Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Vendor Mobile Office Two-factor Authentication Data Security Apps Chrome Budget BYOD Apple Mobile Device Management App Tip of the week Gmail Managed Services Voice over Internet Protocol WiFi Networking Employer-Employee Relationship Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Conferencing Computing Information Technology How To BDR Office 365 Office Tips Analytics Augmented Reality Computers Router Storage Password Virtual Private Network Bring Your Own Device Website Health 2FA Help Desk Operating System Retail Healthcare Risk Management Big Data Managed IT Services Patch Management Microsoft 365 Save Money Remote Monitoring Customer Service End of Support Vulnerability Solutions Vendor Management Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Going Green Firewall Excel Document Management Cybercrime Remote Workers The Internet of Things Telephone Scam Data loss Social Free Resource Cooperation Project Management Windows 7 Mobility Robot Outlook Telephone System Multi-Factor Authentication Cost Management Money Hacking Humor Presentation IT Management Meetings Employees VPN Integration Sports Wireless Technology Mouse Modem User Tip Processor Computer Repair Mobile Security Administration Holidays Word Data Storage Supply Chain Smart Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Settings Printing Wireless Content Filtering Safety Managed IT Service Maintenance YouTube Downloads Antivirus Cryptocurrency iPhone Licensing Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Images 101 Customer Relationship Management Travel Social Networking Shortcuts Legislation Organization Techology Fileless Malware Smart Devices Google Maps Ransmoware Halloween Competition Digital Security Cameras Remote Working Content Memory Vendors Wearable Technology Unified Threat Management Motherboard Google Play Be Proactive Comparison Health IT Data Breach Unified Threat Management Directions Electronic Health Records Hacks Assessment Workforce Scary Stories Permissions Videos User Wasting Time Threats Fun Security Cameras Workplace Strategies Network Congestion Specifications Trend Micro Deep Learning User Error Microchip Software as a Service Internet Exlporer Meta Fraud Username Managing Costs Amazon Education IP Address Point of Sale SSID Black Friday eCommerce Surveillance Mobile Computing Database Virtual Assistant Outsource IT Recovery Network Management Virtual Machine Environment Tech Support IT Technicians Media Search Best Practice Cookies Medical IT Hard Drives Monitors Cyber Monday Reviews Proxy Server Development Tactics Transportation Small Businesses Buisness Domains Hotspot Legal Hypervisor Displays IT solutions Websites Mirgation Optimization Business Growth Nanotechnology PowerPoint Refrigeration Shopping SharePoint Addiction Employer/Employee Relationships Outsourcing Public Speaking Electronic Medical Records Language Chatbots Navigation Cortana PCI DSS Management Lithium-ion battery Lenovo Alt Codes Screen Reader Workplace Writing Distributed Denial of Service Entrepreneur Gig Economy Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Downtime Virtual Reality Computing Infrastructure Private Cloud Identity Evernote Paperless Regulations Compliance Server Management Hosted Solution Superfish Bookmark Memes Typing Identity Theft Smart Tech Co-managed IT Undo Net Neutrality Download SQL Server Technology Care Twitter Alerts Error Business Communications Knowledge Financial Data Google Drive History Browsers IT Connectivity Scams Social Engineering Break Fix Smartwatch Procurement Upload Azure Hybrid Work Remote Computing 5G Tech Human Resources Experience Application Multi-Factor Security Telework Google Docs Social Network Cyber security Unified Communications Communitications Bitcoin Tablet IoT Cables Running Cable Dark Web CES Supply Chain Management Google Wallet Trends IBM Alert File Sharing Regulations Term Google Apps Dark Data Google Calendar FinTech Managed IT Customer Resource management Data Analysis IT Assessment Windows 8 Star Wars IT Maintenance Laptop How To Microsoft Excel Flexibility Drones Gamification Value Business Intelligence Notifications Staff

Blog Archive