Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Automation Artificial Intelligence Gadgets Cloud Computing Holiday Training Covid-19 Server Remote Work Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Budget Gmail Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Tip of the week Chrome Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Retail Storage Password 2FA Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Firewall Windows 11 Telephone Scam Data loss Excel The Internet of Things Cooperation Remote Workers Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Free Resource Physical Security Project Management Windows 7 Customer Service Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Document Management Managed IT Service Maintenance Holidays Downloads Antivirus Sports Data Storage Mouse Licensing Supply Chain Video Conferencing Safety Administration Managed Services Provider Entertainment Professional Services Virtual Machines Robot Telephone System Cost Management iPhone Settings Wireless Printing Content Filtering Vulnerabilities IT Management Customer Relationship Management YouTube Meetings Data Privacy VPN Cryptocurrency Images 101 Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Outlook Employees Integration Machine Learning Money Saving Time Humor Word Virtual Assistant Outsource IT Hacks Server Management Scary Stories Private Cloud Identity Surveillance Identity Theft Smart Tech Refrigeration Fun Virtual Machine Environment Media Superfish Bookmark Deep Learning Download Reviews Public Speaking Twitter Alerts Medical IT Transportation Small Businesses Lithium-ion battery Error Development Education Connectivity Social Engineering Break Fix Hypervisor Displays Entrepreneur Browsers Upload Shopping Remote Computing Optimization PowerPoint Multi-Factor Security Employer/Employee Relationships Outsourcing Mobile Computing Social Network Tablet IoT PCI DSS Undo Search Dark Web Navigation Workplace Best Practice Trends Gig Economy Alert Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Managed IT Customer Resource management Buisness File Sharing Regulations Legal Data Analysis IT solutions Star Wars Regulations Compliance How To Microsoft Excel Evernote Paperless Co-managed IT Business Growth Gamification Notifications Staff Memes Travel Social Networking Net Neutrality Application Legislation SQL Server Technology Care Techology Fileless Malware Google Maps Financial Data Cortana History Business Communications Scams Alt Codes Content Smartwatch IBM Wearable Technology IT Downtime Unified Threat Management Motherboard Procurement Comparison Azure Hybrid Work Health IT Unified Threat Management Directions Hosted Solution Assessment Telework Permissions Cyber security Tech Human Resources Cables Typing CES Communitications Supply Chain Management Network Congestion Specifications Google Drive User Error Microchip Internet Exlporer FinTech Competition Knowledge Fraud Term Google Apps IT Maintenance Username IT Assessment Point of Sale Flexibility 5G Black Friday Value Business Intelligence Google Docs Unified Communications Database Organization Experience Shortcuts Ransmoware Bitcoin Network Management Digital Security Cameras Running Cable Tech Support IT Technicians Smart Devices User Cookies Remote Working Monitors Cyber Monday Memory Vendors Google Wallet Proxy Server Tactics Hotspot Data Breach Google Play Be Proactive Workforce Windows 8 Videos IP Address Laptop Websites Mirgation Electronic Health Records Nanotechnology Wasting Time Threats Drones SharePoint Addiction Electronic Medical Records Language Trend Micro Security Cameras Workplace Strategies Meta Management Halloween Chatbots Software as a Service Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Managing Costs Amazon Lenovo Service Level Agreement Domains Virtual Reality Computing Infrastructure eCommerce SSID

Blog Archive