Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Saving Money Quick Tips Passwords Cybersecurity Communication Managed Service Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Virtualization Business Technology Blockchain Bandwidth Two-factor Authentication Apps Vendor Data Security Mobile Office Managed Services Voice over Internet Protocol Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking App Mobile Device Management BYOD Conferencing Computing Information Technology Access Control Office 365 HIPAA Applications Hacker How To Avoiding Downtime BDR Marketing Virtual Private Network Healthcare Risk Management Health Big Data Analytics Office Tips Augmented Reality Retail Storage Password Router Bring Your Own Device Computers Managed IT Services 2FA Website Help Desk Operating System Firewall Physical Security Remote Workers Telephone Display Printer Paperless Office The Internet of Things Infrastructure Cooperation Free Resource Project Management Social Windows 7 Document Management Microsoft 365 Solutions Customer Service Scam Data loss Windows 11 Monitoring Going Green Patch Management Save Money Remote Monitoring Vulnerability Excel End of Support Vendor Management Cybercrime VPN YouTube Meetings Managed IT Service Cryptocurrency Downloads Safety Computer Repair iPhone Licensing Virtual Desktop Entertainment Data storage Vulnerabilities LiFi Data Privacy Images 101 Outlook Machine Learning Telephone System Multi-Factor Authentication Money Mobility Cost Management Humor Customer Relationship Management Maintenance Antivirus Sports Employees Mouse Hacking Integration Presentation User Tip Modem Administration Mobile Security Processor Wireless Technology Holidays Data Storage Robot Smart Technology Supply Chain Settings Video Conferencing Word Managed Services Provider Printing Wireless Content Filtering Saving Time Virtual Machines Professional Services IT Management Regulations Compliance Identity Evernote Paperless Public Speaking Network Congestion Lithium-ion battery Knowledge Bookmark Smart Tech Memes Google Drive User Error Co-managed IT Alerts SQL Server Technology Care Entrepreneur Download Net Neutrality Financial Data History Business Communications Point of Sale 5G Experience Browsers Smartwatch Connectivity IT Google Docs Break Fix Scams Unified Communications Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support Undo Upload Procurement Social Network Telework Cyber security Google Wallet Multi-Factor Security Tech Human Resources Monitors CES IoT Communitications Dark Web Cables Windows 8 Laptop Websites Trends Supply Chain Management Customer Resource management FinTech Regulations Drones Google Calendar Term Google Apps Electronic Medical Records Application Data Analysis Star Wars IT Assessment SharePoint Microsoft Excel IT Maintenance Staff Value Business Intelligence Halloween Gamification Flexibility Writing Organization Social Networking Lenovo Legislation Shortcuts IBM Virtual Reality Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Hacks Server Management Scary Stories Private Cloud Content Remote Working Fun Health IT Motherboard Data Breach Superfish Comparison Google Play Be Proactive Identity Theft Deep Learning Twitter Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Error Competition Social Engineering Trend Micro Specifications Security Cameras Workplace Strategies Education Remote Computing Microchip Internet Exlporer Software as a Service Fraud Meta Username Managing Costs Amazon Mobile Computing Search User eCommerce Black Friday SSID Tablet Virtual Assistant Outsource IT Best Practice Alert Database Surveillance IT Technicians Virtual Machine Environment Managed IT Media Buisness File Sharing Dark Data IP Address How To Proxy Server Reviews Cookies Legal Cyber Monday Medical IT IT solutions Hotspot Transportation Small Businesses Business Growth Notifications Tactics Development Mirgation Hypervisor Displays Travel Cortana Recovery Shopping Nanotechnology Optimization Techology PowerPoint Google Maps Language Employer/Employee Relationships Outsourcing Alt Codes Hard Drives Addiction Management PCI DSS Chatbots Navigation Downtime Unified Threat Management Domains Gig Economy Screen Reader Unified Threat Management Distributed Denial of Service Workplace Hosted Solution Computing Infrastructure Teamwork Hiring/Firing Typing Refrigeration Service Level Agreement Internet Service Provider

Blog Archive