Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Communication Productivity Cybersecurity Saving Money Smartphone Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Tech Term Internet of Things Information Facebook Automation Artificial Intelligence Training Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Business Continuity Government Business Technology Virtualization Wi-Fi Bandwidth Windows 10 Blockchain Vendor Apps Two-factor Authentication Data Security Mobile Office Gmail App Tip of the week Employer-Employee Relationship Networking Chrome Budget Managed Services Voice over Internet Protocol BYOD Mobile Device Management Apple Access Control HIPAA WiFi Applications Computing Information Technology Office 365 How To Conferencing Hacker BDR Avoiding Downtime Marketing Health Router Operating System Big Data Retail Risk Management Help Desk Managed IT Services Office Tips Computers Analytics Augmented Reality 2FA Website Storage Password Bring Your Own Device Healthcare Virtual Private Network Free Resource Printer Project Management Going Green Windows 7 Paperless Office Infrastructure The Internet of Things Microsoft 365 Cybercrime Solutions Social Document Management Monitoring Scam Data loss Customer Service Windows 11 Telephone Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Remote Workers Vendor Management Cooperation Physical Security Firewall Display Computer Repair Data Privacy Images 101 Safety Mobility Settings Multi-Factor Authentication Printing Wireless Content Filtering User Tip Modem Machine Learning Processor YouTube Mobile Security Employees Cryptocurrency Integration Maintenance Antivirus Smart Technology Customer Relationship Management Virtual Desktop Data storage LiFi Saving Time Holidays Hacking Data Storage Presentation Outlook Managed IT Service Video Conferencing Money Supply Chain Downloads Wireless Technology Humor Managed Services Provider Robot Professional Services Virtual Machines Licensing Entertainment Sports Mouse IT Management Word iPhone VPN Meetings Administration Telephone System Vulnerabilities Cost Management Human Resources Supply Chain Management Legal Entrepreneur IT solutions Content Wearable Technology Term Motherboard Cables Network Management Comparison FinTech Tech Support Business Growth Health IT IT Assessment Monitors Directions Assessment Permissions Google Apps Flexibility Undo Value Cortana IT Maintenance Specifications Organization Websites Alt Codes Smart Devices Microchip Downtime Internet Exlporer Business Intelligence Fraud Digital Security Cameras Shortcuts Remote Working Electronic Medical Records Memory Hosted Solution Username SharePoint Google Play Ransmoware Black Friday Data Breach Typing Electronic Health Records Application Writing Database Vendors Lenovo Videos IT Technicians Be Proactive Virtual Reality Google Drive Wasting Time Knowledge Proxy Server Security Cameras Cookies Workforce Server Management Cyber Monday IBM Private Cloud Trend Micro Software as a Service Tactics Threats 5G Superfish Hotspot Identity Theft Mirgation Workplace Strategies Twitter Google Docs Managing Costs Unified Communications Experience Bitcoin SSID Running Cable Nanotechnology Meta Error eCommerce Surveillance Social Engineering Google Wallet Virtual Assistant Addiction Amazon Language Chatbots Competition Remote Computing Virtual Machine Management Windows 8 Medical IT Laptop Screen Reader Outsource IT Distributed Denial of Service Reviews Tablet Development Drones Transportation Service Level Agreement Environment Computing Infrastructure Media Identity Alert Hypervisor Dark Data Bookmark PowerPoint Halloween Smart Tech Small Businesses Managed IT Shopping File Sharing Optimization User How To Employer/Employee Relationships Download Displays Alerts PCI DSS Notifications Navigation Hacks Browsers Scary Stories Connectivity Outsourcing Break Fix Gig Economy IP Address Travel Google Maps Internet Service Provider Teamwork Upload Fun Techology Workplace Multi-Factor Security Regulations Compliance Deep Learning Social Network Evernote Recovery IoT Hiring/Firing Dark Web Unified Threat Management Memes Paperless Net Neutrality Hard Drives SQL Server Education Trends Unified Threat Management Regulations Co-managed IT Google Calendar Financial Data Domains History Customer Resource management Network Congestion Mobile Computing Data Analysis Star Wars Technology Care Microsoft Excel Smartwatch IT Business Communications Procurement Refrigeration Azure Gamification Search User Error Staff Social Networking Scams Legislation Telework Public Speaking Cyber security Best Practice Tech Communitications Fileless Malware Buisness Hybrid Work CES Lithium-ion battery Point of Sale

Blog Archive