Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP AI Business Management Smartphones communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Business Technology Virtualization Bandwidth Data Security Mobile Office Two-factor Authentication Vendor Apps App BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol Tip of the week Chrome Employer-Employee Relationship Budget Networking Apple BDR Avoiding Downtime Conferencing Marketing Computing Information Technology Access Control WiFi Office 365 HIPAA Applications How To Hacker Website Operating System Virtual Private Network Risk Management Health 2FA Big Data Analytics Office Tips Healthcare Augmented Reality Router Retail Storage Password Bring Your Own Device Managed IT Services Computers Help Desk Solutions Patch Management Save Money Remote Monitoring Going Green End of Support Vulnerability Vendor Management Telephone Physical Security Cybercrime Firewall Display Cooperation Printer Paperless Office Windows 11 Infrastructure The Internet of Things Excel Remote Workers Document Management Social Scam Free Resource Data loss Project Management Windows 7 Customer Service Monitoring Microsoft 365 Wireless Technology Saving Time Robot Employees Integration Managed IT Service Settings Wireless Downloads IT Management Word Printing Meetings Content Filtering VPN Licensing Holidays YouTube Entertainment Data Storage Cryptocurrency Computer Repair Video Conferencing Safety Managed Services Provider Virtual Desktop Telephone System Professional Services Virtual Machines Data storage Supply Chain LiFi Cost Management Machine Learning Outlook iPhone Money Humor Maintenance User Tip Vulnerabilities Modem Customer Relationship Management Antivirus Processor Mobile Security Sports Images 101 Mouse Hacking Presentation Data Privacy Multi-Factor Authentication Mobility Administration Smart Technology Remote Working IT Maintenance Best Practice Memory How To Addiction Language Chatbots Business Intelligence Data Breach Notifications Buisness Management Google Play Travel Shortcuts IT solutions Screen Reader IP Address Distributed Denial of Service Videos Legal Electronic Health Records Techology Google Maps Ransmoware Business Growth Wasting Time Service Level Agreement Computing Infrastructure Identity Vendors Trend Micro Security Cameras Software as a Service Unified Threat Management Be Proactive Bookmark Cortana Smart Tech Recovery Unified Threat Management Hard Drives Workforce Alt Codes Managing Costs Download Alerts SSID Domains Threats eCommerce Downtime Surveillance Workplace Strategies Hosted Solution Browsers Virtual Assistant Network Congestion Connectivity Break Fix User Error Refrigeration Meta Typing Virtual Machine Upload Social Network Medical IT Public Speaking Multi-Factor Security Reviews Amazon Google Drive Development Point of Sale Transportation Knowledge IoT Lithium-ion battery Dark Web Outsource IT Entrepreneur Hypervisor Trends Media Customer Resource management PowerPoint 5G Regulations Google Calendar Shopping Network Management Environment Optimization Tech Support Google Docs Unified Communications Data Analysis Employer/Employee Relationships Monitors Experience Star Wars Microsoft Excel Staff Undo PCI DSS Small Businesses Bitcoin Running Cable Gamification Navigation Social Networking Legislation Gig Economy Displays Google Wallet Websites Internet Service Provider Fileless Malware Teamwork Wearable Technology SharePoint Regulations Compliance Outsourcing Windows 8 Electronic Medical Records Laptop Content Evernote Health IT Motherboard Comparison Drones Memes Application Net Neutrality Workplace Directions SQL Server Writing Assessment Permissions Lenovo Financial Data Hiring/Firing History Virtual Reality Halloween Paperless IBM Specifications Smartwatch Server Management IT Private Cloud Procurement Identity Theft Co-managed IT Microchip Azure Internet Exlporer Fraud Superfish Telework Technology Care Hacks Cyber security Twitter Scary Stories Username Tech Business Communications Fun Black Friday CES Communitications Error Supply Chain Management Scams Deep Learning Social Engineering Database IT Technicians Competition FinTech Hybrid Work Remote Computing Term Human Resources Education Proxy Server Cookies Cyber Monday IT Assessment Flexibility Tablet Cables Value Tactics Hotspot Mirgation Organization Mobile Computing Alert File Sharing Google Apps Dark Data Search Nanotechnology Digital Security Cameras Managed IT User Smart Devices

Blog Archive