Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Backup Smartphone Android Managed Service Business Management VoIP Smartphones communications Upgrade Mobile Devices Disaster Recovery Browser Data Recovery Social Media Microsoft Office Windows Managed IT Services Productivity Current Events AI Remote Tech Term Network Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Holiday Covid-19 Gadgets Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Training Employee/Employer Relationship Compliance Spam Encryption Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology IT Support Windows 10 Bandwidth Virtualization Blockchain Vendor Mobile Office Two-factor Authentication Data Security Apps BYOD Mobile Device Management Chrome Gmail Budget Apple Networking Managed Services Employer-Employee Relationship App Voice over Internet Protocol Hacker HIPAA Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Tip of the week Conferencing WiFi How To BDR Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Healthcare Vendor Management Cybercrime Free Resource Project Management Physical Security Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Monitoring Solutions Firewall Document Management The Internet of Things Windows 11 Telephone Scam 2FA Data loss Social Excel Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Customer Service End of Support Vulnerability Presentation Content Filtering IT Management Vulnerabilities YouTube Meetings Data Privacy VPN Wireless Technology Images 101 Cryptocurrency Modem User Tip Processor Multi-Factor Authentication Computer Repair Mobile Security Mobility Virtual Desktop Data storage LiFi Word Smart Technology Outlook Employees Machine Learning Integration Money Saving Time Humor Safety Managed IT Service Maintenance Holidays Downloads Antivirus Sports Mouse Data Storage Licensing Supply Chain Video Conferencing Entertainment Administration Managed Services Provider Virtual Machines Professional Services Customer Relationship Management Robot Telephone System Cost Management Settings iPhone Hacking Wireless Printing Unified Threat Management Directions Telework Hosted Solution Assessment Cyber security Permissions Tech Human Resources CES Typing Communitications Cables User Network Congestion Specifications Supply Chain Management Google Drive User Error Microchip FinTech Internet Exlporer Knowledge Fraud Term Google Apps Username IT Assessment IP Address IT Maintenance Point of Sale Value Business Intelligence 5G Black Friday Flexibility Google Docs Organization Unified Communications Database Experience Shortcuts Digital Security Cameras Bitcoin Network Management Smart Devices Running Cable Tech Support IT Technicians Ransmoware Recovery Cookies Memory Vendors Hard Drives Monitors Cyber Monday Google Wallet Proxy Server Remote Working Tactics Data Breach Domains Hotspot Google Play Be Proactive Videos Windows 8 Electronic Health Records Laptop Websites Mirgation Workforce Nanotechnology Wasting Time Threats Refrigeration Drones SharePoint Addiction Trend Micro Public Speaking Electronic Medical Records Language Security Cameras Workplace Strategies Management Software as a Service Lithium-ion battery Halloween Chatbots Meta Screen Reader Managing Costs Amazon Writing Distributed Denial of Service Entrepreneur Lenovo Service Level Agreement eCommerce Virtual Reality Computing Infrastructure SSID Hacks Server Management Surveillance Scary Stories Private Cloud Identity Virtual Assistant Outsource IT Identity Theft Smart Tech Virtual Machine Environment Undo Fun Media Superfish Bookmark Reviews Deep Learning Download Twitter Alerts Medical IT Development Error Transportation Small Businesses Browsers Education Connectivity Hypervisor Displays Social Engineering Break Fix Shopping Upload Optimization Remote Computing PowerPoint Employer/Employee Relationships Outsourcing Application Multi-Factor Security Mobile Computing Social Network PCI DSS Tablet IoT Search Dark Web Navigation Gig Economy Best Practice Trends IBM Alert Workplace Buisness File Sharing Regulations Teamwork Hiring/Firing Dark Data Google Calendar Managed IT Customer Resource management Internet Service Provider Legal Data Analysis Regulations Compliance IT solutions Star Wars How To Microsoft Excel Evernote Paperless Business Growth Gamification Memes Notifications Staff Co-managed IT Travel Social Networking SQL Server Technology Care Legislation Net Neutrality Techology Fileless Malware Financial Data Google Maps History Competition Cortana Business Communications Smartwatch Alt Codes Content IT Wearable Technology Scams Downtime Unified Threat Management Motherboard Azure Hybrid Work Comparison Health IT Procurement

Blog Archive