Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Google Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Artificial Intelligence Miscellaneous Holiday Information Automation Cloud Computing Gadgets Training Covid-19 Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Windows 10 Virtualization Bandwidth Blockchain Business Technology Wi-Fi Two-factor Authentication Data Security Apps Vendor Mobile Office Gmail Networking Chrome Managed Services WiFi Voice over Internet Protocol Budget BYOD Employer-Employee Relationship Apple App Tip of the week Mobile Device Management Office 365 How To Conferencing BDR Hacker Access Control HIPAA Avoiding Downtime Applications Computing Marketing Information Technology Help Desk Managed IT Services Analytics Office Tips Augmented Reality Big Data Healthcare Storage 2FA Password Bring Your Own Device Virtual Private Network Computers Health Router Operating System Website Retail Risk Management Monitoring Scam Firewall Data loss The Internet of Things Remote Workers Patch Management Windows 11 Telephone Save Money Social Remote Monitoring Vulnerability End of Support Vendor Management Excel Cooperation Free Resource Project Management Physical Security Windows 7 Display Customer Service Printer Microsoft 365 Paperless Office Going Green Infrastructure Solutions Cybercrime Document Management Data Storage Virtual Desktop Data storage LiFi Smart Technology Video Conferencing Managed Services Provider Outlook Saving Time Safety Virtual Machines Professional Services Money Humor Managed IT Service Robot Downloads iPhone Licensing Supply Chain Sports Mouse Vulnerabilities Entertainment IT Management VPN Meetings Administration Customer Relationship Management Images 101 Telephone System Multi-Factor Authentication Mobility Computer Repair Cost Management Hacking Presentation Settings Wireless Technology Wireless Printing Data Privacy Employees Content Filtering Integration Machine Learning YouTube User Tip Modem Mobile Security Cryptocurrency Processor Word Holidays Maintenance Antivirus Public Speaking Mirgation Hypervisor Google Wallet Social Engineering Workforce Remote Computing Threats Shopping Lithium-ion battery Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Entrepreneur Windows 8 Workplace Strategies Laptop Addiction Management PCI DSS Chatbots Tablet Navigation Drones Meta Alert Amazon Gig Economy Screen Reader Distributed Denial of Service Managed IT Computing Infrastructure Teamwork File Sharing Dark Data Halloween Service Level Agreement Internet Service Provider Undo Outsource IT Regulations Compliance Identity Evernote How To Notifications Environment Bookmark Media Smart Tech Memes Alerts SQL Server Travel Hacks Scary Stories Download Net Neutrality Small Businesses Financial Data Fun Techology History Google Maps Displays Deep Learning Browsers Smartwatch Connectivity IT Application Break Fix Upload Procurement Azure Unified Threat Management Outsourcing Education Social Network Telework IBM Unified Threat Management Cyber security Multi-Factor Security Tech Dark Web CES IoT Communitications Trends Supply Chain Management Mobile Computing Network Congestion Workplace Hiring/Firing Customer Resource management FinTech Search User Error Regulations Google Calendar Term Microsoft Excel Best Practice Data Analysis Paperless Star Wars IT Assessment Gamification Flexibility Competition Staff Value Point of Sale Co-managed IT Buisness Technology Care IT solutions Organization Social Networking Legislation Legal Tech Support Business Growth Fileless Malware Digital Security Cameras Business Communications Smart Devices Network Management Content Remote Working Wearable Technology Memory Monitors Scams Hybrid Work Health IT Cortana Motherboard Data Breach User Comparison Google Play Permissions Websites Alt Codes Directions Videos Human Resources Assessment Electronic Health Records Wasting Time Cables Downtime Hosted Solution IP Address SharePoint Trend Micro Specifications Security Cameras Electronic Medical Records Fraud Typing Microchip Google Apps Internet Exlporer Software as a Service Username Lenovo Managing Costs Writing IT Maintenance Business Intelligence Knowledge eCommerce Recovery Black Friday SSID Google Drive Virtual Reality Virtual Assistant Private Cloud Shortcuts Database Surveillance Hard Drives Server Management Domains 5G Superfish IT Technicians Virtual Machine Identity Theft Ransmoware Vendors Unified Communications Proxy Server Reviews Experience Cookies Cyber Monday Medical IT Google Docs Twitter Hotspot Transportation Error Bitcoin Be Proactive Running Cable Tactics Development Refrigeration

Blog Archive