Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What to Do When the Internet Goes Out

Tip of the Week: What to Do When the Internet Goes Out

Losing Internet can be a large problem in the business world, as we all become more and more reliant on it. Downtime of this kind can be immensely frustrating. However, not all hope is lost, as there are ways to troubleshoot the cause of an Internet outage.

Check your Hardware
First and foremost, check to make sure that all cables are still securely plugged in. If your router was just unplugged somehow, your troubleshooting may be completed much faster. However, should your problem be something other than a loose Ethernet cable, there are other methods to figuring out what happened to your Internet.

There may also be an issue with your modem or router, which the status lights on these components will indicate. Sometimes all it will take to fix this issue is a hard restart by disconnecting and reconnecting the power supply to the component. However, sometimes your device may be due to be replaced.

Ping a Website
Once you’ve determined that your connection issues aren’t due to a problem with your equipment, you should try sending a ping command to a website. In your Start menu, access the Command Prompt window. Type in ping google.com. This tells your computer to send data packets to Google. If any of these packets are lost, as displayed in the Command Prompt window, there could be a problem present. This problem could be in your network, with your Internet Service Provider, or with the website itself. If a few or more websites lose packets when pinged, the problem probably isn’t your network.

If the pings you send are successful, but your connection isn’t, the website itself is likely having issues. If you are able, check Down Detector or Down For Everyone Or Just Me to see if the website is at fault.

Scan for Malware
If your connection issues are limited to a single workstation or device, your software may have something to do with it; or, it could be a malware infection. This can be identified with a quick scan of the affected system.

DNS Issues
Finally, your Internet Service Provider could be the one having issues, more specifically, with its Domain Name Server. If you are unable to access a website with its IP address, your ISP is the one having a problem.

For more useful IT tips, make sure you subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Artificial Intelligence Facebook Information Gadgets Training Compliance Covid-19 Cloud Computing Server Outsourced IT Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Managed Services Mobile Office Data Security Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Computing Physical Security Applications Information Technology Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing Managed IT Services How To BDR HIPAA Router 2FA Risk Management Virtual Private Network Health Help Desk Analytics Office Tips Computers Healthcare Augmented Reality Retail Storage Website Password Bring Your Own Device Operating System Big Data Windows 11 Social Display Printer Excel Paperless Office Infrastructure Monitoring Customer Service Remote Workers Document Management Managed IT Service Free Resource Telephone Project Management Windows 7 Scam Data loss Microsoft 365 Firewall Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Cybercrime Holidays VPN Meetings YouTube Cryptocurrency Data Storage Modem Supply Chain User Tip Processor Video Conferencing Computer Repair Mobile Security Managed Services Provider Customer Relationship Management Virtual Desktop Virtual Machines Professional Services Data storage LiFi Smart Technology Hacking Outlook Presentation Machine Learning iPhone Money Saving Time Humor Wireless Technology Vulnerabilities Maintenance Data Privacy Downloads Antivirus Sports Mouse Images 101 Licensing Word Mobility Multi-Factor Authentication Administration Entertainment Safety Robot Telephone System Employees Cost Management Integration Settings Wireless Printing Content Filtering IT Management Network Congestion Specifications Medical IT Application Reviews Google Drive User Error Microchip Internet Exlporer Development Fraud Knowledge Transportation Small Businesses Username Hypervisor Displays IBM Point of Sale Optimization Black Friday 5G PowerPoint Shopping Google Docs Unified Communications Database Experience Employer/Employee Relationships Outsourcing Navigation Bitcoin Network Management PCI DSS Tech Support IT Technicians Running Cable Cookies Monitors Cyber Monday Workplace Google Wallet Proxy Server Gig Economy Tactics Internet Service Provider Hotspot Teamwork Hiring/Firing Competition Evernote Paperless Windows 8 Regulations Compliance Websites Mirgation Laptop Nanotechnology Memes Co-managed IT Drones SharePoint Addiction Net Neutrality Electronic Medical Records Language SQL Server Technology Care Business Communications User Management Financial Data Chatbots Halloween History Screen Reader IT Writing Distributed Denial of Service Scams Lenovo Smartwatch Service Level Agreement Procurement Virtual Reality Computing Infrastructure Azure Hybrid Work Tech Human Resources Hacks Server Management Telework Private Cloud Identity Scary Stories Cyber security IP Address Identity Theft Smart Tech Communitications Fun Cables Superfish Bookmark CES Deep Learning Download Supply Chain Management Twitter Alerts Term Google Apps Recovery FinTech Error Education Connectivity IT Assessment Social Engineering Break Fix IT Maintenance Hard Drives Browsers Upload Flexibility Remote Computing Value Business Intelligence Domains Multi-Factor Security Shortcuts Mobile Computing Social Network Organization Tablet IoT Smart Devices Dark Web Search Ransmoware Refrigeration Digital Security Cameras Best Practice Trends Remote Working Alert Memory Vendors Public Speaking Lithium-ion battery Dark Data Google Calendar Google Play Be Proactive Managed IT Customer Resource management File Sharing Regulations Buisness Data Breach IT solutions Star Wars Electronic Health Records How To Microsoft Excel Workforce Entrepreneur Legal Data Analysis Videos Business Growth Gamification Notifications Staff Wasting Time Threats Legislation Security Cameras Workplace Strategies Travel Social Networking Trend Micro Google Maps Software as a Service Cortana Meta Undo Techology Fileless Malware Alt Codes Content Wearable Technology Managing Costs Amazon Comparison SSID Health IT Unified Threat Management Motherboard Downtime eCommerce Hosted Solution Assessment Surveillance Permissions Virtual Assistant Outsource IT Unified Threat Management Directions Typing Virtual Machine Environment Media

Blog Archive