Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Access Secure with a Router Password Repository

Keep Access Secure with a Router Password Repository

If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have changed your password in the first place (which you should have). For situations like these where you want to avoid a factory reset, you can use this router password repository to find your default credentials.

Continue reading
0 Comments

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

Tip of the Week: 2 Things You Need to Know to Properly Set Up Your Wi-Fi

People are constantly using Wi-Fi. In fact, 87 percent of people admit to using public Wi-Fi connections, which consequently is one of the most common ways to get data stolen or devices inundated with malware. With so many people depending on Wi-Fi, and your business looking to use it for enhanced collaboration, we thought we should discuss a few hot tips to get you started in the right direction.

Continue reading
0 Comments

Technology Basics: SSID

Technology Basics: SSID

We’ve seen a lot of technology in our time, and during that time we’ve picked up on a lot of the vocabulary you expect experts to throw around. That being said, it’s easy to forget that not everyone uses these words--even business professionals who use the technology might forget what an acronym stands for. One of these is SSID.

Tags:
Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Microsoft Workplace Strategy Small Business Data Backup Communication Smartphone Passwords Saving Money Smartphones Android VoIP Business Management Mobile Devices communications Backup Managed Service Upgrade Data Recovery Managed IT Services Browser Social Media Microsoft Office Disaster Recovery Windows Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Productivity Server Managed Service Provider Current Events Information Holiday Outsourced IT Encryption AI Spam Employee/Employer Relationship Windows 10 Government Training Office Business Continuity Data Management Compliance Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Vendor Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking App BYOD Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Conferencing How To WiFi BDR Operating System HIPAA Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring IT Support Document Management Remote Workers Firewall Telephone Windows 11 Scam Data loss 2FA The Internet of Things Cooperation Free Resource Excel Project Management Windows 7 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Physical Security Integration Data Privacy Cryptocurrency Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Safety Administration Vulnerabilities Supply Chain Entertainment Images 101 Application Legislation Paperless Organization Travel Social Networking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Co-managed IT Technology Care Alt Codes Content Remote Working IBM Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Business Communications Health IT Scams Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Hybrid Work Typing Wasting Time Trend Micro Network Congestion Specifications Security Cameras Human Resources Cables Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Knowledge Fraud Username Managing Costs Point of Sale eCommerce 5G Black Friday SSID Google Apps IT Maintenance Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Business Intelligence Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Cookies Monitors Cyber Monday Medical IT Shortcuts Google Wallet Proxy Server Reviews Ransmoware Tactics Development Hotspot Transportation Vendors Windows 8 IP Address Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Be Proactive Drones Shopping Workforce SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Navigation Threats Management PCI DSS Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Strategies Lenovo Gig Economy Meta Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Evernote Amazon Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Refrigeration Fun Superfish Bookmark Outsource IT Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Environment Media Financial Data Lithium-ion battery Error History Education Connectivity IT Social Engineering Break Fix Entrepreneur Browsers Smartwatch Small Businesses Upload Procurement Remote Computing Azure Multi-Factor Security Tech Displays Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Undo Search Dark Web CES Outsourcing Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Workplace Legal Data Analysis Hiring/Firing Business Growth Gamification Flexibility Notifications Staff Value

Blog Archive