Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Passwords Managed Service Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Automation Facebook Artificial Intelligence Miscellaneous Information Training Gadgets Covid-19 Cloud Computing Managed Service Provider Compliance Server Remote Work Outsourced IT Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Apps Data Security Vendor Mobile Office Mobile Device Management Gmail Managed Services Tip of the week Voice over Internet Protocol WiFi Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Computing Information Technology Access Control Office 365 Conferencing How To BDR Hacker HIPAA Avoiding Downtime Applications Marketing Virtual Private Network Risk Management 2FA Help Desk Health Office Tips Analytics Augmented Reality Healthcare Big Data Retail Storage Password Bring Your Own Device Managed IT Services Computers Router Website Operating System Physical Security Windows 11 Display Monitoring Firewall Printer Paperless Office Infrastructure Excel The Internet of Things Remote Workers Document Management Telephone Social Scam Cooperation Free Resource Project Management Data loss Windows 7 Customer Service Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime VPN Mobile Security YouTube Meetings Processor Word Cryptocurrency Holidays Computer Repair Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Virtual Machines Professional Services Safety Saving Time Outlook Managed IT Service Machine Learning Money Downloads Humor iPhone Licensing Maintenance Antivirus Vulnerabilities Sports Entertainment Mouse Data Privacy Customer Relationship Management Images 101 Administration Mobility Telephone System Multi-Factor Authentication Cost Management Hacking Presentation Robot Wireless Technology Settings Employees Printing Integration Wireless Content Filtering IT Management User Tip Modem Hard Drives Database Surveillance Virtual Assistant Outsource IT Network Congestion Knowledge Domains Google Drive User Error IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Cookies Refrigeration Tactics Development Hotspot Transportation Small Businesses Point of Sale 5G Experience Public Speaking Google Docs Mirgation Hypervisor Displays Unified Communications Bitcoin Network Management PowerPoint Running Cable Tech Support Lithium-ion battery Shopping Nanotechnology Optimization Addiction Entrepreneur Google Wallet Language Employer/Employee Relationships Outsourcing Monitors Management PCI DSS Chatbots Navigation Screen Reader Windows 8 Distributed Denial of Service Workplace Laptop Websites Gig Economy Undo Service Level Agreement Internet Service Provider Drones Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Electronic Medical Records Regulations Compliance SharePoint Identity Smart Tech Memes Co-managed IT Halloween Bookmark Download Net Neutrality Lenovo Alerts SQL Server Technology Care Writing Business Communications Virtual Reality Financial Data History Connectivity IT Hacks Server Management Break Fix Scams Scary Stories Private Cloud Browsers Smartwatch Application Upload Procurement Superfish Azure Hybrid Work Identity Theft Fun Multi-Factor Security Tech Human Resources Twitter IBM Social Network Telework Cyber security Deep Learning IoT Communitications Dark Web Cables Error CES Trends Supply Chain Management Education Social Engineering Google Calendar Term Google Apps Remote Computing Customer Resource management FinTech Regulations Star Wars IT Assessment Mobile Computing Microsoft Excel IT Maintenance Data Analysis Competition Gamification Flexibility Staff Value Business Intelligence Tablet Search Legislation Shortcuts Alert Organization Social Networking Best Practice Smart Devices Managed IT Ransmoware Buisness File Sharing Dark Data Fileless Malware Digital Security Cameras Content Remote Working Legal Wearable Technology Memory Vendors IT solutions How To Comparison Google Play Be Proactive Notifications Health IT User Motherboard Data Breach Business Growth Assessment Electronic Health Records Permissions Workforce Travel Directions Videos Techology Wasting Time Threats Google Maps Cortana Alt Codes Specifications Security Cameras Workplace Strategies IP Address Trend Micro Internet Exlporer Software as a Service Fraud Meta Downtime Unified Threat Management Microchip Username Unified Threat Management Managing Costs Amazon Hosted Solution Typing Black Friday SSID Recovery eCommerce

Blog Archive