Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Facebook Information Holiday Covid-19 Training Miscellaneous Gadgets Cloud Computing Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Chrome Budget Tip of the week Apple Mobile Device Management App Gmail Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship BYOD Hacker Applications Avoiding Downtime Access Control Marketing Conferencing WiFi Computing How To BDR Information Technology Office 365 HIPAA Computers Augmented Reality Router Virtual Private Network Storage Health Password Website Bring Your Own Device 2FA Help Desk Retail Operating System Healthcare Managed IT Services Big Data Risk Management Analytics Office Tips Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Going Green Scam Telephone Remote Workers Data loss The Internet of Things Cybercrime Cooperation Social Patch Management Free Resource Project Management Save Money Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Microsoft 365 Customer Service Physical Security Money Presentation Humor Employees Computer Repair User Tip Modem Integration Wireless Technology Processor Mobile Security Sports Mouse Holidays Administration Supply Chain Word Machine Learning Smart Technology Data Storage Saving Time Video Conferencing Managed Services Provider Virtual Machines Professional Services Maintenance Antivirus Managed IT Service Safety Settings Wireless Downloads Printing Content Filtering Licensing YouTube iPhone Entertainment Cryptocurrency Data Privacy Vulnerabilities Robot Virtual Desktop Telephone System Images 101 Data storage Customer Relationship Management LiFi Cost Management Multi-Factor Authentication Mobility IT Management Outlook VPN Meetings Hacking Workplace Strategies Videos Electronic Health Records Specifications Meta Microchip User Point of Sale Internet Exlporer Fraud Wasting Time Trend Micro Security Cameras Hacks Amazon Scary Stories Username Network Management Tech Support Fun Software as a Service Black Friday Managing Costs IP Address Deep Learning Outsource IT Database Monitors IT Technicians eCommerce SSID Environment Media Education Proxy Server Websites Cookies Surveillance Cyber Monday Virtual Assistant Virtual Machine Small Businesses Recovery Tactics Hotspot Reviews Electronic Medical Records Mirgation Medical IT SharePoint Mobile Computing Displays Hard Drives Domains Search Nanotechnology Development Transportation Hypervisor Lenovo Best Practice Outsourcing Addiction Writing Language Shopping Virtual Reality Chatbots Optimization PowerPoint Refrigeration Buisness Management Public Speaking Server Management IT solutions Workplace Private Cloud Screen Reader Distributed Denial of Service Employer/Employee Relationships Legal Navigation Lithium-ion battery Superfish Business Growth Hiring/Firing Identity Theft Service Level Agreement PCI DSS Computing Infrastructure Entrepreneur Gig Economy Twitter Identity Paperless Co-managed IT Bookmark Error Cortana Smart Tech Internet Service Provider Teamwork Alerts Evernote Alt Codes Technology Care Download Regulations Compliance Social Engineering Downtime Business Communications Remote Computing Memes Undo Hosted Solution Scams Browsers Connectivity Net Neutrality Break Fix SQL Server History Typing Hybrid Work Tablet Upload Financial Data Human Resources Social Network Smartwatch Alert IT Multi-Factor Security Google Drive Managed IT Cables File Sharing Knowledge IoT Procurement Dark Data Dark Web Azure Cyber security Tech Application Trends Telework How To Google Apps Customer Resource management CES Notifications 5G Regulations Communitications Google Calendar Google Docs IBM Unified Communications IT Maintenance Data Analysis Travel Experience Star Wars Supply Chain Management Microsoft Excel Staff Term Techology Bitcoin Business Intelligence Google Maps Running Cable Gamification FinTech Shortcuts Social Networking IT Assessment Legislation Google Wallet Ransmoware Fileless Malware Unified Threat Management Flexibility Value Wearable Technology Unified Threat Management Windows 8 Vendors Laptop Content Organization Be Proactive Health IT Digital Security Cameras Motherboard Smart Devices Comparison Drones Competition Workforce Directions Assessment Remote Working Network Congestion Permissions Memory Data Breach Google Play User Error Threats Halloween

Blog Archive