Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Information Artificial Intelligence Holiday Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Business Technology Blockchain Virtualization Wi-Fi Bandwidth Windows 10 Vendor Apps Data Security Two-factor Authentication Mobile Office Gmail Apple Tip of the week App WiFi Managed Services Employer-Employee Relationship Networking Voice over Internet Protocol BYOD Chrome Budget Mobile Device Management HIPAA Applications Computing How To Information Technology BDR Hacker Office 365 Avoiding Downtime Conferencing Marketing Access Control 2FA Big Data Retail Router Operating System Managed IT Services Healthcare Risk Management Computers Help Desk Analytics Office Tips Website Augmented Reality Virtual Private Network Storage Password Bring Your Own Device Health Cooperation Excel The Internet of Things Document Management Going Green Social Scam Cybercrime Data loss Remote Workers Customer Service Monitoring Patch Management Save Money Free Resource Remote Monitoring Project Management Vulnerability End of Support Windows 7 Vendor Management Microsoft 365 Physical Security Telephone Display Printer Solutions Firewall Windows 11 Paperless Office Infrastructure Administration Supply Chain Safety Machine Learning Telephone System Holidays Cost Management Data Storage Video Conferencing Settings Maintenance Managed Services Provider Antivirus Wireless Printing Virtual Machines Content Filtering Professional Services YouTube Customer Relationship Management User Tip Modem Mobile Security Cryptocurrency Processor Data Privacy iPhone Hacking Presentation Robot Virtual Desktop LiFi Vulnerabilities Smart Technology Data storage Wireless Technology Outlook Images 101 Saving Time IT Management Multi-Factor Authentication VPN Mobility Meetings Money Humor Managed IT Service Word Downloads Computer Repair Licensing Sports Mouse Employees Entertainment Integration Entrepreneur Websites Mobile Computing Displays Trends Managing Costs Customer Resource management eCommerce Search Regulations SSID Google Calendar Electronic Medical Records Best Practice Data Analysis Surveillance SharePoint Outsourcing Star Wars Virtual Assistant Microsoft Excel Virtual Machine Staff Buisness Undo Gamification Reviews IT solutions Lenovo Workplace Social Networking Medical IT Legislation Writing Legal Virtual Reality Business Growth Fileless Malware Development Hiring/Firing Transportation Content Hypervisor Server Management Paperless Wearable Technology Private Cloud Shopping Health IT Optimization Superfish Cortana Co-managed IT Motherboard PowerPoint Identity Theft Comparison Permissions Twitter Alt Codes Directions Application Technology Care Assessment Employer/Employee Relationships Business Communications Navigation Error PCI DSS Downtime Gig Economy Hosted Solution IBM Scams Specifications Social Engineering Fraud Remote Computing Typing Microchip Internet Service Provider Hybrid Work Internet Exlporer Teamwork Username Human Resources Evernote Regulations Compliance Memes Knowledge Cables Tablet Black Friday Google Drive Alert Net Neutrality Database SQL Server Competition History Managed IT 5G Google Apps IT Technicians File Sharing Dark Data Financial Data Smartwatch Unified Communications Proxy Server IT Experience IT Maintenance Cookies Cyber Monday How To Google Docs Hotspot Notifications Bitcoin Procurement Running Cable Business Intelligence Tactics Azure Cyber security Shortcuts Mirgation Tech Travel Google Wallet Telework CES Communitications Techology User Ransmoware Nanotechnology Google Maps Language Windows 8 Supply Chain Management Laptop Vendors Addiction Management Be Proactive Chatbots Term Unified Threat Management Drones FinTech IP Address IT Assessment Unified Threat Management Workforce Screen Reader Distributed Denial of Service Computing Infrastructure Flexibility Halloween Threats Service Level Agreement Value Workplace Strategies Identity Network Congestion Organization Digital Security Cameras Bookmark Smart Devices User Error Recovery Meta Smart Tech Alerts Hacks Remote Working Scary Stories Hard Drives Amazon Download Memory Domains Data Breach Fun Google Play Point of Sale Videos Deep Learning Browsers Electronic Health Records Outsource IT Connectivity Break Fix Media Tech Support Refrigeration Environment Upload Wasting Time Network Management Education Public Speaking Social Network Trend Micro Security Cameras Multi-Factor Security Monitors Lithium-ion battery Software as a Service Small Businesses IoT Dark Web

Blog Archive