Alltech IT Solutions Blog

A Short History of Cybersecurity

A Short History of Cybersecurity

The way a business handles its network security typically defines what kind of problems come from their use of information systems. As a result, cybersecurity has become a major part of any forward-thinking organization’s IT strategy and has become a multi-hundred-billion dollar a year industry. Of course, it wasn’t always such a huge problem. The history of cybersecurity doesn’t go back very far, but since it has such a major impact, we thought it would be interesting to go back a couple decades and look at the brief history of the practice. 

Where Are We?

We’d like to start by describing the cybersecurity industry as it stands today. Cybercrime is taking in at least $1.5 trillion in profits each year and growing. Some have predicted that damages from cybercrime will reach $6 trillion by 2021. To remedy this theft, the cybercrime market has grown to be a $200 billion a year industry. Security breaches are up by 67 percent over the past five years. 

With 76 percent of all businesses targeted, the most popular method of attack is now phishing. This method can deploy malware of all types (including ransomware), reveal sensitive information, or steal login account credentials for direct access. The worst part is that most people that have been successfully phished have no idea until something dramatic happens. In fact, it’s with phishing attacks leading the way, billions of records are exposed, stolen, or corrupted each year. 

With so much at stake, you can see that cybercrime has become a huge issue for businesses of all sizes. 

It wasn’t always so.

At the Beginning

It may be hard to believe, but the history of a trend that is syphoning trillions of dollars off of the economies of the world started, innocuously, as a research project. A man named Bob Thomas made the astute observation that it may be possible for a computer program to move across a computer network and leave a trail. He then wrote a code that he named “Creeper”. His program was designed to travel between Tenex terminals on the ARPANET. The message read “I’M THE CREEPER: CATCH ME IF YOU CAN”.

The idea came across the attention of email inventor Ray Tomlinson. Tomlinson changed the program to be self-replicating. In essence, this was the first computer worm. Immediately after, he wrote what was called “Reaper” which chased down the Creeper code and deleted it. It was effectively the first antivirus software. 

Shift to Criminality

One could be surprised to see just how benign the beginnings of cybercrime were. In the 1980s Soviet hackers were the first to consider the applications designed by academics could be used to infiltrate other networks. This notion quickly spread, and in 1986, German hacker Marcus Hess hacked an internet gateway hosted at the University of California at Berkeley. He then used that connection to piggyback onto the ARPANET. He hacked into 400 computers in all, including mainframes hosted at the Pentagon. His plan was to sell the secrets found on these computers to the Soviet KGB. He was caught in a cooperative effort between the FBI and the West German government. His conviction, the first of its kind, resulted in a 20-month suspended sentence. 

At the same time, computer viruses started to become serious threats; and, with the exponential increase in connectivity that was happening at the time, the computer virus had become a serious threat for the very first time. 

Development of Cybersecurity Software

In 1988, a software engineer named Robert Morris decided that he wanted to see just how large the Internet was. He wrote a program designed to spread across various networks, get into Unix terminals, and replicate. The software replicated so quickly that it slowed the early Internet, causing major damage. Known today as “the Morris Worm” it caused a huge stir and is the impetus behind the formation of the Computer Emergency Response Team (what is known today at US-CERT). Morris, who is now a longtime professor at MIT, was the first person convicted under the Computer Fraud and Abuse Act (CFAA), a statute that aims to protect against unauthorized access. 

Once the Morris Worm situation was handled, viruses started being developed at a dizzying rate. The antivirus industry, a product since 1987, began to grow fast. By the time the Internet started entering homes in the mid-1990s, there were dozens of different solutions for antivirus. These antivirus programs scanned the binaries on a computer and tested them against a database of virus code signatures. There were major problems that you can actually find with these programs today. In an effort to be comprehensive, they find a lot of false positives. They also have a tendency to use a lot of a system’s resources to scan for viruses, leaving a computer inoperable, or frustratingly slow.

The Malware Boom

In the mid-nineties there were only a few thousand known viruses on the Internet. As time went by, however, this number rose substantially. By 2007 there were around five million different malware strains that included: worms, viruses, trojan horses, and more. By 2014, 500,000 different strains of malware were being created every day. 

Security had to catch up. The antivirus solutions couldn’t keep up with the constant stream of malware. They simply couldn’t scan fast enough. Innovations in cybersecurity came quickly. First came endpoint protection platforms (EPP) that didn’t just scan for individual file types, they actively scanned for malware family similarities. Since most malware originated from a single idea, they share a lot of traits with similar malware, making it easier for EPPs to identify malicious code.


With advanced malware becoming more of a problem, defeating endpoint protection regularly with the addition of tools such as VBScript, PowerShell, Office Macros, and DDE attack, it was time for further innovation. This timeline was exacerbated by the deployment of WannaCry. WannaCry was, to that point, the most devastating piece of malware ever deployed. WannaCry was such a huge surprise to security professionals because the vulnerability it had used had already been patched by Microsoft. 

WannaCry encrypted the data on a computer and forced the owner of the computer to pay the hacker in Bitcoin to get access to those files. This signaled a hard turn in the cybersecurity industry. If people with a mind to do harm were going to have access to software like this, it was important that cybersecurity innovated right alongside it. Since the only way to know if you were being infiltrated was to have transparency in your network, administrators started to use endpoint threat detection and response (EDR) services to proactively monitor their important computing resources and their networks. Today, EDR solutions are the cutting-edge solutions to keep malware out of your network.

If you would like to know more about cybersecurity, or if you are just interested in keeping your business’ data and network safe, call Alltech IT Solutions today at 954-628-3770.

What Will Cybersecurity (Probably) Look Like in th...
Tip of the Week: Search Google Better


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 07 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Analytics Tip of the week Spotify Networking Data Management Memes A.I. Synergy Hacking Worker Online Shopping Yahoo Eliminating Downtime Shadow IT Cortana Printing Office Social Media Avoiding Downtime Microsoft Teams Virtual Private Network VoIp Machine Learning Battery Benchmarks Staff Bring Your Own Device Current Events Wireless Charging Hacker Profitability IT Management Gaming Console Regulation Compliance News Travel Tech Term Connectivity Chrome Profiles IaaS Copy Wearables Microsoft The Internet of Things WannaCry Recycling Cabling Efficiency Government Two-factor Authentication Managed IT Service Windows 7 Big Data Bandwidth e-waste Paper Data loss Business Technology Recovery Hybrid Cloud Spam Blocking Remote Support Managed Services Provider Virtual Reality Holiday Upgrade HIPAA Firewall Save Money Tech Support Gmail Leadership Hackers Software Mobile Devices Virtualization IT Services Backup Remote Monitoring and Management Employer Employee Relationship Credit Cards Lead Generation Computer User Tip eWaste Risk Management Scalability Document Management Human Resources Help Desk Multi-Factor Security Entertainment Television Medical IT Disaster Recovery Cables SaaS How To Password Managed Service Communications Net Neutrality Going Green Microsoft Office 365 Distribution VPN Hiring/Firing Certification Hard Disk Drive Budget Knowledge Windows 10 File Sharing Spyware Hosted Desktop HaaS Congratulations Dongle Touchscreen Botnet Data Protection Live Streaming Smart Technology VoIP Printer Server Emergency Storage Business Intelligence Access Instagram Internet Search Information Technology Outsourced IT Amazon Freedom of Information Hosted Solution Threat Phone System Managed IT Services Customer Relationship Management Safety Customer Service Telephone Systems Office 365 Scheduling Wireless Content Filtering Dark Data Managing Stress Encryption Managed Service Provider Telecommuting Chrome OS BDR Vendor Management Miscellaneous Vulnerabilities Remote Workers Telecommute Movies User Tips Licensing National Security Android Samsung Edge Tablet Remote Computing Tactics Innovation Employees Tech Terms Phishing Humor Business Continuity Apple Browser Router Mobile Device Excel Blockchain Scam G Suite Automobile Unified Communications WhatsApp Hardware Technology Tips Hosted Solutions Value Communication Politics Payment Cards Settings OneNote Antivirus Sales Conferencing Shortcut App Training Authentication Technology Windows Server 2008 R2 Employee-Employer Relationship Fleet Management User Security Computers Dark Web Reporting Wireless Internet instant Messaging Access Control Websites Cryptocurrency Updates Mobile Security Streaming Media Payment Productivity Workers Security Cameras IT Support Error Cost Management SSD BYOD GDPR Ink Google Maps Virus Healthcare Telephone System Managed IT Services Microsoft Office Voice over IP disposal Remote Business Management Taskbar Google Drive Managed IT Telephony Downloads Education CrashOverride Windows Small Business Artificial Intelligence Spam IT budget Smartphones Paste Virtual Assistant Printers Authorization Windows XP Voice over Internet Protocol Productivity Vulnerability Multi-Factor Authentication Mobility Malware Solid State Drive Users Word Information Social Network Network IT Tip of the Week Alerts Time Management Processors Operating System Autocorrect Database Collaboration Mobile Device Management Inventory Video Games Analysis Law Enforcement Network Attached Storage Batteries Network Security Wi-Fi Money WiFi Remote Monitoring Hard Drives Security Patch Management Apps Saving Money Smartphone Physical Security Webcam Update Digital Sports Outlook Employer-Employee Relationship Passwords Scams Millennials Biometrics Facebook Electronic Health Records Google Gadgets Management Alert Bitcoin E-Commerce Windows 10 Environment Email Retail Troubleshooting Mobile Thank You Files Unified Threat Management Insurance Mobile Office Maintenance Applications Plug-In Remote Control Business Computing File Management Data Backup Server Co-Managed IT IT Support Trends eCommerce Twitter Company Culture Gadget Processor Workplace Tips Data Recovery Work/Life Balance Cloud Computing Video Vendor Best Practices Marketing Internet of Things Emoji Laptop Cybercrime Website HP Holidays Hard Drive Display PowerPoint Proactive IT Threats Cloud iPhone Cybersecurity Quick Tips Personal Information Data Breach Email Management Paperless Office Data Security Specifications Financial Automation DDoS Cleaning Privacy Staffing RAM Printer Comparison Data Covid-19 Office Tips Project Management Business Ransomware Server Management Health Backup and Disaster Recovery Computer Care Internet Explorer