Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Data Recovery Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Cloud Computing Gadgets Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Virtualization Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security Apple Managed Services BYOD Voice over Internet Protocol App Employer-Employee Relationship Tip of the week Mobile Device Management Chrome Networking Gmail Budget WiFi HIPAA Applications Access Control Computing Hacker Information Technology Avoiding Downtime Conferencing Marketing Office 365 How To BDR Big Data Router Healthcare Virtual Private Network Operating System Health Computers Help Desk Risk Management Website Retail Analytics Office Tips Augmented Reality Managed IT Services Storage 2FA Password Bring Your Own Device Remote Monitoring End of Support Vulnerability Vendor Management Social Remote Workers Physical Security Going Green Display Printer Customer Service Free Resource Paperless Office Infrastructure Project Management Cybercrime Windows 7 Monitoring Microsoft 365 Document Management Solutions Telephone Scam Data loss Firewall Cooperation Windows 11 The Internet of Things Patch Management Save Money Excel Virtual Machines Professional Services Administration IT Management VPN Meetings iPhone Customer Relationship Management User Tip Modem Computer Repair Mobile Security Settings Processor Vulnerabilities Wireless Printing Data Privacy Content Filtering Hacking YouTube Images 101 Presentation Smart Technology Multi-Factor Authentication Cryptocurrency Mobility Machine Learning Wireless Technology Saving Time Virtual Desktop Managed IT Service Data storage LiFi Maintenance Employees Integration Word Antivirus Downloads Outlook Licensing Money Humor Entertainment Holidays Data Storage Safety Sports Supply Chain Robot Mouse Telephone System Video Conferencing Cost Management Managed Services Provider Content Gig Economy Wearable Technology Mobile Computing Workplace Comparison Teamwork Hiring/Firing Search Health IT Unified Threat Management Motherboard Internet Service Provider Assessment Regulations Compliance Permissions Application Best Practice Evernote Paperless Unified Threat Management Directions Buisness Memes Co-managed IT Net Neutrality Network Congestion Specifications IBM Legal SQL Server Technology Care IT solutions Internet Exlporer Financial Data Fraud History Business Growth Business Communications User Error Microchip Scams Username Smartwatch IT Procurement Black Friday Azure Hybrid Work Cortana Point of Sale Database Telework Cyber security Alt Codes Tech Human Resources Cables Downtime Network Management CES Tech Support IT Technicians Communitications Competition Supply Chain Management Monitors Cyber Monday Hosted Solution Proxy Server Cookies Tactics FinTech Hotspot Typing Term Google Apps IT Maintenance Websites Mirgation IT Assessment Flexibility Google Drive Value Business Intelligence User Knowledge Nanotechnology Addiction Organization Electronic Medical Records Language Shortcuts SharePoint Ransmoware 5G Management Digital Security Cameras Chatbots Smart Devices Remote Working Writing Distributed Denial of Service IP Address Google Docs Memory Vendors Unified Communications Experience Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Data Breach Bitcoin Google Play Be Proactive Running Cable Workforce Server Management Videos Private Cloud Identity Electronic Health Records Google Wallet Wasting Time Threats Recovery Superfish Bookmark Identity Theft Smart Tech Download Twitter Alerts Trend Micro Hard Drives Windows 8 Security Cameras Workplace Strategies Laptop Domains Drones Meta Error Software as a Service Connectivity Social Engineering Break Fix Managing Costs Amazon Browsers Halloween Upload Remote Computing eCommerce Refrigeration SSID Multi-Factor Security Public Speaking Virtual Assistant Outsource IT Social Network Surveillance Tablet IoT Dark Web Lithium-ion battery Virtual Machine Environment Media Entrepreneur Scary Stories Trends Reviews Alert Hacks Medical IT Dark Data Google Calendar Transportation Small Businesses Fun Managed IT Customer Resource management File Sharing Regulations Development Star Wars How To Microsoft Excel Hypervisor Displays Deep Learning Data Analysis Gamification Shopping Notifications Staff Optimization Undo PowerPoint Legislation Employer/Employee Relationships Outsourcing Education Travel Social Networking Google Maps PCI DSS Navigation Techology Fileless Malware

Blog Archive