Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Disaster Recovery Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Covid-19 Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Vendor Apps Two-factor Authentication Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking App BYOD Managed Services Employer-Employee Relationship Voice over Internet Protocol Office 365 Avoiding Downtime Marketing Conferencing How To BDR WiFi HIPAA Computing Applications Information Technology Access Control Hacker Help Desk Office Tips Analytics Website Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services 2FA Big Data Operating System Router Virtual Private Network Risk Management Healthcare Computers Health Monitoring Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Telephone Scam Firewall Data loss Cooperation Windows 11 The Internet of Things Going Green Patch Management Save Money Social Remote Monitoring Vulnerability End of Support Excel Vendor Management Cybercrime Physical Security Remote Workers Display Printer Customer Service Paperless Office Infrastructure Data Privacy Wireless Technology Smart Technology Outlook Images 101 Machine Learning Mobility Money Saving Time Multi-Factor Authentication Humor Word Managed IT Service Maintenance Antivirus Sports Downloads Mouse Employees Licensing Integration Entertainment Administration Safety Holidays Telephone System Data Storage Robot Supply Chain Cost Management Video Conferencing Settings Printing Managed Services Provider Wireless Professional Services Virtual Machines Content Filtering IT Management VPN YouTube Meetings Customer Relationship Management Cryptocurrency User Tip Modem Computer Repair Mobile Security iPhone Processor Hacking Presentation Virtual Desktop Vulnerabilities Data storage LiFi Windows 8 Supply Chain Management Laptop Websites Mirgation Drones FinTech Nanotechnology Term Google Apps IT Assessment Electronic Medical Records Language IT Maintenance SharePoint IP Address Addiction Management Flexibility Halloween Chatbots Value Business Intelligence Shortcuts Lenovo Organization Screen Reader Writing Distributed Denial of Service Smart Devices Recovery Virtual Reality Computing Infrastructure Ransmoware Digital Security Cameras Service Level Agreement Hacks Server Management Remote Working Hard Drives Scary Stories Private Cloud Identity Memory Vendors Google Play Be Proactive Superfish Bookmark Domains Identity Theft Smart Tech Data Breach Fun Electronic Health Records Twitter Alerts Workforce Videos Deep Learning Download Refrigeration Error Wasting Time Threats Security Cameras Workplace Strategies Browsers Public Speaking Education Connectivity Trend Micro Social Engineering Break Fix Software as a Service Remote Computing Meta Lithium-ion battery Upload Mobile Computing Social Network Managing Costs Amazon Entrepreneur Multi-Factor Security SSID Tablet IoT eCommerce Search Dark Web Surveillance Alert Virtual Assistant Outsource IT Best Practice Trends Managed IT Customer Resource management Undo Buisness File Sharing Regulations Virtual Machine Environment Dark Data Google Calendar Media Medical IT Legal Data Analysis Reviews IT solutions Star Wars How To Microsoft Excel Development Notifications Staff Transportation Small Businesses Business Growth Gamification Travel Social Networking Hypervisor Displays Legislation PowerPoint Techology Fileless Malware Shopping Google Maps Optimization Cortana Application Wearable Technology Employer/Employee Relationships Outsourcing Alt Codes Content Health IT PCI DSS Downtime Unified Threat Management Motherboard Comparison Navigation Workplace Unified Threat Management Directions Gig Economy IBM Hosted Solution Assessment Permissions Typing Internet Service Provider Teamwork Hiring/Firing Regulations Compliance Network Congestion Specifications Evernote Paperless Knowledge Fraud Co-managed IT Google Drive User Error Microchip Internet Exlporer Memes Username Net Neutrality SQL Server Technology Care Financial Data Competition Point of Sale History 5G Black Friday Business Communications Experience Scams Google Docs Smartwatch Unified Communications Database IT Bitcoin Network Management Procurement Running Cable Tech Support IT Technicians Azure Hybrid Work Google Wallet Proxy Server Telework Cookies Cyber security Monitors Cyber Monday Tech Human Resources User Hotspot Cables CES Tactics Communitications

Blog Archive