Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Data Security Two-factor Authentication Mobile Office Vendor Apps Networking BYOD Chrome Mobile Device Management Budget Gmail WiFi Apple Tip of the week App Managed Services Voice over Internet Protocol Employer-Employee Relationship Computing How To Hacker Information Technology BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control Conferencing Managed IT Services Computers Risk Management Website Analytics Office Tips Router Augmented Reality Physical Security Virtual Private Network Storage Password Bring Your Own Device Health 2FA Help Desk Big Data Retail Healthcare Operating System Customer Service Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Display Printer Paperless Office Windows 11 Infrastructure The Internet of Things Monitoring Excel Social Document Management Going Green Remote Workers Telephone Scam Data loss Cybercrime YouTube Entertainment Vulnerabilities Hacking Presentation Cryptocurrency Data Privacy Images 101 Wireless Technology Multi-Factor Authentication Robot Mobility Telephone System Virtual Desktop LiFi Cost Management Data storage Outlook Word IT Management Meetings Money VPN Employees Humor Integration Modem User Tip Processor Computer Repair Mobile Security Sports Holidays Safety Mouse Data Storage Administration Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Managed IT Service Maintenance Settings Wireless Downloads Customer Relationship Management Printing Antivirus Content Filtering iPhone Licensing Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Knowledge Dark Web Cables Google Drive Trends Supply Chain Management Alert File Sharing Regulations 5G Dark Data Google Calendar Term Google Apps User Managed IT Customer Resource management FinTech Data Analysis Unified Communications Star Wars IT Assessment Experience How To Microsoft Excel IT Maintenance Google Docs Bitcoin Gamification Flexibility Running Cable Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts IP Address Google Wallet Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Windows 8 Content Remote Working Laptop Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Recovery Drones Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Hard Drives Domains Halloween Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Refrigeration User Error Microchip Internet Exlporer Software as a Service Fraud Meta Public Speaking Hacks Username Scary Stories Managing Costs Amazon Point of Sale eCommerce Fun Black Friday SSID Lithium-ion battery Entrepreneur Deep Learning Database Surveillance Virtual Assistant Outsource IT Media Network Management Tech Support IT Technicians Virtual Machine Environment Education Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Undo Tactics Development Hotspot Transportation Small Businesses Mobile Computing Websites Mirgation Hypervisor Displays Nanotechnology Optimization Search PowerPoint Shopping SharePoint Best Practice Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Buisness Chatbots IT solutions Screen Reader Writing Distributed Denial of Service Workplace Application Legal Lenovo Gig Economy Business Growth Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless IBM Server Management Regulations Compliance Private Cloud Identity Superfish Bookmark Identity Theft Smart Tech Memes Cortana Co-managed IT Alt Codes Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Financial Data Downtime Browsers Smartwatch Hosted Solution Connectivity IT Social Engineering Break Fix Scams Competition Typing Upload Procurement Remote Computing Azure Hybrid Work

Blog Archive