<\/a>A full house on day 2 of the 8th CIGF in Saint Lucia<\/p><\/div>\n
In the question and answer session that followed, Richardson\u00a0was asked why criminals might be focussing on the Caribbean. In his reply he highlighted that the increase in Internet bandwidth means that more entities of interest are online, and so greater opportunities exist. Additionally, the lack of proper legislation, both at the national and regional levels, on what is, or is not, a crime (or cyber crime) as well as to facilitate information sharing between countries, mean that the chances of prosecution would be limited or considerably less severe.<\/p>\n
With regard to the third point, participants interjected that frequently, corporate clients are not prepared to spend on network security, and will even rely on free products as a major line of defence. This stance within our business community, which was corroborated, does suggest that organisations in the Caribbean still have not truly appreciated the importance of cyber security and the threats to which they are continuously exposed.<\/p>\n
Finally, in light of the caution Richardson\u00a0expressed earlier in his talk on being overly reliant on firewalls and antivirus software, he again stressed that all network security appliances, especially firewalls, must be configured. They are not plug-and-play in nature, and must be programmed for the environment in which they must operate. Furthermore, even under the best conditions, regular assessments ought to be conducted to ensure that networks have not been compromised, especially since detection and protection systems tend to be at least on step behind the criminals.<\/p>\n
<\/p>\n
Image credits: ICT Pulse<\/em><\/p>\n__________________<\/p>\n","protected":false},"excerpt":{"rendered":"
The 8th Caribbean Internet Governance Forum has just concluded in Saint Lucia. We revisit the discussion on cyber crime in the Caribbean The Caribbean Internet Governance Forum (CIGF) is in […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,97,11,28],"tags":[71,120,105,38,39,43,86],"class_list":["post-4595","post","type-post","status-publish","format-standard","hentry","category-business","category-caribbean","category-computing","category-events","category-ict-tech","category-networking","tag-businesses","tag-ctu","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-internet-governance","tag-meetings","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-1c7","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=4595"}],"version-history":[{"count":11,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4595\/revisions"}],"predecessor-version":[{"id":4659,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4595\/revisions\/4659"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=4595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=4595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=4595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}