Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management AI Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Facebook Information Artificial Intelligence Automation Miscellaneous Cloud Computing Gadgets Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Wi-Fi Virtualization Blockchain Bandwidth Business Technology Windows 10 Data Security Two-factor Authentication Apps Vendor Mobile Office BYOD Employer-Employee Relationship Chrome Budget Tip of the week Apple Managed Services Voice over Internet Protocol Mobile Device Management App Gmail Networking How To Computing BDR WiFi Information Technology HIPAA Office 365 Applications Hacker Access Control Avoiding Downtime Marketing Conferencing Operating System Risk Management Big Data Router Analytics Office Tips Virtual Private Network Augmented Reality Computers 2FA Health Storage Help Desk Password Bring Your Own Device Website Retail Healthcare Managed IT Services Free Resource Cooperation Cybercrime Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social End of Support Vulnerability Vendor Management Solutions Physical Security Display Customer Service Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Telephone Going Green Firewall Scam Data loss Safety Content Filtering Images 101 YouTube Robot Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Virtual Desktop Data storage IT Management LiFi VPN Meetings Employees Integration Customer Relationship Management Outlook Modem User Tip Money Processor Computer Repair Mobile Security Humor Hacking Holidays Presentation Supply Chain Data Storage Sports Smart Technology Wireless Technology Mouse Video Conferencing Managed Services Provider Machine Learning Saving Time Virtual Machines Professional Services Administration Word Managed IT Service Maintenance Downloads Antivirus iPhone Licensing Settings Data Privacy Printing Entertainment Wireless Vulnerabilities IT Maintenance Hosted Solution Alert Supply Chain Management Trends Dark Data Regulations Business Intelligence Term Google Calendar Managed IT Undo Typing File Sharing FinTech Customer Resource management Data Analysis How To IT Assessment Star Wars Microsoft Excel Shortcuts Ransmoware Google Drive Notifications Flexibility Gamification Knowledge Value Staff Social Networking Vendors Legislation Travel Organization Google Maps Digital Security Cameras Fileless Malware Smart Devices 5G Be Proactive Techology Workforce Google Docs Application Unified Communications Remote Working Content Experience Memory Wearable Technology Running Cable Data Breach Motherboard Threats Google Play Comparison Bitcoin Unified Threat Management Health IT Google Wallet Videos Directions Electronic Health Records Assessment Permissions Workplace Strategies Unified Threat Management IBM Meta Wasting Time Laptop Network Congestion Trend Micro Amazon Security Cameras Specifications Windows 8 Drones Microchip Software as a Service Internet Exlporer Fraud User Error Outsource IT Username Managing Costs Halloween eCommerce Environment SSID Black Friday Media Competition Point of Sale Surveillance Database Virtual Assistant Small Businesses Network Management Tech Support Virtual Machine IT Technicians Proxy Server Scary Stories Monitors Cookies Displays Medical IT Cyber Monday Hacks Reviews User Development Tactics Fun Transportation Hotspot Mirgation Outsourcing Deep Learning Websites Hypervisor Shopping Optimization Nanotechnology PowerPoint IP Address Education Electronic Medical Records Addiction Employer/Employee Relationships Language Workplace SharePoint Chatbots Hiring/Firing Navigation PCI DSS Management Gig Economy Writing Screen Reader Distributed Denial of Service Paperless Lenovo Mobile Computing Recovery Virtual Reality Internet Service Provider Service Level Agreement Search Teamwork Computing Infrastructure Co-managed IT Identity Technology Care Evernote Server Management Hard Drives Best Practice Private Cloud Regulations Compliance Identity Theft Bookmark Buisness Memes Smart Tech Business Communications Superfish Domains Legal IT solutions Twitter Net Neutrality Download SQL Server Alerts Scams History Hybrid Work Refrigeration Business Growth Error Financial Data Smartwatch Browsers Social Engineering IT Connectivity Break Fix Human Resources Public Speaking Lithium-ion battery Remote Computing Procurement Upload Cortana Azure Cables Cyber security Tech Multi-Factor Security Alt Codes Telework Social Network Entrepreneur Tablet CES Downtime Communitications IoT Dark Web Google Apps

Blog Archive