Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Automation Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Managed Services Gmail Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Augmented Reality 2FA Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Operating System Router Computers Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Windows 11 Document Management Firewall Remote Workers Excel Telephone Scam The Internet of Things Data loss Cooperation Free Resource Social Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Solutions Cybercrime Physical Security Display Printer Paperless Office Infrastructure Monitoring Money Saving Time Virtual Machines Professional Services Humor Supply Chain Managed IT Service Maintenance Safety Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Customer Relationship Management Settings Data Privacy Printing Wireless Content Filtering Hacking IT Management VPN Employees YouTube Meetings Presentation Integration Cryptocurrency User Tip Modem Wireless Technology Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Word Outlook Video Conferencing Machine Learning Managed Services Provider Lenovo Gig Economy Screen Reader Public Speaking Writing Distributed Denial of Service Small Businesses Service Level Agreement Internet Service Provider Lithium-ion battery Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Evernote Entrepreneur Displays Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Outsourcing Deep Learning Download Net Neutrality Twitter Alerts SQL Server Error History Undo Financial Data Browsers Smartwatch Workplace Education Connectivity IT Social Engineering Break Fix Hiring/Firing Upload Procurement Remote Computing Azure Mobile Computing Social Network Telework Paperless Cyber security Multi-Factor Security Tech CES Co-managed IT Tablet IoT Communitications Search Dark Web Alert Application Technology Care Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Business Communications Buisness File Sharing Regulations Dark Data Google Calendar Term Legal Data Analysis Scams IT solutions Star Wars IT Assessment IBM How To Microsoft Excel Notifications Staff Value Hybrid Work Business Growth Gamification Flexibility Organization Human Resources Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Cables Google Maps Smart Devices Cortana Wearable Technology Memory Alt Codes Content Remote Working Health IT Google Apps Downtime Unified Threat Management Motherboard Data Breach Competition Comparison Google Play Unified Threat Management Directions Videos IT Maintenance Hosted Solution Assessment Electronic Health Records Permissions Wasting Time Business Intelligence Typing Shortcuts Trend Micro Network Congestion Specifications Security Cameras User Google Drive User Error Microchip Ransmoware Internet Exlporer Software as a Service Knowledge Fraud Managing Costs Vendors Username Be Proactive Point of Sale eCommerce 5G Black Friday SSID Google Docs Workforce Unified Communications Database Surveillance IP Address Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine Threats Bitcoin Network Management Google Wallet Proxy Server Reviews Workplace Strategies Cookies Monitors Cyber Monday Medical IT Recovery Meta Tactics Development Hotspot Transportation Laptop Websites Mirgation Hypervisor Hard Drives Amazon Windows 8 Drones Shopping Nanotechnology Optimization Domains PowerPoint SharePoint Outsource IT Addiction Electronic Medical Records Language Employer/Employee Relationships Media Halloween Chatbots Refrigeration Navigation Environment Management PCI DSS

Blog Archive