Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Facebook Automation Artificial Intelligence Information Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Vendor Data Security Apps Two-factor Authentication Mobile Office Gmail Apple Networking App Managed Services Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Applications How To WiFi BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Router Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Augmented Reality Retail Firewall Scam Data loss Windows 11 The Internet of Things Monitoring Going Green Patch Management Social Excel Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers Physical Security Telephone Customer Service Display Printer Paperless Office Cooperation Free Resource Project Management Infrastructure Windows 7 Microsoft 365 Document Management Solutions Employees Maintenance Antivirus Sports Integration Mouse User Tip Modem Safety Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering Managed IT Service IT Management Customer Relationship Management VPN YouTube Meetings Downloads iPhone Cryptocurrency Hacking Licensing Presentation Computer Repair Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Wireless Technology Images 101 Telephone System Multi-Factor Authentication Mobility Outlook Machine Learning Cost Management Money Word Humor Twitter Trend Micro Specifications Security Cameras Workplace Strategies Deep Learning Public Speaking Lithium-ion battery Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Education Social Engineering Username Entrepreneur Remote Computing eCommerce Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Tablet Undo Search Alert Proxy Server Reviews Cookies Cyber Monday Medical IT Best Practice Managed IT Buisness File Sharing Dark Data Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Legal IT solutions How To Notifications Shopping Nanotechnology Optimization PowerPoint Business Growth Travel Application Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Techology Google Maps Cortana Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Alt Codes IBM Downtime Unified Threat Management Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Unified Threat Management Hosted Solution Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Typing Network Congestion Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Google Drive User Error Competition Knowledge Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Point of Sale 5G Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Google Docs Unified Communications Experience Social Network Telework Running Cable Tech Support CES User IoT Communitications Dark Web Cables Bitcoin Network Management Google Wallet Monitors Trends Supply Chain Management Regulations Google Calendar Term Google Apps Customer Resource management FinTech IP Address Laptop Websites Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Windows 8 Drones Gamification Flexibility Staff Value Business Intelligence Organization Social Networking Legislation Shortcuts SharePoint Electronic Medical Records Halloween Fileless Malware Digital Security Cameras Recovery Smart Devices Ransmoware Wearable Technology Memory Vendors Lenovo Hard Drives Writing Content Remote Working Virtual Reality Health IT Motherboard Data Breach Comparison Google Play Be Proactive Domains Hacks Server Management Scary Stories Private Cloud Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Superfish Identity Theft Refrigeration Fun

Blog Archive