How has cybersecurity evolved?

Cybercriminals now have more tools than ever before to launch more sophisticated and devastating attacks. From artificial intelligence to the dark web, companies need to rethink their security strategies as being reactive simply isn’t enough anymore. With the adoption of cloud infrastructure and the use of IoT devices increasing ten-fold each day, cyber attackers have moved inside our networks. With all this in mind, let’s take a closer look at how cybersecurity has evolved over time. 

Where did it all begin? 

Cybersecurity began with a simple research project. Having realised it was possible for a computer program to move across networks, Bob Thomas designed Creeper, a program which allowed him to travel between Tenex terminals on the early ARPANET. Ray Tomlinson, the person responsible for the creation of email, saw Thomas’ idea and began replicating it himself. However, he created antivirus software instead, which would chase Creeper and delete it. 

The types of attacks have changed 

We’ve come along way since Creeper, with some of the earliest forms of malicious cyber attacks focusing on PHI theft and credit/debit cards. Although these still occur today, we now have the threat of crypto and ransomware attacks to deal with. Phishing email attacks are still very common (phishing accounts for 90% of data breaches), but it’s fair to say they’ve become more sophisticated over time. Other examples include: 

  • Denial-of-service (DoS) attacks 
  • Distributed denial-of-service (DDoS) attacks 
  • Password attacks 
  • Malware 
  • Man-in-the-Middle (MitM) attacks 
  • SQL injections 

Who is responsible for cybersecurity now? 

In the past, it was assumed that the sole responsibility of a company’s cybersecurity lied with the IT team. However, thanks to an increase in awareness and understanding of cyber threats, it’s becoming a company-wide practice. Phishing attacks, in particular, should be understood by every member of your team, including the risks of opening malicious emails and how to identify or report them. 

What can you do? 

While cybercriminals look to the future for ways to compromise networks, they are also using old techniques which still work. With this in mind, how can you develop effective security measures? You’ll need native solutions and adaptive security deployments which can detect unexpected events and take action to rectify issues. However, while it’s important to nurture your existing talent in regards to cybersecurity, it might be time to consider recruiting IT security professionals too. 

To find out more about CyberSmart Active Protect which provides valuable insights into the status of all your devices, contact us on our live chat, 020 8059 2106 or email us on today.