Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Gadgets Cloud Computing Compliance Training Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Data Security Managed Services Apps Two-factor Authentication Mobile Office Vendor WiFi Apple Networking App Employer-Employee Relationship Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To BDR Conferencing Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Storage Password Bring Your Own Device 2FA Big Data Help Desk Healthcare Operating System Computers Risk Management Virtual Private Network Website Health Analytics Office Tips Router Augmented Reality Retail The Internet of Things Scam Windows 11 Data loss Monitoring Social Excel Going Green Patch Management Remote Workers Save Money Managed IT Service Remote Monitoring Telephone End of Support Vulnerability Customer Service Vendor Management Cybercrime Cooperation Free Resource Project Management Display Printer Windows 7 Paperless Office Infrastructure Microsoft 365 Solutions Firewall Document Management Safety Processor Maintenance Mobile Security Antivirus Sports Mouse Holidays Data Storage Administration Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Customer Relationship Management Settings Wireless Downloads Printing Content Filtering iPhone Licensing Hacking IT Management YouTube Meetings Presentation VPN Entertainment Vulnerabilities Data Privacy Cryptocurrency Wireless Technology Images 101 Computer Repair Telephone System Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Cost Management Word Outlook Machine Learning Employees Money Humor Integration User Tip Modem Deep Learning Database Surveillance Twitter Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Undo Error Proxy Server Reviews Education Cookies Social Engineering Cyber Monday Medical IT Tactics Development Remote Computing Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Mobile Computing Shopping Tablet Nanotechnology Optimization Search PowerPoint Language Employer/Employee Relationships Outsourcing Application Best Practice Addiction Alert Management PCI DSS Buisness File Sharing Chatbots Dark Data Navigation Managed IT IBM Legal Gig Economy IT solutions Screen Reader How To Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Business Growth Service Level Agreement Internet Service Provider Notifications Regulations Compliance Travel Identity Evernote Paperless Techology Bookmark Google Maps Smart Tech Memes Cortana Co-managed IT Alerts SQL Server Technology Care Alt Codes Download Net Neutrality Financial Data Downtime Unified Threat Management History Business Communications Competition Unified Threat Management Browsers Smartwatch Hosted Solution Connectivity IT Break Fix Scams Azure Hybrid Work Typing Upload Procurement Social Network Telework Cyber security Network Congestion Multi-Factor Security Tech Human Resources Google Drive User Error User CES IoT Communitications Knowledge Dark Web Cables Trends Supply Chain Management Customer Resource management FinTech Point of Sale Regulations 5G Google Calendar Term Google Apps IP Address Google Docs Data Analysis Unified Communications Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Staff Value Business Intelligence Bitcoin Network Management Gamification Flexibility Running Cable Tech Support Organization Social Networking Monitors Legislation Shortcuts Google Wallet Recovery Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Hard Drives Windows 8 Content Remote Working Laptop Websites Health IT Motherboard Data Breach Comparison Google Play Be Proactive Domains Drones SharePoint Directions Videos Assessment Electronic Health Records Electronic Medical Records Permissions Workforce Wasting Time Threats Refrigeration Halloween Trend Micro Writing Specifications Security Cameras Workplace Strategies Public Speaking Lenovo Lithium-ion battery Microchip Internet Exlporer Software as a Service Virtual Reality Fraud Meta Managing Costs Amazon Hacks Server Management Entrepreneur Username Scary Stories Private Cloud Identity Theft eCommerce Fun Black Friday SSID Superfish

Blog Archive