Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Disaster Recovery VoIP Data Recovery Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Facebook Miscellaneous Artificial Intelligence Information Training Covid-19 Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Mobile Office Data Security Two-factor Authentication Apps Vendor Apple Mobile Device Management Tip of the week App Gmail Networking Employer-Employee Relationship Chrome BYOD Managed Services Voice over Internet Protocol Budget Avoiding Downtime Access Control Marketing Conferencing Computing WiFi Information Technology How To BDR Office 365 HIPAA Hacker Applications Bring Your Own Device Website Health Help Desk Retail Operating System Big Data Risk Management Managed IT Services 2FA Analytics Office Tips Augmented Reality Computers Router Storage Virtual Private Network Healthcare Password Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Firewall Document Management Going Green Microsoft 365 Solutions Telephone Cybercrime The Internet of Things Scam Data loss Cooperation Social Windows 11 Patch Management Save Money Remote Monitoring Vulnerability End of Support Excel Customer Service Vendor Management Remote Workers Physical Security Display iPhone Mouse Processor Computer Repair Mobile Security Vulnerabilities Administration Data Privacy Word Smart Technology Images 101 Machine Learning Saving Time Multi-Factor Authentication Mobility Settings Wireless Managed IT Service Printing Safety Content Filtering Maintenance Antivirus Downloads YouTube Employees Licensing Integration Cryptocurrency Entertainment Virtual Desktop Holidays Data storage LiFi Telephone System Data Storage Robot Customer Relationship Management Cost Management Supply Chain Outlook Video Conferencing Managed Services Provider Money Virtual Machines Professional Services Humor Hacking IT Management Presentation VPN Meetings Wireless Technology Sports User Tip Modem Scams IP Address Education Smartwatch Database IT Procurement Tech Support IT Technicians Azure Hybrid Work Network Management Proxy Server Telework Cookies Cyber security Monitors Cyber Monday Tech Human Resources Mobile Computing Cables Recovery CES Search Tactics Communitications Hotspot Supply Chain Management Websites Mirgation Best Practice Hard Drives Domains Buisness FinTech Nanotechnology Term Google Apps Electronic Medical Records Language IT Maintenance Legal IT solutions SharePoint Addiction IT Assessment Management Flexibility Chatbots Value Business Intelligence Business Growth Refrigeration Public Speaking Lenovo Organization Screen Reader Writing Distributed Denial of Service Shortcuts Virtual Reality Computing Infrastructure Ransmoware Lithium-ion battery Digital Security Cameras Cortana Service Level Agreement Smart Devices Server Management Entrepreneur Remote Working Private Cloud Identity Memory Vendors Alt Codes Downtime Superfish Bookmark Identity Theft Smart Tech Data Breach Google Play Be Proactive Twitter Alerts Workforce Hosted Solution Videos Download Electronic Health Records Error Wasting Time Threats Typing Undo Browsers Connectivity Trend Micro Social Engineering Break Fix Security Cameras Workplace Strategies Remote Computing Meta Google Drive Knowledge Upload Software as a Service Social Network Managing Costs Amazon Multi-Factor Security 5G Tablet IoT eCommerce Dark Web SSID Alert Virtual Assistant Outsource IT Google Docs Unified Communications Application Experience Trends Surveillance Running Cable Managed IT Customer Resource management File Sharing Regulations Virtual Machine Environment Dark Data Google Calendar Media Bitcoin Google Wallet IBM Data Analysis Reviews Star Wars How To Microsoft Excel Medical IT Notifications Staff Transportation Small Businesses Gamification Development Laptop Travel Social Networking Hypervisor Displays Legislation Windows 8 Drones Techology Fileless Malware Shopping Google Maps Optimization PowerPoint Wearable Technology Employer/Employee Relationships Outsourcing Content Halloween Health IT PCI DSS Unified Threat Management Motherboard Comparison Navigation Competition Unified Threat Management Directions Gig Economy Assessment Permissions Workplace Internet Service Provider Teamwork Hiring/Firing Scary Stories Regulations Compliance Network Congestion Specifications Evernote Paperless Hacks Co-managed IT User Error Microchip User Fun Internet Exlporer Memes Fraud Net Neutrality SQL Server Technology Care Deep Learning Username Financial Data Point of Sale History Black Friday Business Communications

Blog Archive