Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Automation Information Facebook Artificial Intelligence Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Blockchain Business Technology Windows 10 Virtualization Bandwidth Vendor Two-factor Authentication Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome Networking Budget Employer-Employee Relationship Apple Managed Services BYOD App Voice over Internet Protocol Computing Access Control Information Technology HIPAA Applications WiFi Office 365 How To BDR Conferencing Hacker Avoiding Downtime Marketing Operating System Health Risk Management Router Retail Office Tips Analytics Big Data Augmented Reality Help Desk Managed IT Services Storage Password 2FA Bring Your Own Device Computers Healthcare Website Virtual Private Network Printer Cybercrime Paperless Office Free Resource Project Management Infrastructure Firewall Windows 7 Microsoft 365 Document Management The Internet of Things Solutions Social Scam Data loss Monitoring Windows 11 Patch Management Customer Service Excel Save Money Remote Monitoring Vulnerability Telephone End of Support Vendor Management Remote Workers Going Green Physical Security Cooperation Display Content Filtering Computer Repair Word Vulnerabilities YouTube Telephone System Data Privacy Cost Management Cryptocurrency Images 101 Multi-Factor Authentication Mobility Machine Learning Safety Virtual Desktop Data storage LiFi User Tip Modem Mobile Security Outlook Maintenance Processor Employees Antivirus Integration Money Humor Smart Technology Holidays Customer Relationship Management Sports Mouse Saving Time Data Storage Supply Chain Video Conferencing Robot Managed IT Service Administration Hacking Managed Services Provider Presentation Virtual Machines Professional Services Downloads Wireless Technology Licensing IT Management VPN Meetings Entertainment Settings iPhone Printing Wireless Hard Drives Star Wars Cyber security Microsoft Excel Tech Human Resources Hosted Solution Data Analysis Telework Typing CES Tech Support Domains Gamification Communitications Staff Cables Network Management Legislation Supply Chain Management Monitors Social Networking Refrigeration Knowledge Term Google Apps Google Drive Fileless Malware FinTech Websites Public Speaking Content IT Assessment Wearable Technology IT Maintenance Comparison Lithium-ion battery Health IT Flexibility 5G Motherboard Value Business Intelligence Electronic Medical Records Experience Assessment Entrepreneur Permissions Shortcuts SharePoint Google Docs Unified Communications Directions Organization Bitcoin Digital Security Cameras Running Cable Smart Devices Ransmoware Specifications Lenovo Google Wallet Remote Working Writing Memory Vendors Virtual Reality Undo Internet Exlporer Data Breach Fraud Google Play Be Proactive Microchip Server Management Windows 8 Videos Private Cloud Laptop Username Electronic Health Records Workforce Black Friday Superfish Drones Identity Theft Wasting Time Threats Twitter Database Trend Micro Security Cameras Workplace Strategies Error Halloween Software as a Service IT Technicians Meta Cyber Monday Proxy Server Social Engineering Application Cookies Managing Costs Amazon Remote Computing Tactics eCommerce Hotspot SSID Hacks IBM Scary Stories Surveillance Mirgation Virtual Assistant Outsource IT Media Tablet Fun Nanotechnology Virtual Machine Environment Alert Addiction Language Medical IT Deep Learning Reviews Managed IT File Sharing Management Development Dark Data Chatbots Transportation Small Businesses Distributed Denial of Service Education How To Screen Reader Hypervisor Displays Notifications Competition Service Level Agreement Optimization Computing Infrastructure PowerPoint Shopping Mobile Computing Travel Identity Employer/Employee Relationships Outsourcing Navigation Techology Google Maps Bookmark PCI DSS Search Smart Tech Download Alerts Workplace Best Practice Gig Economy Unified Threat Management Buisness Internet Service Provider User Teamwork Hiring/Firing Break Fix Evernote Paperless Unified Threat Management Legal IT solutions Browsers Regulations Compliance Connectivity Upload Memes Co-managed IT Business Growth IP Address Social Network Net Neutrality Network Congestion SQL Server Technology Care Multi-Factor Security IoT History Dark Web Business Communications User Error Financial Data Cortana Alt Codes Smartwatch Trends IT Scams Google Calendar Point of Sale Downtime Customer Resource management Procurement Recovery Regulations Azure Hybrid Work

Blog Archive