Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Artificial Intelligence Automation Facebook Miscellaneous Holiday Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Wi-Fi Virtualization Blockchain Vendor Mobile Office Data Security Two-factor Authentication Apps Chrome Tip of the week Budget Apple Mobile Device Management App Networking Gmail WiFi Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Access Control HIPAA Hacker Applications Avoiding Downtime Marketing How To Conferencing BDR Computing Information Technology Office 365 Analytics Office Tips Health Augmented Reality Router Computers Storage Password Website Bring Your Own Device Retail Help Desk Managed IT Services 2FA Operating System Big Data Healthcare Risk Management Virtual Private Network Windows 7 Customer Service Paperless Office Infrastructure Microsoft 365 Document Management Solutions Monitoring Scam Data loss Windows 11 Firewall Going Green Excel Telephone The Internet of Things Patch Management Save Money Cybercrime Remote Monitoring Remote Workers End of Support Vulnerability Social Vendor Management Cooperation Physical Security Display Free Resource Printer Project Management Images 101 Outlook Hacking Multi-Factor Authentication Mobility Presentation Money Humor User Tip Modem Wireless Technology Machine Learning Processor Mobile Security Sports Mouse Employees Integration Maintenance Antivirus Smart Technology Word Administration Saving Time Holidays Data Storage Supply Chain Managed IT Service Video Conferencing Settings Safety Wireless Downloads Printing Managed Services Provider Robot Virtual Machines Content Filtering Professional Services Licensing YouTube Entertainment Cryptocurrency IT Management iPhone VPN Meetings Telephone System Virtual Desktop LiFi Cost Management Vulnerabilities Customer Relationship Management Data storage Computer Repair Data Privacy Monitors Directions IT Assessment Assessment IT Maintenance Permissions Flexibility Halloween Value Business Intelligence Shortcuts Specifications Websites Organization Digital Security Cameras Microchip Smart Devices Internet Exlporer Ransmoware Fraud User SharePoint Hacks Electronic Medical Records Remote Working Scary Stories Username Memory Vendors Data Breach Fun Google Play Be Proactive Black Friday Videos Deep Learning Writing Electronic Health Records Database Workforce IP Address Lenovo IT Technicians Virtual Reality Wasting Time Threats Proxy Server Trend Micro Cookies Security Cameras Workplace Strategies Server Management Cyber Monday Private Cloud Education Recovery Identity Theft Software as a Service Tactics Meta Superfish Hotspot Mirgation Hard Drives Mobile Computing Twitter Managing Costs Amazon eCommerce Search Nanotechnology SSID Domains Error Best Practice Social Engineering Surveillance Addiction Virtual Assistant Outsource IT Language Chatbots Media Refrigeration Remote Computing Buisness Management Virtual Machine Environment IT solutions Screen Reader Medical IT Public Speaking Distributed Denial of Service Legal Reviews Tablet Business Growth Development Service Level Agreement Transportation Small Businesses Lithium-ion battery Computing Infrastructure Identity Entrepreneur Alert Hypervisor Displays Dark Data Bookmark Optimization Cortana Smart Tech PowerPoint Managed IT File Sharing Shopping Alt Codes How To Download Employer/Employee Relationships Outsourcing Alerts Navigation Undo Notifications PCI DSS Downtime Hosted Solution Browsers Connectivity Workplace Break Fix Travel Gig Economy Google Maps Typing Internet Service Provider Upload Teamwork Hiring/Firing Techology Evernote Paperless Multi-Factor Security Regulations Compliance Social Network Memes Knowledge IoT Co-managed IT Dark Web Google Drive Unified Threat Management Application Net Neutrality Trends SQL Server Technology Care Unified Threat Management Customer Resource management History 5G Regulations Business Communications Google Calendar Financial Data Smartwatch Unified Communications Network Congestion Data Analysis IT Experience Star Wars Scams IBM Microsoft Excel Google Docs Staff Bitcoin Procurement Running Cable Gamification Azure Hybrid Work User Error Cyber security Social Networking Tech Human Resources Legislation Google Wallet Telework CES Fileless Malware Communitications Cables Point of Sale Wearable Technology Windows 8 Supply Chain Management Laptop Content Health IT Motherboard Term Google Apps Competition Network Management Comparison Drones Tech Support FinTech

Blog Archive