Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Email Google Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Apps Data Security Vendor Mobile Office Two-factor Authentication Employer-Employee Relationship App BYOD Mobile Device Management Managed Services Voice over Internet Protocol Tip of the week Gmail Chrome Budget WiFi Apple Networking How To BDR HIPAA Applications Hacker Computing Avoiding Downtime Information Technology Marketing Access Control Conferencing Office 365 Router Computers Operating System 2FA Virtual Private Network Risk Management Help Desk Website Health Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Solutions Going Green Patch Management Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 Physical Security Monitoring Display Printer Excel Paperless Office Infrastructure Remote Workers Firewall Telephone Document Management Cooperation Free Resource The Internet of Things Project Management Windows 7 Scam Data loss Social Microsoft 365 Customer Relationship Management Employees Robot Integration Settings Modem Hacking Printing User Tip Wireless Processor Content Filtering Mobile Security Presentation IT Management Holidays VPN YouTube Meetings Wireless Technology Cryptocurrency Data Storage Smart Technology Supply Chain Computer Repair Video Conferencing Managed Services Provider Virtual Machines Professional Services Virtual Desktop Saving Time Word LiFi Data storage Managed IT Service Outlook Downloads Machine Learning iPhone Money Licensing Humor Safety Entertainment Vulnerabilities Maintenance Data Privacy Antivirus Sports Images 101 Mouse Multi-Factor Authentication Mobility Telephone System Cost Management Administration Best Practice Alert Content Remote Working Wearable Technology Memory Vendors IBM Motherboard Data Breach Comparison Google Play Be Proactive Managed IT Buisness File Sharing Health IT Dark Data Directions Videos How To Assessment Electronic Health Records Permissions Workforce Legal IT solutions Business Growth Notifications Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Travel Microchip Cortana Internet Exlporer Software as a Service Fraud Meta Competition Techology Google Maps Alt Codes Username Managing Costs Amazon eCommerce Black Friday SSID Downtime Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Media User Typing IT Technicians Virtual Machine Environment Network Congestion Cookies Cyber Monday Medical IT Proxy Server Reviews Knowledge Tactics Development Hotspot Transportation Small Businesses Google Drive User Error IP Address Mirgation Hypervisor Displays 5G Nanotechnology Optimization PowerPoint Point of Sale Shopping Unified Communications Experience Addiction Language Employer/Employee Relationships Outsourcing Google Docs Navigation Recovery Bitcoin Network Management Running Cable Tech Support Management PCI DSS Chatbots Monitors Screen Reader Distributed Denial of Service Workplace Hard Drives Google Wallet Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Domains Evernote Paperless Windows 8 Laptop Websites Regulations Compliance Identity Smart Tech Memes Co-managed IT Refrigeration Drones Bookmark Electronic Medical Records Download Net Neutrality Alerts SQL Server Technology Care Public Speaking SharePoint Lithium-ion battery Business Communications Halloween Financial Data History Browsers Smartwatch Writing Connectivity IT Break Fix Scams Lenovo Entrepreneur Virtual Reality Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Scary Stories Private Cloud Social Network Telework CES Fun IoT Communitications Dark Web Cables Undo Superfish Identity Theft Deep Learning Twitter Trends Supply Chain Management Regulations Google Calendar Term Google Apps Error Customer Resource management FinTech Data Analysis Social Engineering Star Wars IT Assessment Microsoft Excel IT Maintenance Education Remote Computing Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Application Mobile Computing Organization Fileless Malware Digital Security Cameras Search Smart Devices Ransmoware Tablet

Blog Archive