Retro or renegade? Remembering the technology of yore

Switch on the lava lamp and settle down with a sherbet Dip Dab. Today, we’re talking about why we love retro – and why it doesn’t always love us.

As we nostalgically peruse the ‘Tech Innovations of Yore’ hall of fame we’ll pay homage to previously beloved gadgets that died their death when Freddos still cost 10p, the tech that’s made comebacks more unexpected than holographic ABBA, and the stalwarts of our digital lives that have stuck around longer than the haunting memories of ’80s mullets.

Don’t you (forget about me)

An obvious place to start our walk down memory lane is the floppy disk. Kids today would laugh at the thought of a computer contraption with a maximum capacity of a single megabyte. But in its heyday, the humble floppy disk loaded our documents and programs, moved information from device to device, and supported us through ever-crashing computer nightmares.

While it will forever live on as the ‘save’ icon, the floppy couldn’t keep pace with the advancement of computer science or the data revolution, and over the years has been replaced by much smaller, more spacious, and sexier inventions like the CD-Rom, the USB stick, and most recently, the almighty Cloud.

And let’s not forget the VCR. I remember the Friday night pilgrimages to Blockbuster, the argument that followed when someone used my sister’s christening video to record an episode of Corrie (case still unsolved), and learning to not look at the screen while rewinding just in case you saw a glimpse of a vital plot point.

Anyway, I digress down memory lane. The VCR may have defeated Betamax, but within two decades it was replaced by a combination of DVDs, set-top boxes, and now on-demand streaming. It seems ease, immediacy, and choice will always win out over a soft spot for established technologies.

Guess who’s back, back again?

Moving on from the tech graveyard we arrive at the retro rebounders. Who’d have thought a pager would still be a thing? We’ve gone through the Nokia 3310, the Matrix banana phone, the iPhone 8, and oversized Apple novelty watches, but still, the pager endures as a ubiquitous piece of kit for NHS staff (who use 10% of the world’s pagers!), for lifeboat crews, and birdwatchers. These diverse groups still find the pager to be efficient and reliable in time-pressured situations and poorly connected areas and consider them more appropriate in work environments.

And as for a more broadly loved rebounder, there’s the endurance of vinyl. Hey Dad, look, the kids think you’re still cool! Despite the fact that apps like Spotify and YouTube mean we have just about every song ever at our fingertips, the vinyl is the retro-tech gift that keeps giving.

You’re still the one I run to, the one that I belong to

Then there’s the tech that just keeps trekking on, the hardware, or software, that we haven’t found a need or way to replace. Like email, invented in 1982.

Email simply hasn’t been usurped despite the pace of technological innovation in the twenty-first century. The advent of SMS, instant and even automated messaging, hasn’t stopped the reigning king of communications on the eve of its 30th birthday.

But here’s the key difference between various flavors of retro technology. Vinyl may have risen, fallen, and re-emerged as trends and tastes have changed, but essentially vinyl has never been problematic. On the other hand, the persistence of an essentially ‘retro’ technology like email has the potential to be problematic, if the right protocols aren’t adopted to keep the whole ecosystem secure.

The world around us has completely changed and cyber threats which didn’t exist in 1982 are now prevalent across inboxes. Considering the amount of spam targeted at and reaching the inbox, and the ease with which email can be used as a threat vector, it’s vital that all users of it adopt the essential security protocols to keep it safe and secure.

How do we bring email up to speed in 2022?

By making sure domains are configured and protected correctly (cue SPF and DKIM), by enabling two-factor authentication, and by ensuring DMARC is configured at p=reject, to stop exact impersonation (email spoofing) in its tracks. Instilling the correct protocols and protections is vital to keep email safe and effective in the modern age.

Interested to see how your email security currently measures up? Try our free investigate tool below!

check email dmarc setup

PUBLISHED BY

Clare Holmes

31 May. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Mail Check is Changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more
Security

Securing our world: For a safer internet

Jack Lilley

October is Cybersecurity Awareness Month, a time for industries to unite in promoting digital security within today’s complex landscape. Bad actors are leveraging increasingly sophisticated methods—such as email phishing and Business Email Compromise (BEC)—to exploit vulnerabilities, impersonate legitimate contacts, and access sensitive information. CISA Director Jen Easterly advises us to “always think before you…

Read more