Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Cloud Computing Gadgets Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security BYOD Managed Services Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking WiFi App Computing Conferencing Information Technology Hacker Access Control Office 365 Avoiding Downtime Marketing HIPAA Applications How To BDR Operating System Physical Security Healthcare Virtual Private Network Risk Management Computers Health Analytics Office Tips Augmented Reality Website Retail Storage Password Router Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Vendor Management Cybercrime Remote Workers Display Telephone Customer Service Printer Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Firewall Data loss Windows 11 The Internet of Things Going Green Patch Management Monitoring Save Money Remote Monitoring Social End of Support Excel Vulnerability Saving Time Virtual Machines Content Filtering Professional Services IT Management VPN YouTube Meetings Managed IT Service Customer Relationship Management Cryptocurrency Downloads Computer Repair iPhone Hacking Licensing Presentation Virtual Desktop Entertainment LiFi Vulnerabilities Data storage Data Privacy Wireless Technology Outlook Images 101 Machine Learning Multi-Factor Authentication Mobility Money Telephone System Humor Cost Management Word Maintenance Antivirus Sports Mouse Employees Integration Administration Modem User Tip Safety Processor Mobile Security Holidays Robot Data Storage Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace IBM Unified Threat Management Typing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Network Congestion Evernote Paperless Regulations Compliance Bookmark Smart Tech Memes Knowledge Co-managed IT Google Drive User Error Download Net Neutrality Alerts SQL Server Technology Care History 5G Business Communications Competition Financial Data Point of Sale Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Google Docs Bitcoin Network Management Upload Procurement Running Cable Tech Support Azure Hybrid Work Cyber security Monitors Multi-Factor Security Tech Human Resources Google Wallet Social Network Telework CES User IoT Communitications Dark Web Cables Windows 8 Trends Supply Chain Management Laptop Websites Regulations Google Calendar Term Google Apps Drones Customer Resource management FinTech SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance IP Address Gamification Flexibility Halloween Staff Value Business Intelligence Social Networking Writing Legislation Shortcuts Lenovo Organization Fileless Malware Digital Security Cameras Recovery Smart Devices Virtual Reality Ransmoware Hard Drives Hacks Server Management Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive Domains Superfish Health IT Directions Videos Deep Learning Assessment Electronic Health Records Twitter Permissions Workforce Refrigeration Error Wasting Time Threats Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Public Speaking Lithium-ion battery Microchip Internet Exlporer Software as a Service Remote Computing Fraud Meta Mobile Computing Username Entrepreneur Managing Costs Amazon Tablet eCommerce Search Black Friday SSID Best Practice Database Surveillance Alert Virtual Assistant Outsource IT Dark Data Media Undo Managed IT Buisness File Sharing IT Technicians Virtual Machine Environment IT solutions Cookies How To Cyber Monday Medical IT Legal Proxy Server Reviews Business Growth Tactics Development Notifications Hotspot Transportation Small Businesses Travel Mirgation Hypervisor Displays Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Techology Application Alt Codes Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Downtime Unified Threat Management

Blog Archive