Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Microsoft Small Business Workplace Strategy Cybersecurity Data Backup Communication Smartphone Passwords Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Backup Upgrade Data Recovery Managed Service Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Tech Term Network Windows Internet of Things Remote Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Server Managed Service Provider Miscellaneous Current Events Gadgets Remote Work Productivity Holiday Outsourced IT Information AI Encryption Spam Employee/Employer Relationship Windows 10 Office Training Compliance Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Apple Networking App Vendor Employer-Employee Relationship Information Technology Avoiding Downtime Access Control Marketing Conferencing Office 365 Tip of the week WiFi How To BDR Applications BYOD Computing Hacker Risk Management Help Desk Virtual Private Network Website Health Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data HIPAA Router Operating System Computers Monitoring 2FA Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone IT Support Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cybercrime Windows 11 Data Storage Cryptocurrency Smart Technology Supply Chain Wireless Technology Computer Repair Video Conferencing Managed Services Provider Virtual Desktop Saving Time Virtual Machines Professional Services Data storage LiFi Word Managed IT Service Outlook Downloads Machine Learning iPhone Money Licensing Humor Entertainment Vulnerabilities Data Privacy Safety Maintenance Antivirus Sports Images 101 Mouse Telephone System Multi-Factor Authentication Mobility Administration Cost Management Employees Robot Customer Relationship Management Integration Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security Hacking IT Management YouTube Meetings Holidays Presentation VPN Physical Security Mirgation Hypervisor Displays Point of Sale Shopping 5G Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing IP Address Google Docs Unified Communications Experience Addiction Management PCI DSS Chatbots Navigation Bitcoin Network Management Running Cable Tech Support Gig Economy Monitors Screen Reader Distributed Denial of Service Workplace Google Wallet Computing Infrastructure Teamwork Hiring/Firing Recovery Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Hard Drives Windows 8 Laptop Websites Bookmark Smart Tech Memes Co-managed IT Domains Drones Alerts SQL Server Technology Care SharePoint Electronic Medical Records Download Net Neutrality Financial Data History Business Communications Refrigeration Halloween Browsers Smartwatch Writing Connectivity IT Break Fix Scams Public Speaking Lenovo Azure Hybrid Work Lithium-ion battery Virtual Reality Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft CES Fun IoT Communitications Dark Web Cables Superfish Deep Learning Twitter Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Undo Error Education Data Analysis Social Engineering Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Remote Computing Gamification Flexibility Organization Social Networking Legislation Shortcuts Mobile Computing Tablet Fileless Malware Digital Security Cameras Search Smart Devices Ransmoware Wearable Technology Memory Vendors Application Best Practice Alert Content Remote Working Health IT Dark Data Motherboard Data Breach Comparison Google Play Be Proactive Managed IT Buisness File Sharing IT solutions Directions Videos How To Assessment Electronic Health Records Permissions Workforce IBM Legal Wasting Time Threats Business Growth Notifications Trend Micro Specifications Security Cameras Workplace Strategies Travel Techology Google Maps Microchip Cortana Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Alt Codes Username Downtime Unified Threat Management eCommerce Black Friday SSID Competition Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Typing Proxy Server Reviews Network Congestion Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Google Drive User Error User Knowledge Tactics Development

Blog Archive