Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Training Covid-19 Gadgets Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Conferencing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications How To BDR Physical Security Risk Management Virtual Private Network Computers Healthcare Health Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Router Managed IT Services Big Data 2FA Help Desk Operating System Customer Service Display Remote Workers Printer Telephone Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Firewall Scam Solutions Data loss The Internet of Things Social Going Green Patch Management Windows 11 Save Money Monitoring Remote Monitoring End of Support Vulnerability Vendor Management Excel Cybercrime YouTube Meetings Saving Time Virtual Machines VPN Professional Services Cryptocurrency Managed IT Service Hacking Presentation Computer Repair Downloads iPhone Virtual Desktop Data storage Licensing LiFi Wireless Technology Vulnerabilities Entertainment Outlook Data Privacy Machine Learning Images 101 Money Humor Word Telephone System Multi-Factor Authentication Mobility Cost Management Maintenance Sports Antivirus Mouse Employees Safety Integration Administration User Tip Modem Mobile Security Processor Robot Holidays Data Storage Settings Wireless Printing Smart Technology Supply Chain Content Filtering Video Conferencing Managed Services Provider IT Management Customer Relationship Management Network Congestion Gig Economy Screen Reader Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Google Drive User Error Computing Infrastructure Teamwork Hiring/Firing Competition Knowledge Regulations Compliance Identity Evernote Paperless Co-managed IT Point of Sale 5G Bookmark Smart Tech Memes Download Net Neutrality Google Docs Alerts SQL Server Technology Care Unified Communications Experience Financial Data History Bitcoin Network Management Business Communications Running Cable Tech Support User Break Fix Scams Monitors Browsers Smartwatch Connectivity IT Google Wallet Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Windows 8 IP Address Multi-Factor Security Tech Human Resources Laptop Websites Dark Web Cables CES IoT Communitications Drones Trends Supply Chain Management SharePoint Electronic Medical Records Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Halloween Microsoft Excel IT Maintenance Hard Drives Writing Data Analysis Star Wars IT Assessment Lenovo Gamification Flexibility Staff Value Business Intelligence Domains Virtual Reality Organization Social Networking Hacks Server Management Legislation Shortcuts Scary Stories Private Cloud Superfish Ransmoware Identity Theft Refrigeration Fun Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Deep Learning Public Speaking Twitter Error Health IT Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Permissions Workforce Education Social Engineering Entrepreneur Directions Videos Assessment Electronic Health Records Wasting Time Threats Remote Computing Trend Micro Mobile Computing Specifications Security Cameras Workplace Strategies Fraud Meta Tablet Undo Search Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Best Practice Alert Buisness File Sharing Dark Data eCommerce Managed IT Black Friday SSID Legal Virtual Assistant Outsource IT IT solutions How To Database Surveillance IT Technicians Virtual Machine Environment Business Growth Media Notifications Travel Application Proxy Server Reviews Cookies Cyber Monday Medical IT Techology Hotspot Transportation Small Businesses Google Maps Cortana Tactics Development Mirgation Hypervisor Displays Alt Codes IBM Downtime Unified Threat Management Shopping Nanotechnology Optimization PowerPoint Unified Threat Management Language Employer/Employee Relationships Outsourcing Hosted Solution Addiction Management PCI DSS Chatbots Typing Navigation

Blog Archive