Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Information Facebook Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Bandwidth Blockchain Windows 10 Business Technology Virtualization Apps Data Security Two-factor Authentication Mobile Office Vendor Employer-Employee Relationship Networking BYOD Chrome Budget Mobile Device Management Gmail Apple Tip of the week Managed Services Voice over Internet Protocol App Computing How To Information Technology BDR Conferencing Hacker Office 365 Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Managed IT Services Risk Management Computers Analytics Office Tips Augmented Reality Website Virtual Private Network Storage Password Bring Your Own Device Health Router Big Data Retail Healthcare 2FA Operating System Help Desk Free Resource Project Management Windows 7 Customer Service Microsoft 365 Patch Management Save Money Telephone Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Physical Security Display Printer Paperless Office Firewall Infrastructure Document Management The Internet of Things Remote Workers Windows 11 Going Green Social Scam Monitoring Excel Cybercrime Data loss YouTube Customer Relationship Management Saving Time Cryptocurrency Images 101 Multi-Factor Authentication Mobility Hacking Managed IT Service Presentation Robot Virtual Desktop LiFi Downloads Data storage Wireless Technology Licensing Employees Data Privacy Outlook Entertainment Integration IT Management VPN Meetings Money Humor Word Holidays Computer Repair Telephone System Cost Management Sports Data Storage Mouse Video Conferencing Managed Services Provider Administration Professional Services Safety Virtual Machines Machine Learning User Tip Modem Processor Mobile Security iPhone Settings Maintenance Wireless Supply Chain Printing Antivirus Content Filtering Vulnerabilities Smart Technology Supply Chain Management Workplace Addiction Language Chatbots Knowledge FinTech Tablet Hiring/Firing Google Drive Management Term Alert Paperless Screen Reader Distributed Denial of Service IT Assessment Managed IT 5G Flexibility File Sharing Co-managed IT Competition Value Dark Data Service Level Agreement Computing Infrastructure Unified Communications Identity Experience Organization Technology Care How To Google Docs Smart Devices Notifications Business Communications Bookmark Bitcoin Smart Tech Running Cable Digital Security Cameras Remote Working Travel Scams Memory Google Wallet Download Alerts Google Play Techology Google Maps Hybrid Work Data Breach User Electronic Health Records Human Resources Browsers Windows 8 Connectivity Laptop Break Fix Videos Unified Threat Management Cables Wasting Time Drones Upload Security Cameras Unified Threat Management Multi-Factor Security IP Address Trend Micro Social Network Software as a Service Google Apps IoT Halloween Dark Web IT Maintenance Managing Costs Network Congestion Trends SSID Regulations User Error Google Calendar Business Intelligence eCommerce Recovery Customer Resource management Surveillance Shortcuts Hard Drives Data Analysis Virtual Assistant Hacks Star Wars Scary Stories Microsoft Excel Fun Point of Sale Ransmoware Domains Virtual Machine Gamification Staff Medical IT Deep Learning Social Networking Legislation Reviews Vendors Development Tech Support Be Proactive Refrigeration Fileless Malware Transportation Network Management Workforce Public Speaking Hypervisor Monitors Content Education Wearable Technology Health IT PowerPoint Motherboard Comparison Shopping Threats Lithium-ion battery Optimization Websites Workplace Strategies Directions Employer/Employee Relationships Entrepreneur Mobile Computing Assessment Permissions Search PCI DSS Meta Navigation Best Practice SharePoint Specifications Gig Economy Amazon Electronic Medical Records Internet Service Provider Undo Microchip Teamwork Internet Exlporer Buisness Fraud Lenovo Regulations Compliance Outsource IT Writing Legal Username Evernote IT solutions Business Growth Black Friday Environment Memes Virtual Reality Media Net Neutrality Private Cloud SQL Server Database Server Management IT Technicians Superfish Cortana Financial Data Identity Theft Small Businesses History Application Proxy Server Alt Codes Cookies Cyber Monday Smartwatch Displays IT Twitter Procurement Error Azure Tactics Downtime Hotspot Hosted Solution Mirgation Telework Outsourcing IBM Cyber security Social Engineering Tech Typing Nanotechnology CES Communitications Remote Computing

Blog Archive