Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Artificial Intelligence Miscellaneous Information Holiday Gadgets Covid-19 Cloud Computing Training Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Vendor Mobile Office Gmail WiFi Tip of the week Managed Services Chrome Voice over Internet Protocol Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Access Control Office 365 Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Computing Applications Information Technology 2FA Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Computers Website Operating System Router Physical Security Virtual Private Network Risk Management Monitoring Paperless Office Infrastructure Excel The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Cybercrime Display Windows 11 Printer Firewall Data Storage Virtual Desktop LiFi Smart Technology Supply Chain Data storage Video Conferencing Safety Managed Services Provider Professional Services Saving Time Outlook Virtual Machines Machine Learning Money Managed IT Service Humor Downloads Maintenance iPhone Antivirus Licensing Sports Mouse Vulnerabilities Customer Relationship Management Entertainment Data Privacy Administration Images 101 Hacking Mobility Presentation Telephone System Multi-Factor Authentication Cost Management Robot Wireless Technology Settings Printing Wireless Content Filtering Employees IT Management Integration VPN YouTube Meetings User Tip Word Modem Cryptocurrency Mobile Security Processor Computer Repair Holidays Monitors Google Wallet Entrepreneur Mirgation Hypervisor Displays PowerPoint Shopping Nanotechnology Optimization Addiction Windows 8 Language Employer/Employee Relationships Outsourcing Laptop Websites Undo Management PCI DSS Drones Chatbots Navigation Distributed Denial of Service Workplace Electronic Medical Records Gig Economy SharePoint Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Halloween Writing Regulations Compliance Lenovo Identity Evernote Paperless Co-managed IT Virtual Reality Bookmark Smart Tech Memes Application Download Net Neutrality Hacks Server Management Alerts SQL Server Technology Care Scary Stories Private Cloud Fun Financial Data Superfish History Identity Theft Business Communications Deep Learning Break Fix Scams Twitter IBM Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Error Social Engineering Social Network Telework Cyber security Education Multi-Factor Security Tech Human Resources Dark Web Cables Remote Computing CES IoT Communitications Trends Supply Chain Management Mobile Computing Search Competition Customer Resource management FinTech Regulations Tablet Google Calendar Term Google Apps Star Wars IT Assessment Best Practice Microsoft Excel IT Maintenance Alert Data Analysis Gamification Flexibility Managed IT Staff Value Business Intelligence Buisness File Sharing Dark Data Legislation Shortcuts How To Organization Legal Social Networking IT solutions Smart Devices Business Growth Ransmoware Notifications Fileless Malware Digital Security Cameras User Content Remote Working Wearable Technology Memory Vendors Travel Comparison Google Play Be Proactive Cortana Health IT Techology Motherboard Data Breach Google Maps Assessment Electronic Health Records Alt Codes Permissions Workforce IP Address Directions Videos Wasting Time Threats Downtime Unified Threat Management Specifications Security Cameras Workplace Strategies Unified Threat Management Trend Micro Hosted Solution Recovery Internet Exlporer Software as a Service Typing Fraud Meta Microchip Hard Drives Username Managing Costs Amazon Network Congestion Black Friday SSID Knowledge Domains Google Drive User Error eCommerce Database Surveillance Virtual Assistant Outsource IT 5G Refrigeration IT Technicians Virtual Machine Environment Point of Sale Media Unified Communications Cyber Monday Medical IT Experience Public Speaking Proxy Server Reviews Google Docs Cookies Tactics Development Bitcoin Network Management Hotspot Transportation Small Businesses Running Cable Tech Support Lithium-ion battery

Blog Archive