Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Hosted Solutions Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Tech Term Remote Current Events Network Internet of Things Productivity Artificial Intelligence Facebook Automation AI Covid-19 Gadgets Cloud Computing Remote Work Miscellaneous Server Managed Service Provider Outsourced IT Information Holiday Compliance Employee/Employer Relationship Encryption Spam Training Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology IT Support Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Healthcare Risk Management Virtual Private Network Website Health Help Desk Microsoft 365 Firewall Document Management Solutions Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation 2FA Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Remote Workers Cybercrime Physical Security Display Printer Paperless Office Free Resource Infrastructure Project Management Windows 7 Monitoring Outlook Multi-Factor Authentication Mobility Machine Learning Money Saving Time Humor Managed IT Service Safety Employees Maintenance Sports Integration Downloads Antivirus Mouse Licensing Entertainment Administration Holidays Data Storage Supply Chain Video Conferencing Robot Telephone System Customer Relationship Management Cost Management Managed Services Provider Professional Services Virtual Machines Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN iPhone Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Smart Technology SharePoint Organization Addiction Electronic Medical Records Language Shortcuts Ransmoware Digital Security Cameras Refrigeration Management Smart Devices Halloween Chatbots Lenovo Remote Working Screen Reader Memory Vendors Writing Distributed Denial of Service Public Speaking Lithium-ion battery Service Level Agreement Data Breach Virtual Reality Computing Infrastructure Google Play Be Proactive Scary Stories Private Cloud Identity Workforce Videos Hacks Server Management Electronic Health Records Entrepreneur Superfish Bookmark Identity Theft Smart Tech Wasting Time Threats Fun Deep Learning Download Trend Micro Twitter Alerts Security Cameras Workplace Strategies Error Meta Undo Software as a Service Browsers Education Connectivity Managing Costs Amazon Social Engineering Break Fix Upload eCommerce Remote Computing SSID Surveillance Virtual Assistant Outsource IT Multi-Factor Security Mobile Computing Social Network Tablet IoT Virtual Machine Environment Search Dark Web Media Medical IT Reviews Application Best Practice Trends Alert Development Buisness File Sharing Regulations Transportation Small Businesses Dark Data Google Calendar Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars Hypervisor Displays How To Microsoft Excel PowerPoint Shopping Business Growth Gamification Optimization Notifications Staff Travel Social Networking Employer/Employee Relationships Outsourcing Legislation Techology Fileless Malware PCI DSS Google Maps Cortana Navigation Workplace Gig Economy Alt Codes Content Wearable Technology Internet Service Provider Downtime Unified Threat Management Motherboard Teamwork Hiring/Firing Comparison Competition Health IT Unified Threat Management Directions Regulations Compliance Hosted Solution Assessment Permissions Evernote Paperless Co-managed IT Typing Memes Net Neutrality SQL Server Technology Care Network Congestion Specifications Google Drive User Error Microchip Financial Data User Internet Exlporer History Knowledge Fraud Business Communications Scams Smartwatch Username IT Procurement Point of Sale Azure Hybrid Work 5G Black Friday IP Address Google Docs Telework Unified Communications Database Cyber security Experience Tech Human Resources Cables CES Bitcoin Network Management Communitications Running Cable Tech Support IT Technicians Supply Chain Management Cookies Monitors Cyber Monday Google Wallet Proxy Server FinTech Recovery Tactics Hotspot Term Google Apps IT Maintenance Hard Drives Windows 8 IT Assessment Laptop Websites Mirgation Flexibility Nanotechnology Value Business Intelligence Domains Drones

Blog Archive