Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Facebook Artificial Intelligence Miscellaneous Holiday Automation Covid-19 Gadgets Cloud Computing Training Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Data Management Business Continuity Government Virtualization Bandwidth Wi-Fi Blockchain Business Technology Windows 10 Two-factor Authentication Vendor Apps Data Security Mobile Office Gmail Tip of the week WiFi Chrome Budget Networking Employer-Employee Relationship Apple App BYOD Managed Services Voice over Internet Protocol Mobile Device Management HIPAA Office 365 Applications How To BDR Conferencing Hacker Avoiding Downtime Marketing Computing Access Control Information Technology 2FA Router Analytics Office Tips Retail Augmented Reality Big Data Storage Help Desk Password Managed IT Services Bring Your Own Device Computers Physical Security Website Operating System Virtual Private Network Healthcare Health Risk Management Free Resource Project Management Windows 7 Document Management Excel The Internet of Things Microsoft 365 Scam Solutions Social Data loss Monitoring Customer Service Patch Management Save Money Remote Monitoring Telephone Vulnerability End of Support Vendor Management Going Green Cooperation Cybercrime Display Remote Workers Printer Paperless Office Infrastructure Windows 11 Firewall Virtual Desktop LiFi Supply Chain Machine Learning Data storage Images 101 Safety Multi-Factor Authentication Mobility Outlook User Tip Modem Processor Money Mobile Security Maintenance Humor Antivirus Employees Integration Smart Technology Sports Mouse Customer Relationship Management Saving Time Data Privacy Administration Holidays Robot Hacking Managed IT Service Presentation Data Storage Downloads Video Conferencing Wireless Technology Licensing IT Management Managed Services Provider Virtual Machines VPN Professional Services Meetings Settings Wireless Entertainment Printing Content Filtering Computer Repair YouTube Word Telephone System Cryptocurrency iPhone Cost Management Vulnerabilities Entrepreneur Electronic Medical Records Directions Supply Chain Management Assessment SharePoint Google Wallet Displays Permissions Term FinTech IT Assessment Lenovo Windows 8 Outsourcing Specifications Laptop Writing Virtual Reality Microchip Flexibility Internet Exlporer Drones Value Undo Fraud Server Management Workplace Private Cloud Organization Username Digital Security Cameras Smart Devices Superfish Hiring/Firing Black Friday Identity Theft Halloween Paperless Twitter Remote Working Database Memory Data Breach IT Technicians Google Play Co-managed IT Error Videos Proxy Server Electronic Health Records Cookies Hacks Technology Care Application Cyber Monday Scary Stories Social Engineering Business Communications Remote Computing Fun Tactics Wasting Time Hotspot Trend Micro IBM Mirgation Deep Learning Security Cameras Scams Software as a Service Nanotechnology Hybrid Work Tablet Education Human Resources Alert Addiction Managing Costs Language Management eCommerce Chatbots Managed IT SSID Cables File Sharing Dark Data Surveillance Screen Reader Mobile Computing Virtual Assistant Distributed Denial of Service How To Computing Infrastructure Google Apps Notifications Search Service Level Agreement Virtual Machine Competition Identity Best Practice Medical IT IT Maintenance Travel Reviews Bookmark Development Smart Tech Techology Transportation Business Intelligence Google Maps Buisness Alerts IT solutions Shortcuts Download Legal Hypervisor Optimization Business Growth PowerPoint Ransmoware User Unified Threat Management Shopping Browsers Connectivity Unified Threat Management Employer/Employee Relationships Vendors Break Fix Navigation Be Proactive Cortana PCI DSS Upload Social Network IP Address Alt Codes Workforce Multi-Factor Security Network Congestion Gig Economy Internet Service Provider IoT User Error Teamwork Threats Dark Web Downtime Hosted Solution Evernote Workplace Strategies Regulations Compliance Trends Customer Resource management Memes Regulations Typing Meta Recovery Google Calendar Point of Sale Data Analysis Net Neutrality Star Wars SQL Server Amazon Hard Drives Microsoft Excel Domains Staff Network Management Tech Support Knowledge Financial Data Gamification Google Drive History IT Social Networking Outsource IT Legislation Monitors Smartwatch Media 5G Fileless Malware Procurement Azure Environment Refrigeration Public Speaking Wearable Technology Unified Communications Tech Websites Experience Telework Content Google Docs Cyber security CES Health IT Communitications Lithium-ion battery Motherboard Bitcoin Small Businesses Comparison Running Cable

Blog Archive