{"id":16019,"date":"2013-05-01T05:49:37","date_gmt":"2013-05-01T10:49:37","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=16019"},"modified":"2013-05-01T05:49:37","modified_gmt":"2013-05-01T10:49:37","slug":"expert-insights-2-cyber-threats-security-caribbean-2013-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/05\/expert-insights-2-cyber-threats-security-caribbean-2013-update\/","title":{"rendered":"Expert insights 2: Cyber threats and security in the Caribbean 2013 update"},"content":{"rendered":"
The second installment in our 2013 series in which we discuss with network\/IT security professionals across the region cyber intrusion and security in the Caribbean.<\/em><\/p>\n <\/a>In this the second in our Expert insights series for 2013 in which we revisit matters related to cyber threats and security in the Caribbean, we have Garfield Gordon, Territory Systems Engineer for Cisco Systems Inc<\/a>., and Chief Technology Officer for Wise Point Business Intelligence Solutions. Garfield, who is based in Jamaica, has over 20 years\u2019 experience in the IT\/ICT space. His areas of expertise include: Systems Integration, Networking, Internet, Security, Wireless, Mobile, Application Development and Business Enablement.<\/p>\n ICT Pulse:\u00a0 In the last year there has been numerous reports of intrusions across the Caribbean – both on government and private sector networks. Based on your work in the field, do you think incidents have increased, or is it just a case that more information is reaching the public domain?<\/b><\/b><\/p>\n Garfield Gordon: Without any empirical data, it is my opinion that the number of intrusion attempts remains relatively constant. However, the sophistication of the attacks has improved and they are meeting the desired goals.<\/p>\n ICT Pulse:\u00a0 Over the past year, have you witnessed any increased awareness or concern among organisations, or even individuals, regarding cybercrime and security in Jamaica?<\/b><\/b><\/p>\n GG:\u00a0 Since the intrusions within the service providers and the third party entities that manage the credit card information for the banks were publicized, there has been an increased awareness and interest in data security and what are the best practices to employ. The interest extends beyond using firewalls to secure data traffic and into other areas such as:<\/p>\n ICT Pulse:\u00a0 Have you observed any patterns or commonalities in the types of intrusions that have been prevalent in Jamaica, or possibly across, the region? <\/b><\/b><\/p>\n GG:\u00a0 Throughout the Caribbean and to a larger extent, this hemisphere, I continue to observe that the attacks are focused in the following sectors: Telecommunications, Financial Services, Remittances and now the Business Process Outsourcers (BPO). The attackers always seem to target entities dealing with money, credit ratings and large volumes of information.<\/p>\n ICT Pulse:\u00a0 Are there still any lingering misconceptions that organisations still seem to have about network security? If so, what are your observations?<\/b><\/b><\/p>\n GG:\u00a0 A number of persons within organizations still have the belief that a firewall is sufficient to protect them. They do not review the audit files as frequently as they should, and this is what makes some of the intrusions successful. For some of the environments, having improperly configured wireless routers and wireless networks have led to data loss. However, there are training courses that will help to identify and mitigate against a large number of intrusion attacks.\u00a0 Some of these courses and certifications are:<\/p>\n ICT Pulse:\u00a0 Many organisations, especially our SMEs, that recognise the importance of network security, can be challenged by budget limitations, vis-a-vis the likely cost of a comprehensive suite of solutions. What advice would you share, in terms of how best to spend their modest allocation for network security?<\/b><\/b><\/p>\n GG:\u00a0 Across the Caribbean, both the Service Providers and the established IT companies are either offering or beginning to offer a \u201cmanaged services\u201d portfolio targeted to the SME segment. These large companies are now becoming more nimble and flexible to the constrained budgets of the SME sector. Most SME owners still prefer to deal with their \u201cIT guy\u201d but they should be aware that there are options out there. Some of them encourage their \u201cIT guy\u201d to do trainings in security and produce the certificates.<\/p>\n As an alternative, they may engage one of these established entities to perform a security audit and some of them may do it for free if you sign up for a particular service.<\/p>\n Across the globe, the most valued items for a SME owner are: relationship, trust and reputation<\/i><\/b>. This is why there will always be a market for the \u201cIT guys\u201d catering to this segment because they take the time to develop the values that SME owners are looking for and not just view them as a number.<\/p>\n ICT Pulse:\u00a0 Finally, is there any single emerging trend or type of threat that you would flag as requiring extra vigilance in the region?<\/b><\/p>\n GG: Technology and processes change so rapidly so it is difficult to focus on any single trend. The following trends, whilst beneficial and helping to harmonize the elusive work\/life balance, will need some extra vigilance:<\/p>\n\n
\n