As computer systems developed they’ve offered only more and more benefits and efficiencies for every business. But those same benefits also attract cyber criminals looking for vulnerable computer systems and untraceable wealth.
Much like a burglar testing every car door on a street for the few that are unlocked, cyber criminals scan the internet and organizations for the unlocked entrance. And while our cars and homes benefit from police patrols and neighborhood watches, cyber security is only as effective as our vigilance over the systems we employ.
History of Cyber Security
One of the early cyber security experts was Kevin Mitnick. In 1979 at the age of 16 posing as an employee of the Digital Equipment Corporation (DEC), Mitnick convinced a system administrator of DEC that he was locked out of his employee account. The system administrator granted access to Mitnick without performing the security checks we take for granted today. The system administrator also didn’t have any surveillance which would have tipped DEC off to the fact Mitnick offered the improper employee credentials to a community of hackers who began to steal software from DEC’s systems.
Cyber Security has progressed at a breakneck pace since 1979. In the 1980s computing and some of the work traditionally found in an office moved into the home. The computer was becoming much more accessible, in both a positive and negative way. A diskette could contain a nearly unlimited amount of valuable information, and transport it past security guards, cameras, and supervisors undetected.
In the 1990s the computer virus became a commonplace concern. And in the first decade of this century viruses exploded across the Internet. Criminals were not so much concerned with who was infected but how many systems could be compromised. E-mail and worms allowed viruses to spread, almost organically across networks and countries.
In 2013 ransomware came to prominence, with ZDnet reporting $27,780,000 in ransom payments. This ransomware relied on the new cryptocurrencies like Bitcoin to facilitate quick and untraceable payments.
The Need for Cyber Security
It’s plain to see the need for cyber security. As technology empowers business in new markets and products, there are always those pirates, gangsters, and schemers looking to separate us from our finances. But where as in the past we could trust in high walls and government protections, cyber security requires proactive security measures and constant vigilance.
Connections between systems need to hold up to constant bombardment from all corners of the world, while monitoring for the difference between businesses benefiting legitimate connections and illegitimate targeted attacks. Laptops and phones need to be able to trust third-party connections and be secured in the event of theft or loss. Employees need to be prepared to report and respond to intrusion attempts, and made to understand the role they play in cyber security and the value of security practices.
Simply put, cyber security is valuing your business. A shopkeeper ensures they lock the door each night. Bankers track every transaction and investigate any discrepancy. And every modern business must be at least as vigilant as these examples when it comes to the networks, systems, and tools that have become critical these last five decades.
Wondering Where to Go Next?
When it comes to cyber security, the teams of experts at Infinavate have seen IT all. If you’re looking for instant and long-term guidance, search no further. Contact us today to learn how we can help you create a robust cyber security plan.
- A History of Cyber Security Attacks
- The Beginnings Of Cyber Security, And The Next 30 Years
- CryptoLocker’s crimewave: A trail of millions in laundered Bitcoin