Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Google Workplace Tips Privacy Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device AI Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Managed Services Vendor Mobile Office Two-factor Authentication WiFi Apple Employer-Employee Relationship BYOD App Voice over Internet Protocol Tip of the week Mobile Device Management Gmail Chrome Networking Budget How To Password BDR Physical Security Hacker HIPAA Computing Access Control Avoiding Downtime Applications Information Technology Marketing Office 365 Conferencing Managed IT Services Storage Bring Your Own Device Big Data 2FA Virtual Private Network Operating System Computers Healthcare Router Health Risk Management Website Help Desk Retail Analytics Office Tips Augmented Reality The Internet of Things Telephone Patch Management Social Save Money Windows 11 Cooperation Remote Monitoring Vulnerability End of Support Vendor Management Going Green Excel Customer Service Remote Workers Display Printer Cybercrime Paperless Office Infrastructure Free Resource Project Management Document Management Windows 7 Monitoring Microsoft 365 Firewall Scam Solutions Data loss Managed IT Service Downloads Sports Mouse Licensing Holidays Robot Entertainment Administration Data Storage Video Conferencing Supply Chain Managed Services Provider IT Management Customer Relationship Management VPN Meetings Virtual Machines Professional Services Telephone System Cost Management Settings Printing Hacking Wireless Content Filtering Presentation Computer Repair YouTube iPhone Wireless Technology Cryptocurrency Modem Vulnerabilities User Tip Processor Mobile Security Machine Learning Images 101 Data Privacy Virtual Desktop LiFi Word Data storage Multi-Factor Authentication Mobility Smart Technology Maintenance Outlook Antivirus Saving Time Money Humor Safety Employees Integration Alert Deep Learning Workplace Strategies Managing Costs Download Alerts Managed IT File Sharing Meta eCommerce Dark Data SSID Virtual Assistant Browsers Connectivity Break Fix Amazon Surveillance How To Education Notifications Virtual Machine Upload Reviews Multi-Factor Security Travel Mobile Computing Application Outsource IT Medical IT Social Network Transportation Search IoT Techology Dark Web Google Maps Environment Development Media Best Practice Hypervisor Trends IBM Regulations Shopping Google Calendar Unified Threat Management Small Businesses Optimization Buisness PowerPoint Customer Resource management Employer/Employee Relationships Data Analysis Star Wars Unified Threat Management Microsoft Excel Legal Displays IT solutions PCI DSS Business Growth Navigation Gamification Staff Social Networking Gig Economy Legislation Outsourcing Network Congestion Teamwork Fileless Malware Cortana User Error Competition Internet Service Provider Regulations Compliance Alt Codes Workplace Evernote Content Wearable Technology Motherboard Comparison Point of Sale Hiring/Firing Memes Downtime Health IT Paperless SQL Server Directions Assessment Permissions Net Neutrality Hosted Solution Financial Data Tech Support Typing User Co-managed IT History Network Management Smartwatch Specifications Technology Care IT Monitors Business Communications Azure Microchip Knowledge Internet Exlporer Fraud Google Drive Procurement IP Address Telework Websites Scams Cyber security Tech Username CES Black Friday Hybrid Work Communitications 5G Electronic Medical Records Unified Communications Human Resources Experience Database SharePoint Google Docs Supply Chain Management FinTech Bitcoin Recovery Cables Running Cable Term IT Technicians Cookies Lenovo Cyber Monday Google Wallet Hard Drives IT Assessment Writing Proxy Server Virtual Reality Google Apps Value Tactics Hotspot Domains Flexibility Server Management Organization Private Cloud Windows 8 IT Maintenance Laptop Mirgation Nanotechnology Superfish Digital Security Cameras Identity Theft Drones Refrigeration Business Intelligence Smart Devices Twitter Shortcuts Memory Addiction Language Public Speaking Remote Working Chatbots Lithium-ion battery Error Ransmoware Data Breach Halloween Google Play Management Screen Reader Videos Distributed Denial of Service Vendors Electronic Health Records Social Engineering Entrepreneur Remote Computing Be Proactive Wasting Time Service Level Agreement Computing Infrastructure Identity Hacks Workforce Trend Micro Scary Stories Security Cameras Bookmark Fun Smart Tech Tablet Undo Threats Software as a Service

Blog Archive