Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Windows 7 Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Microsoft 365 Cybercrime Physical Security Solutions Display Printer Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Settings Images 101 Wireless Printing Mobility Content Filtering Multi-Factor Authentication Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Employees Processor Integration Virtual Desktop LiFi Data storage Smart Technology Word Holidays Outlook Machine Learning Data Storage Money Saving Time Supply Chain Humor Video Conferencing Managed IT Service Managed Services Provider Professional Services Maintenance Virtual Machines Safety Antivirus Sports Downloads Mouse Licensing Entertainment Administration iPhone Vulnerabilities Data Privacy Telephone System Robot Cost Management Customer Relationship Management IT Assessment IT Maintenance Alt Codes Content Wearable Technology Comparison Flexibility Value Business Intelligence Competition Health IT Downtime Unified Threat Management Motherboard Shortcuts Hosted Solution Assessment Permissions Organization Unified Threat Management Directions Smart Devices Ransmoware Typing Digital Security Cameras Network Congestion Specifications Remote Working Memory Vendors Google Play Be Proactive User Internet Exlporer Knowledge Fraud Data Breach Google Drive User Error Microchip Electronic Health Records Workforce Username Videos 5G Black Friday Wasting Time Threats Point of Sale Security Cameras Workplace Strategies Unified Communications Database Experience Trend Micro IP Address Google Docs Software as a Service Meta Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Managing Costs Amazon Google Wallet Proxy Server Cookies SSID Recovery Tactics Hotspot eCommerce Surveillance Virtual Assistant Outsource IT Hard Drives Windows 8 Laptop Websites Mirgation Virtual Machine Environment Domains Drones Media Nanotechnology Medical IT Addiction Electronic Medical Records Language Reviews SharePoint Development Transportation Small Businesses Refrigeration Management Halloween Chatbots Writing Distributed Denial of Service Hypervisor Displays Public Speaking Lenovo Screen Reader PowerPoint Service Level Agreement Virtual Reality Computing Infrastructure Shopping Optimization Lithium-ion battery Employer/Employee Relationships Outsourcing Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Fun PCI DSS Superfish Bookmark Navigation Identity Theft Smart Tech Workplace Deep Learning Download Twitter Alerts Gig Economy Internet Service Provider Teamwork Hiring/Firing Undo Error Social Engineering Break Fix Regulations Compliance Browsers Evernote Paperless Education Connectivity Co-managed IT Upload Remote Computing Memes Net Neutrality SQL Server Technology Care Mobile Computing Social Network Multi-Factor Security Search Dark Web Financial Data History Business Communications Tablet IoT Scams Application Best Practice Trends Alert Smartwatch IT Procurement Azure Hybrid Work Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Telework Cyber security IBM Legal Data Analysis Tech Human Resources IT solutions Star Wars Cables Business Growth Gamification Notifications Staff CES Communitications Supply Chain Management Travel Social Networking Legislation Google Maps Cortana FinTech Techology Fileless Malware Term Google Apps

Blog Archive