Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Budget BYOD Gmail Managed Services Apple Voice over Internet Protocol App Tip of the week Employer-Employee Relationship Networking Chrome HIPAA Applications WiFi Access Control Computing Conferencing Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing Storage Password Bring Your Own Device Router Virtual Private Network Healthcare 2FA Big Data Health Help Desk Operating System Retail Risk Management Computers Managed IT Services Website Analytics Office Tips Augmented Reality Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Remote Workers Display The Internet of Things Printer Windows 11 Paperless Office Infrastructure Going Green Social Excel Free Resource Monitoring Project Management Windows 7 Document Management Cybercrime Microsoft 365 Customer Service Solutions Scam Data loss Telephone Cooperation Patch Management Save Money Data Storage Telephone System Cost Management Video Conferencing IT Management Managed Services Provider Sports VPN Meetings Virtual Machines Mouse Professional Services Safety Administration Computer Repair User Tip Modem Processor Mobile Security iPhone Supply Chain Vulnerabilities Settings Wireless Machine Learning Smart Technology Printing Content Filtering Images 101 Customer Relationship Management Saving Time Multi-Factor Authentication Mobility YouTube Maintenance Cryptocurrency Antivirus Managed IT Service Hacking Presentation Downloads Data Privacy Employees Virtual Desktop Integration LiFi Licensing Data storage Wireless Technology Entertainment Outlook Holidays Money Robot Word Humor Social Networking Hypervisor Legislation Hacks Scary Stories Workforce Threats Fileless Malware Fun Shopping Unified Threat Management Optimization Refrigeration PowerPoint Public Speaking Employer/Employee Relationships Deep Learning Unified Threat Management Workplace Strategies Content Wearable Technology PCI DSS Motherboard Lithium-ion battery Comparison Navigation Meta Health IT Education Entrepreneur Amazon Directions Gig Economy Assessment Permissions Network Congestion Teamwork User Error Internet Service Provider Regulations Compliance Specifications Mobile Computing Evernote Outsource IT Environment Microchip Search Media Internet Exlporer Point of Sale Memes Fraud Undo SQL Server Best Practice Username Net Neutrality Small Businesses Network Management Financial Data Tech Support History Black Friday Buisness IT solutions Displays Smartwatch Database IT Legal Monitors Procurement IT Technicians Azure Business Growth Outsourcing Proxy Server Telework Cookies Websites Cyber security Cyber Monday Application Tech Cortana CES Tactics Communitications Hotspot Supply Chain Management Mirgation IBM Electronic Medical Records Alt Codes SharePoint Workplace Hiring/Firing FinTech Nanotechnology Term Downtime Hosted Solution Lenovo Paperless Addiction IT Assessment Language Writing Flexibility Chatbots Virtual Reality Value Typing Co-managed IT Management Technology Care Server Management Organization Screen Reader Private Cloud Distributed Denial of Service Knowledge Superfish Digital Security Cameras Business Communications Service Level Agreement Identity Theft Smart Devices Computing Infrastructure Google Drive Competition Remote Working Identity Twitter Memory Scams Hybrid Work Bookmark 5G Smart Tech Error Data Breach Google Play Social Engineering Unified Communications Experience Videos Human Resources Download Electronic Health Records Alerts Google Docs Remote Computing Wasting Time Bitcoin User Running Cable Cables Browsers Connectivity Trend Micro Break Fix Google Wallet Security Cameras Google Apps Upload Tablet Software as a Service IP Address Alert Managing Costs Multi-Factor Security Windows 8 Laptop IT Maintenance Social Network Business Intelligence Managed IT IoT File Sharing eCommerce Dark Web Drones Dark Data SSID How To Virtual Assistant Shortcuts Trends Surveillance Regulations Notifications Virtual Machine Google Calendar Recovery Halloween Ransmoware Customer Resource management Vendors Data Analysis Reviews Star Wars Travel Microsoft Excel Hard Drives Medical IT Domains Transportation Techology Be Proactive Gamification Google Maps Development Staff

Blog Archive