{"id":1632,"date":"2021-01-19T21:17:13","date_gmt":"2021-01-20T02:17:13","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1632"},"modified":"2021-01-19T21:17:15","modified_gmt":"2021-01-20T02:17:15","slug":"the-history-of-cybersecurity-and-how-it-has-evolved","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/","title":{"rendered":"The History of Cybersecurity &#8211; and how it has evolved"},"content":{"rendered":"\n<p>Security has existed since the beginning of the history and its evolution has been linked in one way or another to that of the human being in all its scope of action. In the same way that the objectives of security have evolved, the history of the evolution of cybersecurity in companies has not been left behind and has undergone a substantial change since its inception, mainly motivated by the technological advances to which it has been exposed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Problems and issues that made Cybersecurity evolve through history<\/h2>\n\n\n\n<p>At the very beginning of modern computing, the first cybercriminals and malware appeared. At the beginning of the 70&#8217;s, Creeper appeared, as the first malware, which reached computers through the ARPANET (the forerunner of the internet), executed itself and began to show the message \u201cI&#8217;m the Creeper, catch me if you can! \u201d. Due to the ravages caused by that malware, and to solve it, the first antivirus called Reaper emerged, which was basically another virus that spread through the network in search of computers infected with Creeper to eliminate it.<\/p>\n\n\n\n<p>The evolution of technologies meant that there were more and more applications, more stored data and therefore more security risks because it was very juicy information for cybercriminals.<\/p>\n\n\n\n<p>In the 80s there was a boom in malware and although over time antiviruses have appeared that protect against the threats that have emerged (in many industries it is even mandatory to have an antivirus), malware has evolved to the level that today Nowadays there is malware specifically created to bypass normal antivirus protection, making it totally ineffective.<\/p>\n\n\n\n<p>The second generation of attacks emerged in the 1990s, with the adoption of the Internet by users and businesses. Connectivity brought us all together and hackers professionalized by specializing in stealing money, they began to use techniques that were the forerunners of those used by today&#8217;s cybercrime. To cope with this second generation, the industry&#8217;s first \u201chealth inspection\u201d firewall was developed.<\/p>\n\n\n\n<p>Unfortunately in this decade of the 90s, the internet was used without adequate awareness of the employees given that this was new and very little known, the information was stored on removable devices with few security measures and physical security in the facilities were still insufficient.<\/p>\n\n\n\n<p>See also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/attacks-suffered-by-usa-changed-the-cybersecurity\/\">Attacks suffered by USA that changed Cybersecurity<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/captain-zap-first-convicted-cybercriminal\/\">Captain Zap \u2013 First convicted cybercriminal<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security has existed since the beginning of the history and its evolution has been linked in one way or another to that of the human being in all its scope of action. In the same way that the objectives of security have evolved, the history of the evolution of cybersecurity in companies has not been [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36,214],"class_list":["post-1632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-history"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The History of Cybersecurity - and how it has evolved - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The History of Cybersecurity - and how it has evolved - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-20T02:17:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-20T02:17:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"The History of Cybersecurity &#8211; and how it has evolved\",\"datePublished\":\"2021-01-20T02:17:13+00:00\",\"dateModified\":\"2021-01-20T02:17:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/\"},\"wordCount\":397,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/segur.jpg\",\"keywords\":[\"Cybersecurity\",\"History\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/\",\"name\":\"The History of Cybersecurity - and how it has evolved - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/segur.jpg\",\"datePublished\":\"2021-01-20T02:17:13+00:00\",\"dateModified\":\"2021-01-20T02:17:15+00:00\",\"description\":\"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/segur.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/segur.jpg\",\"width\":720,\"height\":474},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-history-of-cybersecurity-and-how-it-has-evolved\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The History of Cybersecurity &#8211; and how it has evolved\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The History of Cybersecurity - and how it has evolved - Truxgo Server Blog","description":"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/","og_locale":"es_MX","og_type":"article","og_title":"The History of Cybersecurity - and how it has evolved - Truxgo Server Blog","og_description":"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...","og_url":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-01-20T02:17:13+00:00","article_modified_time":"2021-01-20T02:17:15+00:00","og_image":[{"width":720,"height":474,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"The History of Cybersecurity &#8211; and how it has evolved","datePublished":"2021-01-20T02:17:13+00:00","dateModified":"2021-01-20T02:17:15+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/"},"wordCount":397,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg","keywords":["Cybersecurity","History"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/","url":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/","name":"The History of Cybersecurity - and how it has evolved - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg","datePublished":"2021-01-20T02:17:13+00:00","dateModified":"2021-01-20T02:17:15+00:00","description":"Cybersecurity is undoubtedly a very important factor when browsing the internet and we review how it evolved in history...","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/01\/segur.jpg","width":720,"height":474},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/the-history-of-cybersecurity-and-how-it-has-evolved\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The History of Cybersecurity &#8211; and how it has evolved"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1632"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1632\/revisions"}],"predecessor-version":[{"id":1660,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1632\/revisions\/1660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1633"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}