Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Business Technology Bandwidth Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Managed Services Apps Data Security BYOD Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Apple Voice over Internet Protocol App Employer-Employee Relationship Networking Information Technology Avoiding Downtime HIPAA Marketing Physical Security Applications Office 365 Access Control Password Conferencing Managed IT Services How To BDR Computing Hacker Risk Management Router Website Virtual Private Network Analytics Office Tips Augmented Reality Health Help Desk 2FA Storage Bring Your Own Device Big Data Retail Healthcare Operating System Computers Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Solutions Display Printer Paperless Office Firewall Infrastructure Monitoring Windows 11 Document Management The Internet of Things Excel Managed IT Service Social Remote Workers Telephone Scam Data loss Going Green Cooperation Customer Service Free Resource Project Management Cybercrime Patch Management Windows 7 Save Money Multi-Factor Authentication Cryptocurrency Mobility Wireless Technology IT Management VPN Meetings Virtual Desktop LiFi Data storage Employees User Tip Modem Integration Word Processor Outlook Computer Repair Mobile Security Money Humor Holidays Smart Technology Data Storage Safety Machine Learning Supply Chain Sports Saving Time Video Conferencing Mouse Managed Services Provider Virtual Machines Professional Services Administration Maintenance Antivirus Downloads Licensing iPhone Entertainment Customer Relationship Management Settings Printing Vulnerabilities Wireless Content Filtering Data Privacy Hacking Images 101 Telephone System Presentation Robot YouTube Cost Management Wearable Technology Shortcuts Organization Content 5G Digital Security Cameras Health IT Smart Devices Unified Threat Management Motherboard Ransmoware Comparison Unified Communications Experience Unified Threat Management Directions Remote Working Assessment IP Address Google Docs Memory Vendors Permissions Data Breach Bitcoin Google Play Be Proactive Running Cable Videos Electronic Health Records Google Wallet Workforce Network Congestion Specifications Recovery User Error Microchip Internet Exlporer Wasting Time Threats Fraud Trend Micro Hard Drives Windows 8 Security Cameras Workplace Strategies Laptop Username Software as a Service Point of Sale Domains Drones Meta Black Friday Database Managing Costs Amazon Network Management eCommerce Tech Support IT Technicians Refrigeration SSID Halloween Proxy Server Surveillance Cookies Public Speaking Virtual Assistant Outsource IT Monitors Cyber Monday Hotspot Media Tactics Lithium-ion battery Virtual Machine Environment Websites Mirgation Hacks Medical IT Entrepreneur Scary Stories Reviews Fun Development Nanotechnology Transportation Small Businesses Electronic Medical Records Language Deep Learning SharePoint Addiction Hypervisor Displays Management Optimization Chatbots Undo PowerPoint Shopping Lenovo Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Education Virtual Reality Computing Infrastructure Navigation PCI DSS Service Level Agreement Gig Economy Server Management Private Cloud Identity Mobile Computing Workplace Search Superfish Bookmark Internet Service Provider Identity Theft Smart Tech Teamwork Hiring/Firing Twitter Alerts Application Best Practice Evernote Paperless Regulations Compliance Download Memes Error Co-managed IT Buisness Browsers Net Neutrality Connectivity IBM Legal SQL Server Technology Care Social Engineering Break Fix IT solutions History Remote Computing Business Growth Business Communications Financial Data Upload Smartwatch Social Network IT Scams Multi-Factor Security Cortana Procurement Tablet IoT Azure Hybrid Work Dark Web Cyber security Alert Alt Codes Tech Human Resources Telework Trends CES Managed IT Customer Resource management Communitications File Sharing Regulations Competition Cables Dark Data Google Calendar Downtime Hosted Solution Data Analysis Supply Chain Management Star Wars How To Microsoft Excel Notifications Staff Typing Term Google Apps FinTech Gamification IT Assessment Travel Social Networking IT Maintenance Legislation User Knowledge Techology Fileless Malware Flexibility Google Maps Google Drive Value Business Intelligence

Blog Archive