Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Chrome Tip of the week Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple WiFi Networking App Computing HIPAA Information Technology Applications Hacker Avoiding Downtime Office 365 Access Control Marketing Conferencing How To BDR Operating System Router Physical Security Risk Management Computers Virtual Private Network Health Office Tips Analytics Website 2FA Help Desk Augmented Reality Storage Password Retail Healthcare Bring Your Own Device Managed IT Services Big Data Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Cybercrime Vulnerability Vendor Management Solutions Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Going Green Windows 7 Social Robot Mobility Settings Telephone System Multi-Factor Authentication Cost Management Printing Wireless Content Filtering Customer Relationship Management YouTube IT Management Cryptocurrency Employees VPN Meetings Integration Hacking Presentation User Tip Modem Computer Repair Mobile Security Virtual Desktop Processor Data storage LiFi Wireless Technology Holidays Data Storage Outlook Supply Chain Smart Technology Video Conferencing Money Word Humor Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Managed IT Service Sports Maintenance Mouse Downloads Antivirus Safety iPhone Licensing Administration Vulnerabilities Entertainment Data Privacy Images 101 Alt Codes IBM Shortcuts Legislation Organization Travel Social Networking Smart Devices Google Maps Ransmoware Downtime Digital Security Cameras Techology Fileless Malware Remote Working Content Vendors Wearable Technology Memory Hosted Solution Typing Be Proactive Comparison Google Play Health IT Unified Threat Management Motherboard Data Breach Electronic Health Records Assessment Workforce Permissions Videos Unified Threat Management Directions Knowledge Google Drive Threats Wasting Time Competition Workplace Strategies Network Congestion Specifications Security Cameras Trend Micro Software as a Service Internet Exlporer Meta Fraud 5G User Error Microchip Experience Username Google Docs Amazon Managing Costs Unified Communications Bitcoin Black Friday SSID Running Cable User Point of Sale eCommerce Surveillance Database Google Wallet Outsource IT Virtual Assistant Network Management Environment Tech Support IT Technicians Virtual Machine Media Windows 8 IP Address Monitors Cyber Monday Medical IT Laptop Reviews Proxy Server Cookies Development Tactics Drones Small Businesses Hotspot Transportation Displays Websites Mirgation Hypervisor PowerPoint Halloween Recovery Shopping Nanotechnology Optimization SharePoint Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Hard Drives PCI DSS Management Chatbots Domains Navigation Screen Reader Hacks Workplace Writing Distributed Denial of Service Scary Stories Gig Economy Lenovo Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Refrigeration Fun Paperless Evernote Regulations Compliance Server Management Private Cloud Identity Deep Learning Public Speaking Memes Identity Theft Smart Tech Lithium-ion battery Co-managed IT Superfish Bookmark Net Neutrality Download Technology Care Twitter Alerts SQL Server Education Entrepreneur Business Communications Financial Data Error History IT Connectivity Mobile Computing Scams Social Engineering Break Fix Smartwatch Browsers Procurement Upload Hybrid Work Remote Computing Azure Undo Search Human Resources Multi-Factor Security Tech Telework Social Network Cyber security Best Practice Communitications Tablet IoT Cables Dark Web Buisness CES Supply Chain Management Trends Legal Alert IT solutions Google Apps Dark Data Google Calendar Term FinTech Managed IT Customer Resource management File Sharing Regulations Business Growth IT Assessment Star Wars IT Maintenance How To Microsoft Excel Application Data Analysis Flexibility Gamification Business Intelligence Notifications Staff Value Cortana

Blog Archive