Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade VoIP Business Management AI Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Facebook Automation Information Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Tip of the week Budget Managed Services Voice over Internet Protocol Mobile Device Management Apple Gmail Networking App BYOD Employer-Employee Relationship Avoiding Downtime Applications Marketing How To Conferencing BDR WiFi Computing Information Technology Access Control Hacker Office 365 HIPAA Router Augmented Reality Website Storage Password Retail Bring Your Own Device Healthcare Help Desk Managed IT Services Big Data Operating System Risk Management Virtual Private Network Computers Health Office Tips 2FA Analytics Excel Document Management Remote Workers Monitoring Scam Firewall Data loss Free Resource Project Management Going Green Windows 7 The Internet of Things Patch Management Telephone Microsoft 365 Save Money Remote Monitoring Social Vulnerability Cybercrime End of Support Vendor Management Solutions Cooperation Physical Security Display Printer Customer Service Windows 11 Paperless Office Infrastructure Money Video Conferencing Managed Services Provider Machine Learning Humor Virtual Machines Professional Services User Tip Modem Mobile Security Processor Sports Word Mouse Maintenance Antivirus iPhone Administration Smart Technology Vulnerabilities Saving Time Data Privacy Safety Images 101 Managed IT Service Multi-Factor Authentication Settings Mobility Robot Printing Downloads Wireless Content Filtering Licensing YouTube IT Management Entertainment Cryptocurrency VPN Meetings Employees Integration Customer Relationship Management Computer Repair Telephone System Virtual Desktop Hacking Data storage Cost Management LiFi Holidays Presentation Outlook Data Storage Supply Chain Wireless Technology Electronic Medical Records SharePoint Specifications Outsourcing Employer/Employee Relationships IP Address Fraud Navigation Microchip Internet Exlporer PCI DSS Username Gig Economy Hacks Lenovo Scary Stories Workplace Writing Recovery Virtual Reality Internet Service Provider Black Friday Hiring/Firing Teamwork Fun Server Management Paperless Evernote Hard Drives Private Cloud Database Regulations Compliance Deep Learning IT Technicians Memes Superfish Co-managed IT Domains Identity Theft Twitter Proxy Server Cookies Net Neutrality Education Cyber Monday Technology Care SQL Server Hotspot History Business Communications Refrigeration Error Tactics Financial Data Smartwatch Mobile Computing Mirgation IT Scams Public Speaking Social Engineering Search Remote Computing Nanotechnology Procurement Hybrid Work Azure Lithium-ion battery Best Practice Language Cyber security Human Resources Tech Entrepreneur Addiction Telework Management CES Chatbots Communitications Buisness Cables Tablet Alert Legal Screen Reader Supply Chain Management IT solutions Distributed Denial of Service Business Growth Computing Infrastructure Managed IT Google Apps Term Undo File Sharing Dark Data Service Level Agreement FinTech Identity IT Assessment IT Maintenance How To Cortana Notifications Bookmark Smart Tech Flexibility Business Intelligence Value Alt Codes Alerts Shortcuts Travel Download Organization Digital Security Cameras Smart Devices Techology Downtime Ransmoware Google Maps Application Browsers Connectivity Remote Working Hosted Solution Break Fix Vendors Memory Typing Data Breach Be Proactive Google Play Unified Threat Management Upload Social Network Videos Electronic Health Records Unified Threat Management Multi-Factor Security Workforce IBM Knowledge Google Drive IoT Dark Web Threats Wasting Time Trend Micro Workplace Strategies Security Cameras Network Congestion Trends Customer Resource management Regulations Software as a Service User Error Google Calendar Meta 5G Experience Data Analysis Google Docs Star Wars Unified Communications Microsoft Excel Amazon Managing Costs Bitcoin Staff eCommerce Running Cable SSID Competition Point of Sale Gamification Google Wallet Social Networking Surveillance Legislation Outsource IT Virtual Assistant Network Management Media Tech Support Fileless Malware Environment Virtual Machine Reviews Windows 8 Wearable Technology Laptop Medical IT Monitors Content User Health IT Drones Motherboard Development Comparison Small Businesses Transportation Displays Hypervisor Websites Directions Assessment Permissions Shopping Optimization Halloween PowerPoint

Blog Archive