Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Smartphone Managed Service Data Backup Android Upgrade AI VoIP Business Management Smartphones communications Mobile Devices Data Recovery Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Information Facebook Automation Cloud Computing Covid-19 Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Data Security Mobile Office Vendor Apps Two-factor Authentication Chrome Budget Mobile Device Management BYOD Apple Gmail App Tip of the week Managed Services Employer-Employee Relationship Voice over Internet Protocol Networking How To BDR Avoiding Downtime Marketing HIPAA Applications Access Control WiFi Computing Conferencing Information Technology Office 365 Hacker Analytics Office Tips Augmented Reality Website Storage Password Bring Your Own Device Router Virtual Private Network Health Help Desk Big Data Operating System Retail Risk Management 2FA Healthcare Computers Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Physical Security Display Printer Paperless Office Going Green The Internet of Things Infrastructure Monitoring Social Cybercrime Document Management Windows 11 Remote Workers Telephone Scam Customer Service Excel Data loss Outlook Wireless Technology Images 101 Money Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Sports Word Mouse Data Privacy IT Management VPN Employees Meetings Integration Administration User Tip Modem Processor Safety Computer Repair Mobile Security Holidays Settings Data Storage Printing Smart Technology Wireless Content Filtering Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services YouTube Cryptocurrency Customer Relationship Management Managed IT Service Maintenance Downloads Supply Chain Antivirus iPhone Virtual Desktop LiFi Hacking Data storage Licensing Presentation Entertainment Vulnerabilities Alert Paperless Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Co-managed IT Halloween Data Analysis Star Wars IT Assessment IP Address How To Microsoft Excel Technology Care Notifications Staff Value Business Communications Gamification Flexibility Organization Travel Social Networking Hacks Legislation Scams Scary Stories Fun Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Hybrid Work Recovery Wearable Technology Memory Deep Learning Hard Drives Human Resources Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Domains Comparison Google Play Cables Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Education Wasting Time Refrigeration Google Apps Trend Micro Mobile Computing Public Speaking Network Congestion Specifications Security Cameras IT Maintenance Search User Error Microchip Internet Exlporer Software as a Service Lithium-ion battery Fraud Business Intelligence Managing Costs Best Practice Shortcuts Entrepreneur Username Point of Sale eCommerce Black Friday SSID Ransmoware Buisness Database Surveillance Legal Virtual Assistant Vendors IT solutions Tech Support IT Technicians Virtual Machine Business Growth Undo Be Proactive Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Workforce Cortana Tactics Development Hotspot Transportation Threats Websites Mirgation Hypervisor Alt Codes Workplace Strategies Shopping Nanotechnology Optimization PowerPoint Meta Downtime Application SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Amazon Hosted Solution Chatbots Typing Navigation Management PCI DSS Lenovo Gig Economy Screen Reader IBM Writing Distributed Denial of Service Outsource IT Media Knowledge Service Level Agreement Internet Service Provider Google Drive Virtual Reality Computing Infrastructure Teamwork Environment Private Cloud Identity Evernote Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Small Businesses 5G Unified Communications Experience Download Net Neutrality Google Docs Twitter Alerts SQL Server Displays Error History Bitcoin Competition Running Cable Financial Data Browsers Smartwatch Connectivity IT Google Wallet Social Engineering Break Fix Outsourcing Upload Procurement Remote Computing Azure Social Network Telework Cyber security Windows 8 Multi-Factor Security Tech Workplace Laptop CES Tablet IoT Communitications Drones Dark Web Hiring/Firing User

Blog Archive