Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Artificial Intelligence Automation Information Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Blockchain Mobile Office Data Security Two-factor Authentication Apps Vendor App Networking Managed Services Voice over Internet Protocol Mobile Device Management Gmail BYOD WiFi Chrome Budget Employer-Employee Relationship Tip of the week Apple Applications Avoiding Downtime How To Marketing BDR Computing Information Technology Conferencing Office 365 Access Control HIPAA Hacker 2FA Managed IT Services Website Operating System Help Desk Healthcare Risk Management Virtual Private Network Analytics Office Tips Big Data Augmented Reality Health Storage Password Bring Your Own Device Retail Router Computers Scam Data loss Going Green Excel Remote Workers Monitoring Cybercrime Patch Management Save Money Firewall Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 Physical Security Telephone The Internet of Things Display Microsoft 365 Printer Solutions Cooperation Social Paperless Office Infrastructure Document Management Customer Service Windows 11 Video Conferencing Supply Chain User Tip Managed Services Provider Modem Wireless Technology Professional Services Mobile Security Processor Virtual Machines Settings Printing Wireless Content Filtering Word Smart Technology iPhone YouTube Robot Saving Time Cryptocurrency Vulnerabilities Managed IT Service IT Management Safety Virtual Desktop VPN Data Privacy Meetings Images 101 Data storage LiFi Downloads Mobility Multi-Factor Authentication Licensing Computer Repair Outlook Entertainment Money Humor Employees Integration Telephone System Sports Machine Learning Cost Management Customer Relationship Management Mouse Holidays Hacking Administration Maintenance Data Storage Presentation Antivirus Social Engineering Username Legal Employer/Employee Relationships IT solutions Displays Remote Computing PCI DSS Business Growth Navigation Black Friday IP Address Outsourcing Gig Economy Database Internet Service Provider Teamwork IT Technicians Cortana Tablet Workplace Alert Regulations Compliance Proxy Server Cookies Alt Codes Evernote Cyber Monday Hotspot Recovery Downtime Managed IT Hiring/Firing File Sharing Dark Data Memes Tactics Paperless How To Net Neutrality SQL Server Mirgation Hard Drives Hosted Solution Co-managed IT Notifications Financial Data History Nanotechnology Domains Typing IT Addiction Language Technology Care Travel Smartwatch Business Communications Procurement Management Google Drive Azure Chatbots Refrigeration Techology Knowledge Google Maps Tech Distributed Denial of Service Scams Telework Cyber security Screen Reader Public Speaking Communitications Service Level Agreement Lithium-ion battery Computing Infrastructure Hybrid Work 5G Unified Threat Management CES Human Resources Supply Chain Management Google Docs Identity Unified Communications Unified Threat Management Entrepreneur Experience Term Running Cable Cables FinTech Bookmark Smart Tech Bitcoin IT Assessment Download Google Wallet Alerts Network Congestion Google Apps Flexibility Value Undo User Error Break Fix Laptop IT Maintenance Organization Browsers Connectivity Windows 8 Smart Devices Upload Drones Business Intelligence Point of Sale Digital Security Cameras Shortcuts Remote Working Social Network Memory Multi-Factor Security Google Play Dark Web Halloween Network Management Ransmoware Tech Support Data Breach IoT Monitors Electronic Health Records Trends Application Vendors Videos Be Proactive Customer Resource management Wasting Time Regulations Google Calendar Hacks Security Cameras Microsoft Excel Scary Stories Workforce Websites Data Analysis Trend Micro Star Wars IBM Software as a Service Gamification Staff Threats Fun Workplace Strategies Electronic Medical Records Managing Costs Social Networking Deep Learning SharePoint Legislation SSID Meta Fileless Malware eCommerce Writing Surveillance Content Virtual Assistant Wearable Technology Education Lenovo Amazon Virtual Reality Health IT Virtual Machine Motherboard Competition Comparison Mobile Computing Medical IT Permissions Server Management Outsource IT Private Cloud Reviews Directions Assessment Media Development Transportation Superfish Environment Search Identity Theft Twitter Hypervisor Best Practice Specifications PowerPoint Fraud User Buisness Small Businesses Error Shopping Microchip Optimization Internet Exlporer

Blog Archive