Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Automation Information Facebook Artificial Intelligence Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Blockchain Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Apps Vendor Mobile Office Data Security Two-factor Authentication Managed Services Employer-Employee Relationship Voice over Internet Protocol Tip of the week Apple App Networking Mobile Device Management Gmail BYOD Chrome Budget HIPAA Applications Hacker Avoiding Downtime How To Marketing BDR Computing Information Technology Conferencing Office 365 WiFi Access Control Storage Password Bring Your Own Device Healthcare Router Retail Computers Managed IT Services Operating System Website Help Desk Risk Management 2FA Analytics Office Tips Virtual Private Network Augmented Reality Big Data Health Remote Workers Document Management Customer Service Scam Free Resource Going Green Project Management Data loss Windows 7 Monitoring Microsoft 365 Cybercrime Solutions Patch Management Save Money Windows 11 Remote Monitoring Firewall End of Support Vulnerability Vendor Management Telephone Excel Physical Security The Internet of Things Display Cooperation Printer Paperless Office Social Infrastructure Telephone System Virtual Machines Professional Services Sports Cost Management Mouse Customer Relationship Management Machine Learning Data Privacy Administration iPhone Hacking Presentation Maintenance User Tip Modem Vulnerabilities Antivirus Processor Mobile Security Wireless Technology Images 101 Settings Wireless Printing Multi-Factor Authentication Mobility Content Filtering Smart Technology YouTube Word Saving Time Robot Cryptocurrency Employees Integration Managed IT Service Virtual Desktop Data storage Supply Chain Downloads LiFi IT Management Meetings Safety VPN Licensing Holidays Outlook Entertainment Money Computer Repair Data Storage Humor Video Conferencing Managed Services Provider Gig Economy Social Networking Scams Legislation Deep Learning IBM Websites Fileless Malware Internet Service Provider Teamwork Hybrid Work Wearable Technology SharePoint Evernote Human Resources Education Electronic Medical Records Regulations Compliance Content Health IT Memes Motherboard Cables Comparison Lenovo Directions Writing Net Neutrality Assessment SQL Server Permissions Mobile Computing History Google Apps Competition Search Virtual Reality Financial Data Private Cloud Smartwatch IT IT Maintenance Specifications Best Practice Server Management Superfish Buisness Identity Theft Microchip Procurement Internet Exlporer Azure Business Intelligence Fraud Cyber security Legal Tech Shortcuts IT solutions Twitter Telework Username Error CES Communitications Ransmoware Black Friday Business Growth User Social Engineering Supply Chain Management Database Vendors IT Technicians Term Be Proactive Cortana Remote Computing FinTech Proxy Server IT Assessment Cookies Workforce Cyber Monday Alt Codes IP Address Downtime Tablet Flexibility Tactics Value Threats Hotspot Mirgation Workplace Strategies Hosted Solution Alert Organization Recovery File Sharing Digital Security Cameras Dark Data Smart Devices Nanotechnology Meta Typing Managed IT Hard Drives How To Remote Working Addiction Memory Amazon Language Management Data Breach Chatbots Google Drive Google Play Domains Knowledge Notifications Travel Videos Electronic Health Records Screen Reader Outsource IT Distributed Denial of Service Computing Infrastructure Techology Media Refrigeration Google Maps 5G Service Level Agreement Wasting Time Environment Trend Micro Identity Google Docs Security Cameras Unified Communications Public Speaking Experience Running Cable Unified Threat Management Bookmark Software as a Service Smart Tech Small Businesses Bitcoin Lithium-ion battery Alerts Google Wallet Unified Threat Management Entrepreneur Download Managing Costs Displays eCommerce SSID Laptop Browsers Network Congestion Surveillance Connectivity Virtual Assistant Outsourcing Break Fix Windows 8 Virtual Machine Drones User Error Undo Upload Reviews Social Network Medical IT Workplace Multi-Factor Security Halloween Point of Sale Development IoT Transportation Hiring/Firing Dark Web Hypervisor Paperless Trends Shopping Customer Resource management Optimization Regulations PowerPoint Co-managed IT Google Calendar Network Management Tech Support Scary Stories Application Data Analysis Monitors Star Wars Employer/Employee Relationships Technology Care Microsoft Excel Hacks Staff Navigation Business Communications Fun PCI DSS Gamification

Blog Archive