{"id":16019,"date":"2013-05-01T05:49:37","date_gmt":"2013-05-01T10:49:37","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=16019"},"modified":"2013-05-01T05:49:37","modified_gmt":"2013-05-01T10:49:37","slug":"expert-insights-2-cyber-threats-security-caribbean-2013-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/05\/expert-insights-2-cyber-threats-security-caribbean-2013-update\/","title":{"rendered":"Expert insights 2: Cyber threats and security in the Caribbean 2013 update"},"content":{"rendered":"

The second installment in our 2013 series in which we discuss with network\/IT security professionals across the region cyber intrusion and security in the Caribbean.<\/em><\/p>\n

\"GGordon<\/a>In this the second in our Expert insights series for 2013 in which we revisit matters related to cyber threats and security in the Caribbean, we have Garfield Gordon, Territory Systems Engineer for Cisco Systems Inc<\/a>., and Chief Technology Officer for Wise Point Business Intelligence Solutions. Garfield, who is based in Jamaica, has over 20 years\u2019 experience in the IT\/ICT space. His areas of expertise include: Systems Integration, Networking, Internet, Security, Wireless, Mobile, Application Development and Business Enablement.<\/p>\n

ICT Pulse:\u00a0 In the last year there has been numerous reports of intrusions across the Caribbean – both on government and private sector networks. Based on your work in the field, do you think incidents have increased, or is it just a case that more information is reaching the public domain?<\/b><\/b><\/p>\n

Garfield Gordon: Without any empirical data, it is my opinion that the number of intrusion attempts remains relatively constant. However, the sophistication of the attacks has improved and they are meeting the desired goals.<\/p>\n

ICT Pulse:\u00a0 Over the past year, have you witnessed any increased awareness or concern among organisations, or even individuals, regarding cybercrime and security in Jamaica?<\/b><\/b><\/p>\n

GG:\u00a0 Since the intrusions within the service providers and the third party entities that manage the credit card information for the banks were publicized, there has been an increased awareness and interest in data security and what are the best practices to employ. The interest extends beyond using firewalls to secure data traffic and into other areas such as:<\/p>\n