It was approaching midnight on a Sunday when the emergency room called. The charting system was down. What happened next would determine whether a 100-bed community hospital in Florida’s panhandle would become another ransomware statistic-or a story of disaster averted.
Jamie Hussey had been IT director at Jackson Hospital in Marianna, Florida, for over 25 years. That Sunday night in January 2022, he got a call from the emergency room: they couldn’t connect to the charting system that doctors use to look up patients’ medical histories.
Hussey investigated and quickly realized this wasn’t a routine technical glitch. The charting software, maintained by an outside vendor, was infected with ransomware. And he didn’t have much time to keep it from spreading.
On November 2, 1988, at 8:30 PM, a 23-year-old Cornell graduate student named Robert Tappan Morris had a simple question: How big is the internet?
To find out, he wrote 99 lines of code—a self-replicating program designed to quietly count computers on the network. He released it from an MIT computer (to hide his tracks) and went to dinner.
By the time he got back, he’d accidentally crashed 10% of the entire internet.
Internet Worm – decompilation:Photo courtesy Intel Free Press.
What Happened
Within 24 hours, about 6,000 of the 60,000 computers connected to the internet were grinding to a halt. Harvard, Stanford, NASA, and military research facilities were all affected. Vital functions slowed to a crawl. Emails were delayed for days.
The problem? A bug in Morris’s code. The worm was supposed to check if a computer was already infected before copying itself. But Morris worried administrators might fake infection status to protect their machines. So he programmed it to copy itself anyway 14% of the time—regardless of infection status.
The result: computers got infected hundreds of times over, overwhelmed by endless copies of the same program.
“We are currently under attack,” wrote a panicked UC Berkeley student in an email that night.
A VAX 11-750 at the University of the Basque Country Faculty of Informatics, 1988—the same year the Morris Worm struck. VAX systems running BSD Unix were primary targets. Photo: Wikimedia Commons
The Aftermath
The Morris Worm caused an estimated $100,000 to $10 million in damages. Morris became the first person convicted under the Computer Fraud and Abuse Act, receiving three years probation, 400 hours of community service, and a $10,000 fine.
But here’s the thing—Morris didn’t have malicious intent. He genuinely just wanted to measure the network’s size. His creation accidentally became the first major wake-up call for internet security.
The incident led directly to the creation of CERT (Computer Emergency Response Team) and sparked the development of the modern cybersecurity industry. The New York Times even used the phrase “the Internet” in print for the first time while reporting on it.
Why November 30th?
In direct response to the Morris Worm, the Association for Computing Machinery established Computer Security Day just weeks later. They chose November 30th specifically—right before the holiday shopping season—because cybercriminals love exploiting busy, distracted people.
That advice is even more relevant 37 years later.
The “1977 Trinity”: Commodore PET, Apple II, and TRS-80. Byte Magazine retrospectively named these three computers the pioneers of personal computing. When the Morris Worm struck in 1988, most people had never heard of “the internet.”
1988 vs. 2025: A Quick Comparison
Consider how things have changed:
Then: 60,000 computers connected to the internet. Now: Over 15 billion devices.
Then: Total damage from Morris Worm: $100K-$10M. Now: Average cost of a single data breach: $4.44 million.
Then: Attack motivation was curiosity. Now: 97% of attacks are financially motivated.
Yet some things haven’t changed. The Morris Worm exploited weak passwords and unpatched systems—the same vulnerabilities that cause most breaches today.
The entire internet in 1977—just a handful of connected institutions. By 1988, this had grown to 60,000 computers. Today: over 15 billion devices. Source: Wikimedia Commons (Public Domain)
What This Means for You
Computer Security Day isn’t just history—it’s a reminder that the basics still work:
• Multi-factor authentication stops 99.9% of account compromises
• Regular, tested backups can save your business from ransomware
• Employee training dramatically reduces successful phishing attacks
And yes—the holiday season really is prime time for attacks. Stay vigilant through January.
One More Thing
Robert Morris never went to prison. After completing his sentence, he co-founded Y Combinator (the startup accelerator behind Airbnb, Dropbox, and Reddit) and became a tenured professor at MIT—the same school where he launched his infamous worm.
In 2015, he was elected a Fellow of the Association for Computing Machinery—the organization that created Computer Security Day in response to his attack.
The lesson? The person who exposed the internet’s greatest vulnerabilities is now part of the establishment working to secure it. Threats evolve. Defenses must evolve too.
Your employees aren’t trying to sabotage your company. They’re just trying to be productive.
A Google engineer copies a few lines of proprietary code into ChatGPT to debug a problem. A Samsung employee pastes semiconductor design specifications into a prompt, asking the AI to help optimize performance. A healthcare administrator shares a de-identified patient dataset (they think) to train an AI model for internal use. A financial analyst includes client account numbers in a spreadsheet she uploads to an AI tool for analysis.
A finance manager at a multinational company joins what appears to be a routine video conference. On screen: the CFO and several other executives. They need urgent approval for a $25 million transfer. The faces are familiar. The voices match. The urgency seems reasonable.
The transfer is approved. Days later, the company discovers the truth: every person on that video call was an AI-generated deepfake. The $25 million is gone.
This isn’t a hypothetical scenario. It happened in 2024. And according to Keepnet Labs research, more than 10 percent of companies have now experienced attempted or successful deepfake fraud, with losses from successful attacks reaching as high as 10 percent of annual profits.
For healthcare organizations, life sciences companies, and nonprofits operating on tight margins, you’re not immune. You’re actually more vulnerable.
In the fast-paced world of life sciences, innovation is your most precious currency. Billions are invested in R&D, leading to groundbreaking discoveries that promise to transform healthcare. Yet, beneath this veneer of progress lies a silent, insidious threat: Intellectual Property (IP) theft and compromised R&D data. For life science executives, this isn’t just a technical glitch; it’s an existential risk that can cripple your competitive edge, devastate investor confidence, and wipe out years of hard-won progress. Read more “The Silent Threat: How IP Theft Can Cripple Life Science Innovation”
Scaling Healthcare IT: A Strategic Approach toPractice Growth
In the healthcare industry, organizations face increasing pressure to scale efficiently while maintaining compliance, security, and operational continuity. A well-planned healthcare IT strategy is essential for medical practices and healthcare organizations aiming to grow without disruption. Whether expanding to new locations, integrating new technologies, or handling a surge in patient volume, IT infrastructure plays a critical role in ensuring seamless scalability.
Ensuring compliance with HIPAA regulations has never been more critical for healthcare organizations. With evolving technology and increasing cyber threats, staying compliant isn’t just about avoiding fines—it’s about protecting patient data and maintaining trust. As healthcare IT challenges continue to evolve, businesses must adopt proactive compliance strategies to safeguard their operations.
How Can Healthcare IT Leaders Improve Cyber Resilience in 2025?
Healthcare organizations are top targets for cyberattacks, with 725 breaches exposing 275M+ records in 2024 alone. Cyber resilience in healthcare ensures rapid recovery, patient data protection, and compliance.
The healthcare industry is more reliant than ever on secure, reliable, and efficient technology. From electronic health records (EHR) to telemedicine solutions, IT infrastructure plays a critical role in patient care and operational efficiency. But managing IT in healthcare is no small task—compliance requirements, cybersecurity threats, and the need for 24/7 system uptime create unique challenges that many organizations struggle to handle in-house. This is where healthcare managed IT services come into play.
IT downtime in healthcare isn’t just an inconvenience—it can lead to delayed treatments, data loss, compliance risks, and significant financial losses. Healthcare providers rely on Electronic Health Records (EHR) systems, telemedicine platforms, and other digital solutions to streamline patient care. When these systems fail, the consequences can be critical.