerce Black Friday SSID Bitcoin Network Management Running Cable Tech Support Google Wallet Monitors Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Recovery Laptop Websites Proxy Server Reviews Cookies Cyber Monday Medical IT Hard Drives Windows 8 Domains Drones Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays SharePoint Electronic Medical Records Halloween Shopping Nanotechnology Optimization PowerPoint Refrigeration Public Speaking Lenovo Writing Addiction Language Employer/Employee Relationships Outsourcing Chatbots Lithium-ion battery Navigation Virtual Reality Management PCI DSS Entrepreneur Scary Stories Private Cloud Gig Economy Screen Reader Distributed Denial of Service Workplace Hacks Server Management Superfish Identity Theft Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Deep Learning Twitter Regulations Compliance Error Bookmark Smart Tech Memes Co-managed IT Undo Education Social Engineering Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Remote Computing Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Mobile Computing Tablet Search Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Application Best Practice Alert Buisness File Sharing CES Dark Data IoT Communitications Dark Web Cables Managed IT IBM Legal IT solutions How To Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Business Growth Notifications Travel Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Techology Google Maps Cortana Gamification Flexibility Organization Social Networking Legislation Shortcuts Alt Codes Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Ransmoware Competition Wearable Technology Memory Vendors Unified Threat Management Hosted Solution Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Typing Directions Videos Network Congestion Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Google Drive User Error User Knowledge

Blog Archive