MiMfg Magazine Jan/Feb 2023 | Page 31

I ’ M THE CREEPER . CATCH ME IF YOU CAN !
January / February 2023 MiMfg Magazine 31
Premium Associate Member

The Evolution of Cyber Threats

By Jake Allen • IT Resources
In 1970 the first computer virus , a worm named “ Creeper ,” was created by Bob Thomas of BBN . Bob was not a hacker , and the virus was not created with malicious intent . This was an experimental computer program which displayed a playful message , purportedly named after a Scooby-Doo villain . The Creeper worm proved the theory that a functioning “ virus ” which replicates itself and spreads to other systems on a network , could be created . This is a lighthearted precursor to destructive modern viruses , which can encrypt your business / personal files and hold them for ransom , destroy your data , steal social security numbers , wage literal modern warfare , and more .
Fast forward to today , computer viruses have evolved to cause catastrophic damage — and are the bane of enterprise computing and business worldwide . Entire mafia-like networks of hackers work around the clock to extract money from honest people running businesses . Some of the best ( worst ) examples of monetary damages to business include :
• Mydoom — $ 38 billion ( 2004 )
• Sobig — $ 30 billion ( 2003 )
• Klez — $ 19.8 billion ( 2001 )
• ILOVEYOU — $ 15 billion ( 2000 )
• WannaCry — $ 4 billion ( 2017 )
• Zeus — $ 3 billion ( 2007 )
• Code Red — $ 2.4 billion ( 2001 )
• Slammer — $ 1.2 billion ( 2003 )
Behind the Curve
Unfortunately , most businesses succumb to these threats because they are behind the curve on cybersecurity . For a comparison , take a look at how the automobile has advanced over time . When cars became popular around 1920-1960 , the rate of auto-deaths doubled . In 1949 , Nash was the first American car manufacturer to offer seat belts as a factory option . They were installed in 40,000 cars but buyers did not want them — and even requested dealers to remove them . Even by the 1960s , most Americans did not
I ’ M THE CREEPER . CATCH ME IF YOU CAN !
use them , and over 65 percent opposed them being enforced by law .
This is eerily similar to the trend of enterprise businesses being late to the cyber-security party . We see it on the news time and time again — “ Company A ” had no budget for cybersecurity , Ransomware hits , folks are fired , and then suddenly there is a $ 10 million dollar budget available for security . Maybe it is just human nature to put these scary facts off until they hit home and affect the individuals .
Modern Cyber Security Landscape
The modern cyber security framework has changed immensely , traditional antivirus is just not enough to keep threats at bay . The graphic below demonstrates all the areas that need parts and pieces that must work together in order to keep a modern network safe .

Behind all these areas , there are technologies , people and processes that work together to provide a comprehensive security program . You could always be doing more but at a minimum — you need to make sure you are doing enough . As the saying goes , the best time to plant a tree was 20 years ago , the secondbest time is now . Cyber threats are always evolving , stay on top of your game and prevent yourself from becoming another unfortunate statistic ! 6

Jake Allen , Solutions Engineer has been with IT Resource for six years and works close with IT Resource clients to make sure their processes and needs are met every time . He may be reached at jakea @ itrw . net .
IT Resource is an MMA Premium Associate Member and has been an MMA member company since September 2018 . Visit online : www . itrw . net .
All of your network ’ s components must work together to keep it secure .