Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Information Facebook Automation Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Managed Services Voice over Internet Protocol Networking Budget Mobile Device Management Apple Gmail BYOD App Employer-Employee Relationship Tip of the week Avoiding Downtime How To Marketing BDR HIPAA Applications WiFi Access Control Computing Conferencing Information Technology Hacker Office 365 Analytics Office Tips Augmented Reality Managed IT Services Website Healthcare Storage Password Router Bring Your Own Device Help Desk Virtual Private Network Big Data Operating System Health Risk Management 2FA Retail Computers Scam Data loss Remote Workers Patch Management Save Money Free Resource Firewall Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Microsoft 365 Physical Security The Internet of Things Monitoring Going Green Display Solutions Printer Social Paperless Office Infrastructure Cybercrime Windows 11 Telephone Document Management Customer Service Excel Cooperation Outlook Virtual Machines Professional Services Wireless Technology Money Telephone System Cost Management Humor iPhone Sports Word Mouse Robot Data Privacy Vulnerabilities Administration User Tip Modem Mobile Security Images 101 Processor IT Management Meetings Multi-Factor Authentication Safety Mobility VPN Smart Technology Computer Repair Settings Wireless Printing Employees Content Filtering Saving Time Integration YouTube Managed IT Service Cryptocurrency Downloads Customer Relationship Management Machine Learning Holidays Supply Chain Licensing Data Storage Virtual Desktop Data storage LiFi Entertainment Hacking Presentation Maintenance Video Conferencing Managed Services Provider Antivirus Star Wars Microsoft Excel Social Engineering Gig Economy Data Analysis Paperless Internet Service Provider Halloween Co-managed IT Teamwork Gamification Staff Remote Computing Legislation Regulations Compliance Technology Care IP Address Evernote Social Networking Tablet Memes Fileless Malware Business Communications Net Neutrality Scary Stories Scams SQL Server Content Wearable Technology Alert Hacks File Sharing Comparison Dark Data Financial Data Hybrid Work History Fun Health IT Recovery Managed IT Motherboard Hard Drives Assessment Permissions How To Smartwatch Deep Learning IT Directions Human Resources Procurement Cables Azure Domains Notifications Travel Specifications Telework Education Cyber security Tech Refrigeration Techology Internet Exlporer Google Maps Fraud CES Communitications Microchip Google Apps Supply Chain Management IT Maintenance Public Speaking Username Mobile Computing Unified Threat Management Black Friday FinTech Business Intelligence Lithium-ion battery Search Term Unified Threat Management Database Entrepreneur Best Practice IT Assessment Shortcuts Flexibility Buisness Ransmoware Value IT Technicians Cyber Monday Legal Network Congestion Organization IT solutions Vendors Proxy Server Cookies Be Proactive Undo User Error Tactics Hotspot Digital Security Cameras Business Growth Smart Devices Remote Working Workforce Memory Mirgation Point of Sale Threats Data Breach Cortana Google Play Nanotechnology Workplace Strategies Addiction Language Videos Alt Codes Electronic Health Records Downtime Meta Wasting Time Management Network Management Chatbots Tech Support Distributed Denial of Service Monitors Hosted Solution Amazon Trend Micro Security Cameras Application Screen Reader Service Level Agreement Computing Infrastructure Typing Software as a Service Outsource IT Managing Costs IBM Identity Websites Smart Tech Google Drive Environment eCommerce Knowledge Bookmark Media SSID Virtual Assistant SharePoint Download Alerts Electronic Medical Records Surveillance Small Businesses Virtual Machine 5G Connectivity Break Fix Google Docs Writing Reviews Unified Communications Displays Experience Browsers Medical IT Lenovo Running Cable Transportation Competition Upload Virtual Reality Bitcoin Development Multi-Factor Security Google Wallet Outsourcing Hypervisor Social Network Server Management Private Cloud IoT Identity Theft Dark Web Shopping Optimization PowerPoint Superfish Laptop Workplace Employer/Employee Relationships Trends Twitter Windows 8 Google Calendar Drones PCI DSS Hiring/Firing Customer Resource management Navigation User Regulations Error

Blog Archive