Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Automation Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Blockchain Apps Two-factor Authentication Data Security Vendor Mobile Office Employer-Employee Relationship Chrome BYOD Budget Apple Mobile Device Management Tip of the week App Gmail Managed Services Voice over Internet Protocol Networking BDR HIPAA Office 365 Applications Hacker Avoiding Downtime Marketing Access Control Conferencing WiFi Computing Information Technology How To Analytics Router Office Tips Augmented Reality Computers Storage Password Virtual Private Network Website Help Desk Bring Your Own Device Health Retail Operating System 2FA Big Data Managed IT Services Risk Management Healthcare Patch Management Save Money Customer Service Remote Monitoring Free Resource Project Management End of Support Vulnerability Vendor Management Windows 7 Physical Security Microsoft 365 Display Printer Monitoring Solutions Paperless Office Infrastructure Firewall Document Management Going Green Telephone The Internet of Things Windows 11 Cybercrime Cooperation Scam Data loss Social Remote Workers Excel Virtual Desktop iPhone Data storage LiFi Customer Relationship Management Robot Vulnerabilities Outlook Hacking Presentation Images 101 Money Humor User Tip IT Management Modem Multi-Factor Authentication Mobility Processor Data Privacy VPN Meetings Mobile Security Wireless Technology Sports Computer Repair Mouse Smart Technology Employees Administration Word Integration Saving Time Machine Learning Managed IT Service Holidays Downloads Safety Settings Data Storage Licensing Wireless Printing Maintenance Content Filtering Video Conferencing Entertainment Antivirus Managed Services Provider Virtual Machines Professional Services YouTube Supply Chain Cryptocurrency Telephone System Cost Management Smartwatch Paperless Wearable Technology IT How To Google Wallet Content Health IT Co-managed IT Motherboard Procurement Notifications Comparison Azure Cyber security Tech Directions Windows 8 Technology Care Assessment Laptop Telework Travel Permissions Competition CES Business Communications Google Maps Communitications Drones Techology Scams Supply Chain Management Specifications Term Microchip Hybrid Work Internet Exlporer Halloween FinTech Unified Threat Management Fraud Human Resources IT Assessment Unified Threat Management Username Cables User Flexibility Black Friday Value Network Congestion Hacks Database Scary Stories Organization Digital Security Cameras Google Apps IT Technicians Fun Smart Devices User Error Proxy Server Deep Learning IP Address IT Maintenance Cookies Remote Working Cyber Monday Memory Hotspot Data Breach Google Play Business Intelligence Tactics Point of Sale Education Videos Shortcuts Mirgation Electronic Health Records Ransmoware Network Management Nanotechnology Recovery Tech Support Wasting Time Language Trend Micro Monitors Security Cameras Mobile Computing Vendors Addiction Hard Drives Management Domains Be Proactive Chatbots Search Software as a Service Best Practice Workforce Screen Reader Websites Distributed Denial of Service Managing Costs Computing Infrastructure eCommerce SSID Threats Service Level Agreement Buisness Refrigeration SharePoint IT solutions Public Speaking Workplace Strategies Identity Surveillance Electronic Medical Records Virtual Assistant Legal Bookmark Business Growth Lithium-ion battery Meta Smart Tech Virtual Machine Alerts Entrepreneur Writing Medical IT Amazon Lenovo Download Reviews Cortana Development Virtual Reality Transportation Browsers Alt Codes Outsource IT Server Management Connectivity Private Cloud Break Fix Hypervisor Identity Theft Optimization PowerPoint Environment Superfish Upload Downtime Undo Shopping Media Social Network Hosted Solution Twitter Multi-Factor Security Employer/Employee Relationships Navigation Typing Small Businesses IoT PCI DSS Error Dark Web Gig Economy Social Engineering Displays Trends Customer Resource management Regulations Knowledge Internet Service Provider Remote Computing Google Calendar Teamwork Google Drive Evernote Data Analysis Outsourcing Star Wars Application Regulations Compliance Microsoft Excel Tablet Staff 5G Memes Gamification Google Docs Unified Communications IBM Workplace Social Networking Experience Net Neutrality Alert Legislation SQL Server History Dark Data Fileless Malware Bitcoin Hiring/Firing Managed IT Running Cable Financial Data File Sharing

Blog Archive