Alltech IT Solutions Blog

A Short History of Cybersecurity

A Short History of Cybersecurity

The way a business handles its network security typically defines what kind of problems come from their use of information systems. As a result, cybersecurity has become a major part of any forward-thinking organization’s IT strategy and has become a multi-hundred-billion dollar a year industry. Of course, it wasn’t always such a huge problem. The history of cybersecurity doesn’t go back very far, but since it has such a major impact, we thought it would be interesting to go back a couple decades and look at the brief history of the practice. 

Where Are We?

We’d like to start by describing the cybersecurity industry as it stands today. Cybercrime is taking in at least $1.5 trillion in profits each year and growing. Some have predicted that damages from cybercrime will reach $6 trillion by 2021. To remedy this theft, the cybercrime market has grown to be a $200 billion a year industry. Security breaches are up by 67 percent over the past five years. 

With 76 percent of all businesses targeted, the most popular method of attack is now phishing. This method can deploy malware of all types (including ransomware), reveal sensitive information, or steal login account credentials for direct access. The worst part is that most people that have been successfully phished have no idea until something dramatic happens. In fact, it’s with phishing attacks leading the way, billions of records are exposed, stolen, or corrupted each year. 

With so much at stake, you can see that cybercrime has become a huge issue for businesses of all sizes. 

It wasn’t always so.

At the Beginning

It may be hard to believe, but the history of a trend that is syphoning trillions of dollars off of the economies of the world started, innocuously, as a research project. A man named Bob Thomas made the astute observation that it may be possible for a computer program to move across a computer network and leave a trail. He then wrote a code that he named “Creeper”. His program was designed to travel between Tenex terminals on the ARPANET. The message read “I’M THE CREEPER: CATCH ME IF YOU CAN”.

The idea came across the attention of email inventor Ray Tomlinson. Tomlinson changed the program to be self-replicating. In essence, this was the first computer worm. Immediately after, he wrote what was called “Reaper” which chased down the Creeper code and deleted it. It was effectively the first antivirus software. 

Shift to Criminality

One could be surprised to see just how benign the beginnings of cybercrime were. In the 1980s Soviet hackers were the first to consider the applications designed by academics could be used to infiltrate other networks. This notion quickly spread, and in 1986, German hacker Marcus Hess hacked an internet gateway hosted at the University of California at Berkeley. He then used that connection to piggyback onto the ARPANET. He hacked into 400 computers in all, including mainframes hosted at the Pentagon. His plan was to sell the secrets found on these computers to the Soviet KGB. He was caught in a cooperative effort between the FBI and the West German government. His conviction, the first of its kind, resulted in a 20-month suspended sentence. 

At the same time, computer viruses started to become serious threats; and, with the exponential increase in connectivity that was happening at the time, the computer virus had become a serious threat for the very first time. 

Development of Cybersecurity Software

In 1988, a software engineer named Robert Morris decided that he wanted to see just how large the Internet was. He wrote a program designed to spread across various networks, get into Unix terminals, and replicate. The software replicated so quickly that it slowed the early Internet, causing major damage. Known today as “the Morris Worm” it caused a huge stir and is the impetus behind the formation of the Computer Emergency Response Team (what is known today at US-CERT). Morris, who is now a longtime professor at MIT, was the first person convicted under the Computer Fraud and Abuse Act (CFAA), a statute that aims to protect against unauthorized access. 

Once the Morris Worm situation was handled, viruses started being developed at a dizzying rate. The antivirus industry, a product since 1987, began to grow fast. By the time the Internet started entering homes in the mid-1990s, there were dozens of different solutions for antivirus. These antivirus programs scanned the binaries on a computer and tested them against a database of virus code signatures. There were major problems that you can actually find with these programs today. In an effort to be comprehensive, they find a lot of false positives. They also have a tendency to use a lot of a system’s resources to scan for viruses, leaving a computer inoperable, or frustratingly slow.

The Malware Boom

In the mid-nineties there were only a few thousand known viruses on the Internet. As time went by, however, this number rose substantially. By 2007 there were around five million different malware strains that included: worms, viruses, trojan horses, and more. By 2014, 500,000 different strains of malware were being created every day. 

Security had to catch up. The antivirus solutions couldn’t keep up with the constant stream of malware. They simply couldn’t scan fast enough. Innovations in cybersecurity came quickly. First came endpoint protection platforms (EPP) that didn’t just scan for individual file types, they actively scanned for malware family similarities. Since most malware originated from a single idea, they share a lot of traits with similar malware, making it easier for EPPs to identify malicious code.


With advanced malware becoming more of a problem, defeating endpoint protection regularly with the addition of tools such as VBScript, PowerShell, Office Macros, and DDE attack, it was time for further innovation. This timeline was exacerbated by the deployment of WannaCry. WannaCry was, to that point, the most devastating piece of malware ever deployed. WannaCry was such a huge surprise to security professionals because the vulnerability it had used had already been patched by Microsoft. 

WannaCry encrypted the data on a computer and forced the owner of the computer to pay the hacker in Bitcoin to get access to those files. This signaled a hard turn in the cybersecurity industry. If people with a mind to do harm were going to have access to software like this, it was important that cybersecurity innovated right alongside it. Since the only way to know if you were being infiltrated was to have transparency in your network, administrators started to use endpoint threat detection and response (EDR) services to proactively monitor their important computing resources and their networks. Today, EDR solutions are the cutting-edge solutions to keep malware out of your network.

If you would like to know more about cybersecurity, or if you are just interested in keeping your business’ data and network safe, call Alltech IT Solutions today at 954-628-3770.

What Will Cybersecurity (Probably) Look Like in th...
Tip of the Week: Search Google Better


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 13 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Privacy Current Events Regulation Emoji Managed IT Services Computer Care Unified Communications Access Control Law Enforcement Education Computers Authentication Cloud Vulnerabilities User Tips Hosted Solution Recycling Value Search Hiring/Firing HaaS Inventory Password Tech Terms WannaCry Entertainment Threat Computer News Workplace Tips Yahoo Worker Microsoft Trends Information Cabling Marketing Passwords Emergency Windows 7 Cost Management Net Neutrality iPhone Mobile Security Holiday Scheduling Sales WhatsApp Botnet Chrome OS Proactive IT Tech Support Google Drive Comparison Live Streaming disposal Safety A.I. Samsung Android Excel Gaming Console Voice over Internet Protocol Content Filtering Health Hybrid Cloud Antivirus Business Intelligence Scam Hackers Upgrade Document Management Google File Management Travel Smartphone Server Wireless Internet Dark Data Retail App File Sharing IT Services Customer Service Conferencing Authorization Business Lead Generation Data Security Unified Threat Management Operating System Electronic Health Records Telephone System Maintenance Processor Human Resources Wireless Charging Users Autocorrect Vendor Management Two-factor Authentication instant Messaging Employer-Employee Relationship Solid State Drive Cybersecurity Spyware Biometrics Thank You Printing Batteries Scams Scalability Big Data Telephony Windows XP Wearables Social Media PowerPoint Microsoft Office 365 IT Support Outlook Network Tip of the week Mobile Device Management Money Personal Information Productivity Network Security Outsourced IT Google Maps Remote Control Video Threats Saving Money Bring Your Own Device Spam Reporting Streaming Media Plug-In Managed Services Provider Access Data loss Budget Hacker Router Licensing Dark Web Chrome Amazon Webcam Help Desk Spotify Hard Disk Drive Recovery Remote Computing VPN Bandwidth Security Congratulations Business Management Wi-Fi Innovation Hacking Paper Windows 10 National Security Productivity Error Vendor Risk Management SaaS Ransomware Internet Workers Copy Microsoft Office Network Attached Storage Telecommuting Email Management Company Culture Server Management Mobile Device Sports VoIp Data Recovery Smartphones Information Technology Tip of the Week Analysis Spam Blocking Data Backup Data Management Windows 10 GDPR Automobile Twitter Virtual Assistant Telecommute Data Breach Efficiency Going Green Alerts Mobility Taskbar Security Cameras Specifications Managed Service Provider WiFi Applications Hardware Files Freedom of Information Phishing Virtualization Virus Time Management Voice over IP HIPAA RAM Employer Employee Relationship Cybercrime Environment Printer Server User Security Physical Security Cryptocurrency Dongle Knowledge Employees Apps Backup Managed Service Remote Support DDoS Printers Managed IT Tactics Windows Eliminating Downtime Paste Downloads Laptop Insurance Phone System Browser Disaster Recovery Online Shopping Encryption IT Support Mobile Devices IaaS Work/Life Balance Email Machine Learning Office Tips Websites Communication IT Management Edge Cables Managing Stress Quick Tips Networking Processors Settings Synergy Software Apple Financial Data Protection Medical IT Cleaning Troubleshooting Backup and Disaster Recovery Word Project Management Facebook Mobile Office Analytics Gmail Best Practices Multi-Factor Security Microsoft Teams Paperless Office Employee-Employer Relationship Wireless Profitability HP Remote Monitoring Vulnerability Collaboration Politics Bitcoin Ink Patch Management Touchscreen Cloud Computing Payment BDR Healthcare Cortana Credit Cards Benchmarks Shortcut OneNote The Internet of Things Smart Technology Battery Blockchain SSD e-waste Movies Technology VoIP Television Database User Tip Business Technology Automation Website Business Continuity Save Money Video Games Communications Staffing Avoiding Downtime Hosted Solutions eCommerce Tablet Office 365 Updates Leadership Artificial Intelligence Storage Business Computing Certification Internet Explorer Internet of Things Display eWaste Hard Drives Digital How To Windows Server 2008 R2 Managed IT Services Connectivity G Suite IT budget Instagram Training CrashOverride Payment Cards Managed IT Service Remote Monitoring and Management Printer Alert Data Staff Gadget Telephone Systems E-Commerce Government Technology Tips Update BYOD Malware Tech Term Gadgets Millennials Hard Drive Office Small Business Miscellaneous Compliance