{"id":128837,"date":"2018-04-20T06:45:43","date_gmt":"2018-04-20T11:45:43","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=128837"},"modified":"2018-04-19T17:06:10","modified_gmt":"2018-04-19T22:06:10","slug":"expert-insight-2-cyber-threats-security-caribbean-2018-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2018\/04\/expert-insight-2-cyber-threats-security-caribbean-2018-update\/","title":{"rendered":"Expert Insight 2: Cyber threats and security in the Caribbean 2018 update"},"content":{"rendered":"

We continue our 2018 Expert Insight series on cybersecurity in the Caribbean with Sean Slattery, a network\/IT security professional based in the Cayman Islands.<\/em><\/p>\n

 <\/p>\n

Our Expert Insight series on cybersecurity has been a way for us to pick the brains of Caribbean network security specialists to secure firsthand, their thoughts and views about the state of network security in the region. Last week, we heard from Niel Harper<\/a>, who is based in Barbados. This week, we are delighted to feature, once again,\u00a0Sean Slattery.<\/p>\n

Sean Slattery is founder and CTO of Caribbean Solutions Lab<\/a> \u2013 a cybersecurity service provider that helps businesses throughout the Caribbean and North America to defend and protect themselves from cyber threats. Based in Cayman for nearly 20 years, Sean has spent the last 10-plus years focused purely on cybersecurity, and was also a McAfee instructor for over five years. He holds US Government secret security clearance, is an FBI Infragard<\/a> member, and regularly delivers cybersecurity presentations.<\/p>\n

ICT Pulse:\u00a0 Sean, thank you again for taking the time to share your insights with us. To start, give us a quick recap of what have been the most prevalent types of incidents in the Cayman Islands, and\/or in the wider Caribbean region, over the past year or so?<\/strong><\/p>\n

\"\"Sean Slattery:\u00a0<\/strong> Regionally, things have been on par with last year\u2019s trends. We continue to see systematic probing from the Far East along with the usual email phishing campaigns. Of note is that we have started to see more SMS based phishing usually targeting social media credentials. With a marked increase in smartphone adoption it makes sense to target these devices for credential and identity theft.<\/p>\n

ICTP:\u00a0 Has the threat landscape changed over the past year? Are there any particular areas of concern that you have for Caribbean organisations, or the region as a whole?<\/strong><\/p>\n

SS:\u00a0<\/strong> The \u201cbad guys\u201d will continue to use any tool at their disposition that is successful. The evidence shows that targeting small and medium businesses with phishing, credential and identity theft, ransomware and other malware works.<\/p>\n

ICTP:\u00a0 Over the past year, ransomware incidents still appeared to be occurring across the region. Are they still as huge a threat?<\/strong><\/p>\n

SS:\u00a0<\/strong> Ransomware is still a significant threat but there has also been a subtle shift towards a longer game. While ransomware has an end game, credential and identity theft and system compromise can yield dividends for much longer periods. Quite often, credential and identity theft does not involve any malware \u2013 only requiring a user to let their guard down for but a moment.<\/p>\n

ICTP:\u00a0 Bitcoin (cryptocurrencies) and blockchain are concepts of which mass consumers are becoming increasingly aware. Are you excited or concerned about these technologies?<\/strong><\/p>\n

SS:\u00a0<\/strong> While I am particularly interested in how blockchain could be used other than for cryptocurrencies, a friend recently penned an article describing how blockchain could be used to rationalize web advertising platforms and reduce fraud<\/a>. That said, the market will decide what will be successful, and so far, the market is undecided. Did you know that blockchain was invented ten years ago, but as of yet, only a handful of organizations have active blockchain implementations \u2013 interestingly, mostly with logistics? And while blockchain is inherently secure, there will be weaker links in implementation which will be exploited. It is only a matter of time.<\/p>\n

ICTP:\u00a0 Towards the end of 2017, we became aware of some new threats: Meltdown and Spectre, which seem to be shaking the computing and tech industry to its core. In layman\u2019s terms, can you briefly give us a sense of what Meltdown and Spectre are about, what harm they do, and what steps (if any) we can take to better protect ourselves?<\/strong><\/p>\n

SS:\u00a0<\/strong> News outlets have indeed been quick to sensationalize these vulnerabilities. In a nutshell, Spectre and Meltdown refer to three hardware vulnerabilities in CPUs that, in the right scenario, can be exploited to obtain privileged data. The operative phrase there is \u201cin the right scenario<\/em>\u201d meaning it is far from the end of the world. In order to exploit these vulnerabilities, an attacker would need to have the system run an application or script in order to access the interesting data. So regardless of the vulnerability, you simply need to prevent said execution. This is not to say that these vulnerabilities are trivial, far from it, but when prioritizing concerns, these would not be at the top of my list.<\/p>\n

ICTP:\u00a0 After all of what we have discussed so far, are there still new and emerging threats of which we should be more aware?<\/strong><\/p>\n

SS:\u00a0<\/strong> The largest two areas of threats involve malicious code and identity. Regardless of the specific techniques or exploits used, new or old, as long as we can secure these two areas at the endpoints, network and cloud, we are in good shape. Also, with the increase in cybersecurity awareness, we\u2019re also seeing client and compliance driven increased scrutiny of data protection measures. Data protection is perhaps one of the most challenging domains of cybersecurity. Successful organizations approach this challenge by first working on the business and technical processes for data classification. Once it is understood how the data is created and manipulated, then the protection is trivial.<\/p>\n

ICTP:\u00a0 Finally, what are the top three (3) things businesses should be doing this year, 2018, to improve their network\/IT security?<\/strong><\/p>\n

SS:\u00a0<\/strong> Picking only three is always a challenge! Let\u2019s go beyond the traditional mantras of obtaining board-level buy-in, security awareness training for users or regular software updating\/patching.<\/p>\n

    \n
  1. We continue to recommend investing in tools beyond the traditional firewall, antivirus, web and email filtering.\u00a0 Technology that leverage AI and machine learning to automatically prevent or detect threats are ideal. Remember to look at how these can be applied at endpoints, network and the cloud.<\/li>\n
  2. Credential theft is still all too common. Two easy ways to improve credential security are password management systems and multifactor authentication. These two measures apply to both corporate environments and users’ personal lives. We all know that one of corporate IT\u2019s functions is to help users with their home computers! \u00a0An organization with users that practice safe cybersecurity at home and at work is less likely to have issues.<\/li>\n
  3. Lastly there is compliance. Playing the compliance game isn\u2019t always fun but it is useful. The risk of non-compliance and penalties are often a good source of funding for cybersecurity investments. Regularly performing internal reviews are good practice and preparation for audits. Nothing is worse than an auditor claiming that you have failed some check but won\u2019t disclose why. Having the tools in place to confirm or deny these claims and the data to back it up builds confidence in your processes and investments. Simplicity, automation and good reporting are key here. Your staff already have a lot on their plates, so any tool that is easy to use and understand while providing readable reports is essential. Our most common implementation of compliance tools is from the cloud but that leverages local agents for internal scanning. It checks all of the boxes and is cost effective too.<\/li>\n<\/ol>\n

    Remember that cybersecurity isn\u2019t a project or tool, it\u2019s a lifestyle. Stay safe everyone.<\/p>\n

    Thank you.<\/p>\n

     <\/p>\n

    Do you have any questions for Sean? Do you agree with his views? Let us know in the Comments section below.\u00a0<\/strong><\/em><\/p>\n

     <\/p>\n

     <\/p>\n

    Image credit:\u00a0 typographyimages (Pixabay<\/a>);\u00a0 S Slattery<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

    We continue our 2018 Expert Insight series on cybersecurity in the Caribbean with Sean Slattery, a network\/IT security professional based in the Cayman Islands.   Our Expert Insight series on […]<\/p>\n","protected":false},"author":2,"featured_media":128843,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[11],"tags":[71,105,38,39,207,15],"class_list":["post-128837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict-tech","tag-businesses","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-expert-insights-series","tag-trends","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2018\/04\/Cyber-security-tag-cloud-typographyimages-Pixabay.png?fit=1024%2C744&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-xw1","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/128837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=128837"}],"version-history":[{"count":5,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/128837\/revisions"}],"predecessor-version":[{"id":128853,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/128837\/revisions\/128853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/128843"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=128837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=128837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=128837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}