Retro or renegade? Remembering the technology of yore

Switch on the lava lamp and settle down with a sherbet Dip Dab. Today, we’re talking about why we love retro – and why it doesn’t always love us.

As we nostalgically peruse the ‘Tech Innovations of Yore’ hall of fame we’ll pay homage to previously beloved gadgets that died their death when Freddos still cost 10p, the tech that’s made comebacks more unexpected than holographic ABBA, and the stalwarts of our digital lives that have stuck around longer than the haunting memories of ’80s mullets.

Don’t you (forget about me)

An obvious place to start our walk down memory lane is the floppy disk. Kids today would laugh at the thought of a computer contraption with a maximum capacity of a single megabyte. But in its heyday, the humble floppy disk loaded our documents and programs, moved information from device to device, and supported us through ever-crashing computer nightmares.

While it will forever live on as the ‘save’ icon, the floppy couldn’t keep pace with the advancement of computer science or the data revolution, and over the years has been replaced by much smaller, more spacious, and sexier inventions like the CD-Rom, the USB stick, and most recently, the almighty Cloud.

And let’s not forget the VCR. I remember the Friday night pilgrimages to Blockbuster, the argument that followed when someone used my sister’s christening video to record an episode of Corrie (case still unsolved), and learning to not look at the screen while rewinding just in case you saw a glimpse of a vital plot point.

Anyway, I digress down memory lane. The VCR may have defeated Betamax, but within two decades it was replaced by a combination of DVDs, set-top boxes, and now on-demand streaming. It seems ease, immediacy, and choice will always win out over a soft spot for established technologies.

Guess who’s back, back again?

Moving on from the tech graveyard we arrive at the retro rebounders. Who’d have thought a pager would still be a thing? We’ve gone through the Nokia 3310, the Matrix banana phone, the iPhone 8, and oversized Apple novelty watches, but still, the pager endures as a ubiquitous piece of kit for NHS staff (who use 10% of the world’s pagers!), for lifeboat crews, and birdwatchers. These diverse groups still find the pager to be efficient and reliable in time-pressured situations and poorly connected areas and consider them more appropriate in work environments.

And as for a more broadly loved rebounder, there’s the endurance of vinyl. Hey Dad, look, the kids think you’re still cool! Despite the fact that apps like Spotify and YouTube mean we have just about every song ever at our fingertips, the vinyl is the retro-tech gift that keeps giving.

You’re still the one I run to, the one that I belong to

Then there’s the tech that just keeps trekking on, the hardware, or software, that we haven’t found a need or way to replace. Like email, invented in 1982.

Email simply hasn’t been usurped despite the pace of technological innovation in the twenty-first century. The advent of SMS, instant and even automated messaging, hasn’t stopped the reigning king of communications on the eve of its 30th birthday.

But here’s the key difference between various flavors of retro technology. Vinyl may have risen, fallen, and re-emerged as trends and tastes have changed, but essentially vinyl has never been problematic. On the other hand, the persistence of an essentially ‘retro’ technology like email has the potential to be problematic, if the right protocols aren’t adopted to keep the whole ecosystem secure.

The world around us has completely changed and cyber threats which didn’t exist in 1982 are now prevalent across inboxes. Considering the amount of spam targeted at and reaching the inbox, and the ease with which email can be used as a threat vector, it’s vital that all users of it adopt the essential security protocols to keep it safe and secure.

How do we bring email up to speed in 2022?

By making sure domains are configured and protected correctly (cue SPF and DKIM), by enabling two-factor authentication, and by ensuring DMARC is configured at p=reject, to stop exact impersonation (email spoofing) in its tracks. Instilling the correct protocols and protections is vital to keep email safe and effective in the modern age.

Interested to see how your email security currently measures up? Try our free investigate tool below!

check email dmarc setup

PUBLISHED BY

Clare Holmes

31 May. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Cybersecurity

Post-quantum cryptography for Internet and WebPKI: Where are we now and how…

Bhushan Lokhande

Recent advancements in quantum computing pose a substantial threat to the cryptographic algorithms that secure internet communications, particularly public key cryptography. As quantum computers evolve, they could eventually compromise these cryptographic protections, putting all internet communication at risk.  While cryptographically relevant quantum computers (CRQCs) are not expected imminently, the transition to quantum-safe cryptography is…

Read more
Cybersecurity

Collaborative cybersecurity: The building blocks to a safer internet

Rahul Powar

Ciaran Martin, former CEO of the UK National Cyber Security Centre, and Rahul Powar, CEO of Red Sift The internet’s foundational promise is one of connection, opportunity, and innovation. But as technological innovation grows, so do the risks. The challenge is clear: how do we create a fundamentally safer internet while empowering organisations of…

Read more
Cybersecurity

Securing crypto with Andrei Terentiev

Sean Costigan

In a new episode of Resilience Rising, host Sean Costigan speaks to Andrei Terentiev, Chief Technology Officer (CTO) of Bitcoin.com. The discussion dives into the relationship between cryptocurrency and cybersecurity, with valuable insights into the challenges and strategies for safeguarding digital assets. Navigating the intersection of cryptocurrency and cybersecurity Andrei shares his journey from…

Read more
DMARC

2.3 million organizations embrace DMARC compliance

Jack Lilley

It has been one year since Google and Yahoo implemented stricter requirements for bulk email senders. Eleven months ago, Red Sift shared an update based on data from BIMI Radar, which revealed a concerning global readiness picture. Now, with a full year behind us, it’s time to evaluate the progress organizations have made in…

Read more