Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget Networking WiFi Apple App Employer-Employee Relationship BYOD Tip of the week Conferencing How To BDR HIPAA Applications Computing Hacker Information Technology Access Control Avoiding Downtime Marketing Office 365 Analytics Office Tips Retail Augmented Reality Healthcare Storage Managed IT Services Password Bring Your Own Device Big Data Router Physical Security Operating System Virtual Private Network Computers Health Risk Management 2FA Help Desk Website Remote Workers Firewall Telephone Scam Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Patch Management Social Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Going Green Customer Service Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Outlook Managed IT Service Maintenance Money Antivirus Downloads Humor iPhone Licensing Safety Vulnerabilities Entertainment Sports Data Privacy Mouse Images 101 Administration Telephone System Multi-Factor Authentication Mobility Robot Cost Management IT Management Customer Relationship Management Employees VPN Settings Meetings Wireless Integration Printing Content Filtering Hacking User Tip Modem Mobile Security Computer Repair Presentation Processor YouTube Cryptocurrency Holidays Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop LiFi Managed Services Provider Machine Learning Data storage Professional Services Saving Time Virtual Machines Word Regulations Compliance Server Management Identity Private Cloud Evernote Paperless Co-managed IT Refrigeration Bookmark Superfish Halloween Smart Tech Memes Identity Theft Download Net Neutrality Alerts SQL Server Technology Care Twitter Public Speaking Financial Data History Error Business Communications Lithium-ion battery Break Fix Scams Social Engineering Hacks Browsers Smartwatch Entrepreneur Scary Stories Connectivity IT Upload Procurement Fun Azure Hybrid Work Remote Computing Deep Learning Social Network Telework Cyber security Tech Human Resources Multi-Factor Security Dark Web Cables Undo CES IoT Communitications Tablet Trends Supply Chain Management Alert Education Customer Resource management FinTech Managed IT Regulations File Sharing Term Google Apps Dark Data Google Calendar Microsoft Excel IT Maintenance How To Mobile Computing Data Analysis Star Wars IT Assessment Gamification Flexibility Search Staff Value Business Intelligence Notifications Application Best Practice Organization Social Networking Travel Shortcuts Legislation Ransmoware Fileless Malware Digital Security Cameras Techology Buisness Smart Devices Google Maps IT solutions Content Remote Working Wearable Technology Memory Vendors IBM Legal Business Growth Health IT Motherboard Data Breach Unified Threat Management Google Play Be Proactive Comparison Permissions Workforce Directions Videos Unified Threat Management Assessment Electronic Health Records Cortana Wasting Time Threats Alt Codes Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Fraud Meta Competition Microchip User Error Downtime Internet Exlporer Software as a Service Hosted Solution Username Managing Costs Amazon Typing eCommerce Point of Sale SSID Black Friday Virtual Assistant Outsource IT Database Surveillance User Network Management Knowledge IT Technicians Virtual Machine Environment Tech Support Media Google Drive Proxy Server Reviews Cookies Medical IT Monitors Cyber Monday Tactics Development 5G Hotspot Transportation Small Businesses Unified Communications Experience Mirgation Hypervisor Displays Websites IP Address Google Docs PowerPoint Bitcoin Shopping Running Cable Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Electronic Medical Records Google Wallet SharePoint Recovery Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Writing Hard Drives Windows 8 Gig Economy Lenovo Laptop Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Domains Drones

Blog Archive