Skip to content
cyber-security-origin-story
7 min read

Cyber security awareness month - we take a look at it's origin story

As summer fades away, our attention shifts towards the upcoming winter season and the significance of October as Cyber Security Awareness month. It presents a fresh chance for us to embrace change, improve, and emerge stronger than ever before.

Let's embark on a nostalgic journey through time and look at cyber security's origin story. From the early days of the infamous "Creeper" worm to the present, where we confront relentless battles against formidable cyber adversaries armed with AI and quantum computing. By delving into our history, we gain a profound understanding of our current situation and the path that lies ahead.

The 1970s, cyber security was born 

The 70s is where it all began. The groove had arrived, and it wasn't just disco that made an impact.

"I'm the creeper, catch me if you can!" 

The "Creeper" worm arrived on the scene in 1971. The first known malware debuts onto ARPANET, an experimental computer network and predecessor of the internet. ARPANET was designed to send long-distance communications via computer without a phone connection.

Unbeknown to users at the time, who mainly were computer scientists, they were the victims of a computer virus. It wasn't clear at the time what the message meant and what its purpose was. As it turned out, the creator, Bob Thomas, intended to create an experimental computer program. It wasn't encrypting files, destroying data or demanding a ransom. It just duplicated itself repeatedly, behaving more like a digital prankster than an actual villain. Whilst harmless, it was the start of something more sinister to come. 

The landmark 80s 

As a way to protect their medical software from illegal copying, two Avi brothers from Pakistan created the "Brain Virus" in 1986. The virus is believed to be the first computer virus for the IBM PC and compatibles. It affected the PC by replacing the boot sector of a floppy disk with a copy of the virus and would slow down the floppy disk drive and make seven kilobytes of memory unavailable to DOS. 

Whilst the virus was less malicious in its intent, it opened the door to a need for a solid defence against cyber attacks and forged the birth of antivirus software.  

The 90s internet boom and email threats

As the internet flourished, so too did the opportunities for cyber attacks. As dial-up internet and chat rooms became the norm, the notorious "ILOVEYOU" worm came to be, with its mission to spread chaos. According to an article by Kaspersky Daily, it's estimated that up to 10% of internet-connected computers were infected and that estimated damages are around $10 billion [link to: https://tinyurl.com/njun5vwn]. This proved that email was an excellent vehicle for cyber threats and that a new era in cybersecurity was on the horizon. 

The 2000s and a new sophistication in the cyber world 

In 2010, the Stuxnet worm made its unprecedented mark on the world's security by damaging Iran's nuclear program. Everything shifted into high stakes overnight, and we weren't dealing with stolen data or online chaos – this was advanced physical damage and was demonstrative of how destructive cyber attacks had become.

Nations across the globe increased their digital security, and the global war against cybercrime became a top priority. 

Ransomware and the 2010s 

We're in a time where instant gratification is just a tap away – it's all about streaming and sharing selfies, and it's a glorious distraction from everything and anything that doesn't make us feel good. But a new threat lurks, and its name – "WannaCry".

WannaCry ransomware swept like wildfire as it infected systems across 150 countries. Whilst the attackers were paid out only $150,000, the loss of productivity and files is thought to be in the billions. 

At this point, a robust business model included cyber security. Antivirus software was no longer enough; a comprehensive cyber security strategy was the next stage in this evolutionary tale. 

The rise of regulations and laws 

By the time 2018 came around, GDPR (General Data Protection Regulation) came to be. Its role was straightforward: to protect the privacy and security of personal data. But, it wasn't just about IT and the end-user. It provided a new gold standard that the globe needed to adhere to because it was all about governance and policy. 

The lessons around antivirus software or firewalls were clear, but organisations were now being held accountable, and suddenly, data privacy became everyone's concern and the new hot topic.

Join the forces of cyber security today 

Even as we speak, gigantic shifts are happening in the digital landscape. We're living in a time of IoT, AI that can predict your next move and the emergence of quantum computing. Is it a good or bad thing? Time will tell us while cyber security continuously evolves, and the adventure is just beginning.

Cyber awareness is just one piece of our cyber security defence symphony. Cyber security professionals are crucial in protecting data and defending systems from cyber attacks. There has never been a better time to pursue your career in cyber security. With all the elements in harmony, you and your organisation can rest assured that you're safe. Please reach out if you're interested in how we can assist you. 

avatar
I love to help organisations solve data protection challenges. To do this, I transform security and data privacy from being necessary overheads to becoming business enablers. I have enjoyed many leadership roles throughout my career in data privacy, information security, and risk management. I take pride in creating positive outcomes, with over 15 years' experience of exceeding expectations in high pressure environments, both domestically and internationally.

COMMENTS