Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Miscellaneous Automation Information Artificial Intelligence Training Gadgets Cloud Computing Covid-19 Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Apps Data Security Two-factor Authentication Mobile Office Vendor WiFi Apple App Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome BYOD Gmail Budget Applications Access Control Conferencing Computing Hacker Information Technology How To Avoiding Downtime BDR Marketing Office 365 HIPAA Storage Virtual Private Network Password Bring Your Own Device Big Data Health 2FA Help Desk Retail Operating System Healthcare Computers Risk Management Managed IT Services Website Office Tips Analytics Augmented Reality Router Physical Security Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Social Monitoring Excel Going Green Document Management Remote Workers Customer Service Cybercrime Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Safety User Tip Modem Sports Processor Mouse Computer Repair Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Customer Relationship Management Settings Printing Managed IT Service Wireless Content Filtering Maintenance Hacking Downloads Antivirus Presentation YouTube iPhone Licensing Cryptocurrency Entertainment Wireless Technology Vulnerabilities Data Privacy Images 101 Virtual Desktop Data storage LiFi Telephone System Multi-Factor Authentication Robot Mobility Cost Management Word Outlook Money Humor IT Management VPN Employees Meetings Integration Managing Costs Amazon Username Deep Learning Undo Point of Sale eCommerce Black Friday SSID Database Surveillance Education Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Network Management Proxy Server Reviews Mobile Computing Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Search Websites Mirgation Hypervisor Displays Application Best Practice Shopping Nanotechnology Optimization Buisness PowerPoint SharePoint IBM Legal Addiction IT solutions Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Business Growth Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Alt Codes Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Competition Identity Theft Smart Tech Memes Downtime Co-managed IT Download Net Neutrality Hosted Solution Twitter Alerts SQL Server Technology Care Typing Error History Business Communications Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Knowledge Google Drive Upload Procurement User Remote Computing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables 5G Alert Experience IP Address Google Docs Trends Supply Chain Management Unified Communications Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Running Cable Dark Data Google Calendar Term Google Apps Data Analysis Google Wallet Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Recovery Organization Hard Drives Windows 8 Travel Social Networking Laptop Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Domains Drones Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Content Remote Working Health IT Refrigeration Unified Threat Management Motherboard Data Breach Halloween Comparison Google Play Be Proactive Unified Threat Management Directions Videos Public Speaking Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Lithium-ion battery Hacks Trend Micro Entrepreneur Scary Stories Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Fraud Meta Fun

Blog Archive