Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Apple WiFi App BYOD Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Chrome Mobile Device Management Networking Budget BDR HIPAA Applications Computing Access Control Information Technology Hacker Avoiding Downtime Conferencing Office 365 Marketing How To Bring Your Own Device Big Data Router Physical Security Virtual Private Network Operating System Health 2FA Help Desk Risk Management Computers Retail Analytics Website Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Solutions Social Going Green Display Printer Cybercrime Paperless Office Windows 11 Infrastructure Customer Service Monitoring Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Images 101 Mouse Multi-Factor Authentication Robot Mobility Safety Telephone System Cost Management Administration IT Management Meetings VPN Employees Integration Settings Wireless Modem Printing User Tip Processor Content Filtering Computer Repair Mobile Security Customer Relationship Management Holidays YouTube Cryptocurrency Data Storage Smart Technology Supply Chain Hacking Presentation Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Virtual Desktop LiFi Wireless Technology Data storage Managed IT Service Maintenance Outlook Downloads Antivirus iPhone Money Word Licensing Humor Entertainment Vulnerabilities Data Privacy Sports Data Analysis Entrepreneur Star Wars IT Assessment How To Microsoft Excel IT Maintenance Education Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Mobile Computing Organization Undo Techology Fileless Malware Digital Security Cameras Search Google Maps Smart Devices Ransmoware Best Practice Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Buisness Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Legal IT solutions Business Growth Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Application User Error Microchip Cortana Internet Exlporer Software as a Service Fraud Meta Alt Codes IBM Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Downtime Hosted Solution Database Surveillance Virtual Assistant Outsource IT Media Typing Network Management Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Competition Knowledge Tactics Development Hotspot Transportation Small Businesses Google Drive Websites Mirgation Hypervisor Displays Shopping 5G Nanotechnology Optimization PowerPoint Unified Communications SharePoint Experience Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Docs Chatbots Navigation Bitcoin Running Cable User Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Google Wallet Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Windows 8 IP Address Laptop Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Drones Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Halloween Recovery Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Hard Drives Domains Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hacks Scary Stories Social Network Telework CES Fun Tablet IoT Communitications Dark Web Cables Refrigeration Deep Learning Public Speaking Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Lithium-ion battery Managed IT Customer Resource management FinTech

Blog Archive