{"id":49515,"date":"2014-01-24T05:06:56","date_gmt":"2014-01-24T10:06:56","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=49515"},"modified":"2014-01-25T09:15:18","modified_gmt":"2014-01-25T14:15:18","slug":"3-critical-cybersecurity-resolutions-caribbean-organisations-adopt-2014","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2014\/01\/3-critical-cybersecurity-resolutions-caribbean-organisations-adopt-2014\/","title":{"rendered":"3 critical cybersecurity resolutions Caribbean organisations should adopt in 2014"},"content":{"rendered":"

Guest contributor, Deon Olton of the Caribbean Cyber Security Center in Barbados, recommends three cybersecurity resolutions Caribbean organisation should adopt to be better prepared in 2014<\/i><\/p>\n

\"Cybersecurity<\/p>\n

Cybersecurity predictions for the Caribbean for 2014<\/a> paint a dismal picture for the private and public sectors in the region. We expect to see a spike in the number of security breaches, ranging from website defacement and invasion of privacy on smartphones, to full-scale attacks on systems still running Microsoft Windows XP. These breaches will have an impact on the confidentiality, integrity and availability of data, as well as the systems organisations need to stay online and in business. Some may think that these predictions are merely a scare tactic, but I am sure those who are foolhardy and not take them seriously will end-up on the front page of the leading publications in the region.<\/p>\n

Despite the gloom and doom there is hope. There are three cybersecurity resolutions that governments and organisations ought to consider in order to avoid much of the dangers that lie ahead. A new approach to cybersecurity in 2014 is needed because all of the headline news of 2013 suggests that we are under attack.<\/p>\n

Raising the cybersecurity profile of an organisation or government in 2014 will not get any easier. The threat landscape is ever evolving, as there are vulnerabilities in software, PCs, smartphones, servers, routers, firewalls, security policies, and the list goes on. The recommended resolutions are critical to ensure that we, in the Caribbean, reduce the possibility of a breach, or the downtime as a result, and will assist organisations in moving to a better cybersecurity state.<\/p>\n

Resolution 1:\u00a0 Recognize the threat<\/h3>\n

There ought to be a clear understanding of what impact a network breach will have on your organisation. Questions to be answered include:<\/p>\n

    \n
  • How much money will you lose for each hour or day the systems is offline?<\/li>\n
  • What is the cost associated with restoration of service?<\/li>\n
  • What is the public relations cost to manage the effects of the breach?<\/li>\n
  • Further, should data be lost, how will it affect your organisation from an operational, financial and customer retention perspective?<\/li>\n<\/ul>\n

    Cyber threats must be seen as a business continuity issue and not an IT problem. It requires direction from upper management since the effects can bring the entire business to a halt. The days when installing an antivirus programme on all PCs was the answer to all our problems are long gone. There is need for awareness at all levels of an organisation to foster a security-minded culture.<\/p>\n

    Our predictions show that the level of sophistication of attacks will continue to increase and will make identification, detection and remediation harder for systems administrators. However, ensuring that every employee understands how he or she contributes to the overall organisational defences is critical.<\/p>\n

    Resolution 2.\u00a0 Invest in your organisation\u2019s cybersecurity defences<\/h3>\n

    Investing in your organisation\u2019s defences is critical and can make a big difference in securing its data, and its financial and infrastructural assets, as an outage or breach will have high cost implications. Buying a firewall and antivirus is a good starting point, but it is not enough. There is rarely a good time to argue for investment dollars for IT, especially during times of budget cuts and job lay-offs. However, investments in security now will be far cheaper than fixing breaches after the fact.<\/p>\n

    Greater efficiencies are now needed to offset reduced staffing and services that are a result of budgetary curtailing. Nevertheless they can be accomplished, provided the IT and security teams plan and invest in technical, management and employee awareness solutions that address the most pertinent threats.<\/p>\n

    The past pattern of cyber intrusions in the region, plus the predictions for more aggressive activity on critical infrastructure clearly shows the need for proactive cybersecurity. Losing valuable data, in and of itself, is bad enough. However agencies cannot put an accurate price tag on the loss of public trust and company image that accompany highly publicized data breaches. A smaller investment up front can go a long way towards avoiding such a dire scenario.<\/p>\n

    3.\u00a0 Choose a cybersecurity partner<\/h3>\n

    With all of the uncertainty of whether your organisation has an adequate defence system, or which phase of the attack progression it is in, it is critical to leverage the resources of a cybersecurity partner who can help. No matter who handles your network security, you need to have an independent assessment of where you are.<\/p>\n

    Do you get reports on the number of attempted intrusions? Do you know who has access to your data, where it is and if it is secure? Have you ever had a penetration test and or network vulnerability assessment as part of the overall IT Risk Assessment? If you answered NO to any of these questions, your organisation needs to determine the state of the attack progression it is in.<\/p>\n

    Getting an independent third party assessment is mandatory at this stage of the region\u2019s maturity.\u00a0 Your cybersecurity partner must have the ability to take a 360-degree look at your organisation, classify the threats and quantify the losses as a result of a data breach. In essence, a good cybersecurity partner will have key knowledge and experience that your internal IT staff may not possess and should be vender agnostic. These qualities are essential to ensure that your chosen partner has the skills and capabilities to help you find and remediate weaknesses in your organisation that investments in technical solutions and tools alone cannot identify.<\/p>\n

    In summary these three resolutions are essential for any organisation that is serious about not being hacked or exposed to data losses, and should be used as a roadmap to navigate this ever-evolving threat referred to as cybersecurity.<\/p>\n

    ……….<\/p>\n

    Mr. Deon Olton, a UWI graduate and Certified Ethical Hacker has worked with LIME, FLOW and Barbados Shipping and Trading (now Neal and Massy) and in his outstanding career, and has made a noteworthy contribution to ICT and Cyber Security across the Caribbean.<\/i><\/p>\n

    Mr. Olton\u2019s experience in telecoms, ICT and Cyber Security has allowed him to perform roles in Business Process Re-engineering, IT Risk Assessment, Security Awareness Training and long-term strategic IT planning. With this depth of experience and passion he has founded Enterprise Solutions to provide Telecoms Cost Management consulting services. As co-Founder, of the Caribbean Cyber Security Center, as CTO he is responsible for developing proactive plans to address the growing Cyber Security threats to the Caribbean region\u2019s economies.<\/i><\/p>\n

    …….<\/p>\n

    Image credit: \u00a0Free Press Pics (flickr)<\/em><\/p>\n

    ___________<\/p>\n","protected":false},"excerpt":{"rendered":"

    Guest contributor, Deon Olton of the Caribbean Cyber Security Center in Barbados, recommends three cybersecurity resolutions Caribbean organisation should adopt to be better prepared in 2014 Cybersecurity predictions for the […]<\/p>\n","protected":false},"author":4,"featured_media":49521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,27,11,33],"tags":[105,39,40,32,34],"class_list":["post-49515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-caribbean","category-computing","category-ict-tech","category-lists","tag-cybercrimecybersecurity","tag-equipment-security","tag-expertise-hr","tag-information-society","tag-lists-2","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2014\/01\/Cybersecurity-by-Free-Press-Pics-flickr.jpg?fit=640%2C181&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-cSD","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/49515"}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=49515"}],"version-history":[{"count":7,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/49515\/revisions"}],"predecessor-version":[{"id":49612,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/49515\/revisions\/49612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/49521"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=49515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=49515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=49515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}