Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade VoIP Smartphones AI Business Management Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption IT Support Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication Managed Services Voice over Internet Protocol Apple Networking Employer-Employee Relationship App BYOD Mobile Device Management Gmail Chrome Tip of the week Budget Conferencing How To BDR Hacker Computing Avoiding Downtime Information Technology HIPAA Marketing Applications Access Control Office 365 WiFi 2FA Healthcare Managed IT Services Computers Operating System Risk Management Website Virtual Private Network Router Health Analytics Office Tips Augmented Reality Help Desk Storage Retail Password Bring Your Own Device Big Data Scam Windows 11 Social Remote Workers Data loss Telephone Excel Going Green Customer Service Patch Management Cooperation Free Resource Project Management Save Money Remote Monitoring Windows 7 End of Support Cybercrime Vulnerability Vendor Management Microsoft 365 Physical Security Solutions Display Printer Paperless Office Infrastructure Firewall Document Management Monitoring The Internet of Things Administration Managed IT Service Downloads Supply Chain iPhone Customer Relationship Management Licensing Entertainment Vulnerabilities Robot Settings Wireless Hacking Printing Images 101 Content Filtering Presentation Telephone System Multi-Factor Authentication Mobility YouTube Cost Management IT Management Wireless Technology Meetings Cryptocurrency VPN Data Privacy Employees Computer Repair Virtual Desktop Word LiFi Integration Data storage User Tip Modem Processor Mobile Security Outlook Holidays Money Humor Machine Learning Safety Data Storage Smart Technology Video Conferencing Managed Services Provider Sports Saving Time Virtual Machines Maintenance Professional Services Mouse Antivirus Identity Evernote Application Social Engineering Mobile Computing Regulations Compliance Bookmark Search Smart Tech Memes Remote Computing Small Businesses IBM Displays Best Practice Download Net Neutrality Alerts SQL Server History Tablet Buisness Financial Data IT solutions Browsers Smartwatch Connectivity IT Break Fix Alert Legal Outsourcing File Sharing Dark Data Business Growth Upload Procurement Managed IT Azure Cyber security Multi-Factor Security Tech How To Workplace Social Network Telework CES Cortana IoT Communitications Dark Web Competition Notifications Hiring/Firing Travel Alt Codes Paperless Trends Supply Chain Management Customer Resource management FinTech Techology Regulations Google Maps Google Calendar Term Co-managed IT Downtime Hosted Solution Data Analysis Star Wars IT Assessment Microsoft Excel Technology Care Staff Value Unified Threat Management User Typing Business Communications Gamification Flexibility Organization Unified Threat Management Social Networking Legislation Scams Fileless Malware Digital Security Cameras Knowledge Smart Devices Google Drive Hybrid Work Wearable Technology Memory IP Address Network Congestion Human Resources Content Remote Working Health IT User Error 5G Motherboard Data Breach Comparison Google Play Cables Unified Communications Directions Videos Experience Assessment Electronic Health Records Permissions Google Docs Wasting Time Point of Sale Recovery Bitcoin Google Apps Running Cable Trend Micro Specifications Security Cameras Hard Drives Google Wallet IT Maintenance Business Intelligence Microchip Internet Exlporer Software as a Service Network Management Fraud Domains Tech Support Managing Costs Monitors Windows 8 Shortcuts Laptop Username eCommerce Black Friday SSID Refrigeration Drones Ransmoware Vendors Database Surveillance Virtual Assistant Public Speaking Websites IT Technicians Virtual Machine Lithium-ion battery Be Proactive Halloween Proxy Server Reviews SharePoint Cookies Cyber Monday Medical IT Electronic Medical Records Workforce Entrepreneur Threats Tactics Development Hotspot Transportation Mirgation Hypervisor Writing Hacks Workplace Strategies Scary Stories Lenovo Shopping Fun Nanotechnology Optimization PowerPoint Undo Virtual Reality Meta Amazon Deep Learning Addiction Server Management Language Employer/Employee Relationships Private Cloud Chatbots Identity Theft Navigation Management PCI DSS Superfish Education Gig Economy Screen Reader Distributed Denial of Service Twitter Outsource IT Environment Media Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Error

Blog Archive