Retro or renegade? Remembering the technology of yore

Switch on the lava lamp and settle down with a sherbet Dip Dab. Today, we’re talking about why we love retro – and why it doesn’t always love us.

As we nostalgically peruse the ‘Tech Innovations of Yore’ hall of fame we’ll pay homage to previously beloved gadgets that died their death when Freddos still cost 10p, the tech that’s made comebacks more unexpected than holographic ABBA, and the stalwarts of our digital lives that have stuck around longer than the haunting memories of ’80s mullets.

Don’t you (forget about me)

An obvious place to start our walk down memory lane is the floppy disk. Kids today would laugh at the thought of a computer contraption with a maximum capacity of a single megabyte. But in its heyday, the humble floppy disk loaded our documents and programs, moved information from device to device, and supported us through ever-crashing computer nightmares.

While it will forever live on as the ‘save’ icon, the floppy couldn’t keep pace with the advancement of computer science or the data revolution, and over the years has been replaced by much smaller, more spacious, and sexier inventions like the CD-Rom, the USB stick, and most recently, the almighty Cloud.

And let’s not forget the VCR. I remember the Friday night pilgrimages to Blockbuster, the argument that followed when someone used my sister’s christening video to record an episode of Corrie (case still unsolved), and learning to not look at the screen while rewinding just in case you saw a glimpse of a vital plot point.

Anyway, I digress down memory lane. The VCR may have defeated Betamax, but within two decades it was replaced by a combination of DVDs, set-top boxes, and now on-demand streaming. It seems ease, immediacy, and choice will always win out over a soft spot for established technologies.

Guess who’s back, back again?

Moving on from the tech graveyard we arrive at the retro rebounders. Who’d have thought a pager would still be a thing? We’ve gone through the Nokia 3310, the Matrix banana phone, the iPhone 8, and oversized Apple novelty watches, but still, the pager endures as a ubiquitous piece of kit for NHS staff (who use 10% of the world’s pagers!), for lifeboat crews, and birdwatchers. These diverse groups still find the pager to be efficient and reliable in time-pressured situations and poorly connected areas and consider them more appropriate in work environments.

And as for a more broadly loved rebounder, there’s the endurance of vinyl. Hey Dad, look, the kids think you’re still cool! Despite the fact that apps like Spotify and YouTube mean we have just about every song ever at our fingertips, the vinyl is the retro-tech gift that keeps giving.

You’re still the one I run to, the one that I belong to

Then there’s the tech that just keeps trekking on, the hardware, or software, that we haven’t found a need or way to replace. Like email, invented in 1982.

Email simply hasn’t been usurped despite the pace of technological innovation in the twenty-first century. The advent of SMS, instant and even automated messaging, hasn’t stopped the reigning king of communications on the eve of its 30th birthday.

But here’s the key difference between various flavors of retro technology. Vinyl may have risen, fallen, and re-emerged as trends and tastes have changed, but essentially vinyl has never been problematic. On the other hand, the persistence of an essentially ‘retro’ technology like email has the potential to be problematic, if the right protocols aren’t adopted to keep the whole ecosystem secure.

The world around us has completely changed and cyber threats which didn’t exist in 1982 are now prevalent across inboxes. Considering the amount of spam targeted at and reaching the inbox, and the ease with which email can be used as a threat vector, it’s vital that all users of it adopt the essential security protocols to keep it safe and secure.

How do we bring email up to speed in 2022?

By making sure domains are configured and protected correctly (cue SPF and DKIM), by enabling two-factor authentication, and by ensuring DMARC is configured at p=reject, to stop exact impersonation (email spoofing) in its tracks. Instilling the correct protocols and protections is vital to keep email safe and effective in the modern age.

Interested to see how your email security currently measures up? Try our free investigate tool below!

check email dmarc setup

PUBLISHED BY

Clare Holmes

31 May. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more
Email

Navigating the “SubdoMailing” attack: How Red Sift proactively identified and remediated a…

Rebecca Warren

In the world of cybersecurity, a new threat has emerged. Known as “SubdoMailing,” this new attack cunningly bypasses some of the safeguards that DMARC sets up to protect email integrity.  In this blog we will focus on how the strategic investments we have made at Red Sift allowed us to discover and protect against…

Read more
Email

Where are we now? One month of Google and Yahoo’s new requirements…

Rebecca Warren

As of March 1, 2024, we are one month into Google and Yahoo’s new requirements for bulk senders. Before these requirements went live, we used Red Sift’s BIMI Radar to understand global readiness, and the picture wasn’t pretty.  At the end of January 2024, one-third of global enterprises were bound to fail the new…

Read more