Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Windows 10 Virtualization Blockchain Wi-Fi Business Technology Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Mobile Device Management Voice over Internet Protocol Budget How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Operating System Router Risk Management Virtual Private Network Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Firewall Telephone Scam Data loss Free Resource Cooperation The Internet of Things Project Management Windows 7 Going Green Patch Management Social Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Solutions Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Maintenance Sports Antivirus Downloads iPhone Mouse Licensing Safety Vulnerabilities Administration Entertainment Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management YouTube Employees VPN Meetings Integration Cryptocurrency Hacking User Tip Modem Computer Repair Mobile Security Presentation Processor Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Supply Chain Smart Technology Video Conferencing Outlook Managed Services Provider Machine Learning Professional Services Money Saving Time Virtual Machines Humor Word Managed IT Service Net Neutrality Download SQL Server Technology Care Twitter Alerts Deep Learning Public Speaking Lithium-ion battery Financial Data History Error Business Communications Scams Social Engineering Break Fix Education Smartwatch Browsers Entrepreneur IT Connectivity Procurement Upload Azure Hybrid Work Remote Computing Telework Social Network Cyber security Human Resources Multi-Factor Security Tech Mobile Computing Cables Dark Web Undo CES Search Communitications Tablet IoT Supply Chain Management Trends Alert Best Practice Buisness FinTech Managed IT Customer Resource management File Sharing Regulations Google Apps Dark Data Google Calendar Term IT Maintenance How To Microsoft Excel Legal IT solutions Data Analysis IT Assessment Star Wars Flexibility Gamification Value Business Intelligence Notifications Staff Business Growth Application Organization Travel Social Networking Shortcuts Legislation Ransmoware Digital Security Cameras Techology Fileless Malware Cortana Smart Devices Google Maps Remote Working Content Memory Vendors Wearable Technology Alt Codes IBM Downtime Health IT Data Breach Unified Threat Management Motherboard Be Proactive Comparison Google Play Workforce Permissions Hosted Solution Videos Unified Threat Management Directions Electronic Health Records Assessment Wasting Time Threats Typing Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Software as a Service Internet Exlporer Meta Fraud Google Drive Competition User Error Microchip Knowledge Username Managing Costs Amazon SSID Black Friday 5G eCommerce Point of Sale Surveillance Database Virtual Assistant Outsource IT Google Docs Unified Communications Experience Running Cable User Network Management Virtual Machine Environment Tech Support IT Technicians Media Bitcoin Medical IT Monitors Cyber Monday Google Wallet Reviews Proxy Server Cookies Development Tactics Transportation Small Businesses Hotspot Laptop Hypervisor Displays Websites Mirgation Windows 8 IP Address PowerPoint Drones Shopping Optimization Nanotechnology Addiction Employer/Employee Relationships Outsourcing Electronic Medical Records Language SharePoint Halloween Recovery PCI DSS Management Chatbots Navigation Workplace Writing Distributed Denial of Service Hard Drives Gig Economy Lenovo Screen Reader Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Virtual Reality Computing Infrastructure Domains Scary Stories Regulations Compliance Server Management Private Cloud Identity Paperless Evernote Hacks Co-managed IT Refrigeration Superfish Bookmark Fun Memes Identity Theft Smart Tech

Blog Archive