Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device AI Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Holiday Facebook Automation Cloud Computing Covid-19 Training Gadgets Compliance Managed Service Provider Remote Work Outsourced IT Server IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Vendor Apps Managed Services Two-factor Authentication Data Security Mobile Office Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Voice over Internet Protocol Networking Password HIPAA Physical Security Applications Access Control Computing Conferencing Information Technology Hacker Managed IT Services How To Avoiding Downtime Office 365 BDR Marketing Augmented Reality Storage Router Bring Your Own Device Virtual Private Network Big Data Health 2FA Help Desk Operating System Retail Risk Management Healthcare Computers Website Office Tips Analytics Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Display The Internet of Things Printer Windows 11 Paperless Office Infrastructure Going Green Monitoring Social Excel Document Management Cybercrime Managed IT Service Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Robot Mobility Money Telephone System Multi-Factor Authentication Cost Management Word Humor IT Management Sports Mouse VPN Employees Meetings Integration Safety User Tip Administration Modem Computer Repair Mobile Security Processor Holidays Data Storage Smart Technology Supply Chain Video Conferencing Settings Printing Machine Learning Managed Services Provider Wireless Content Filtering Professional Services Saving Time Virtual Machines Customer Relationship Management YouTube Cryptocurrency Maintenance Antivirus Hacking Downloads iPhone Presentation Licensing Virtual Desktop Wireless Technology Vulnerabilities Data storage Entertainment LiFi Data Privacy Outlook Images 101 Legislation Shortcuts Organization Travel Social Networking Hard Drives Google Maps Smart Devices Domains Ransmoware Techology Fileless Malware Digital Security Cameras Hacks Content Remote Working Scary Stories Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Refrigeration Fun Deep Learning Assessment Electronic Health Records Public Speaking Permissions Workforce Unified Threat Management Directions Videos Lithium-ion battery Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Entrepreneur Education Trend Micro Internet Exlporer Software as a Service Fraud Meta User Error Microchip Mobile Computing Username Managing Costs Amazon Search Black Friday SSID Point of Sale eCommerce Undo Best Practice Database Surveillance Virtual Assistant Outsource IT Network Management Buisness Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Legal Proxy Server Reviews IT solutions Cookies Business Growth Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Application Cortana PowerPoint Shopping Nanotechnology Optimization Alt Codes Addiction IBM Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Downtime Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Hosted Solution Screen Reader Typing Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Knowledge Co-managed IT Google Drive Superfish Bookmark Identity Theft Smart Tech Memes Competition Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Error History 5G Business Communications Experience Social Engineering Break Fix Scams Google Docs Browsers Smartwatch Unified Communications Connectivity IT Bitcoin Upload Procurement Running Cable Remote Computing Azure Hybrid Work User Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Windows 8 Trends Supply Chain Management IP Address Laptop Alert Drones Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Halloween Notifications Staff Value Business Intelligence Recovery

Blog Archive