{"id":7928,"date":"2013-02-06T09:58:51","date_gmt":"2013-02-06T14:58:51","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=7928"},"modified":"2013-02-06T10:09:20","modified_gmt":"2013-02-06T15:09:20","slug":"cybercrime-security","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/02\/cybercrime-security\/","title":{"rendered":"Are we really serious about cybercrime and security?"},"content":{"rendered":"
To varying degrees, the Caribbean is seen\u00a0as a haven for cybercrime\u00a0targeted at developed countries, but increasingly local private and public institutions are experiencing intrusions. This post challenges us to discuss how serious the region is about addressing cybercrime and cybersecurity.<\/em><\/p>\n <\/a>Over the past few weeks there have been a\u00a0spate of cyber intrusions worldwide, which resulted in the loss or theft of data. Some of the incidents reported include the New York Times, The Washington Post and Twitter, and within the Caribbean in the last two weeks, Digicel\u00a0and the Office of the Director of Public Prosecutions in Jamaica were hacked.<\/p>\n It is also important to highlight that in the region, Jamaica has been under much\u00a0scrutiny for advance payment scams, more commonly known as \u201clottery or lotto scams\u201d, which are being directed at United States (US)\u00a0residents. As noted in this week\u2019s news roundup<\/a>,<\/strong>\u00a0prominent US reporter, Dan Rather, was in Jamaica last week to prepare a report on the scamming, along with what the country has been doing and intends to do, to arrest the situation.<\/p>\n Without a doubt, developed countries are still grappling with cybercrime, but they are committing resources to continually improve their security. In the Caribbean, what are we doing to protect ourselves and to be more vigilant?<\/p>\n Although we ought not to underestimate the ingenuity and commitment of the individual\u00a0hacker who is intent on breaching our computer\u2019s or network\u2019s security, computer criminals are becoming increasingly sophisticated. As was noted in Escalating cyber security up the political agenda<\/i><\/b><\/a>, \u2018advances in technology and the Internet is causing cyber crime to become more organised and structured\u2019<\/i>. Groups or syndicates tend to be\u00a0the norm. They are highly organised and their members have clearly defined functions and responsibilities, which typically results in very complex and accurate coding that has benefited from a comprehensive and communal process.<\/p>\n Similarly, there has been a growing trend with respect to the types of intrusions that are being experienced. They are becoming more stealth, deep and persistent.\u00a0 Hence although the usual viruses, trojans, worms, etc., are still being developed and are wreaking havoc on networks and systems, a new class of threat has emerged that have been designed\u00a0to evade detection, yet be resident\u00a0and active for months, or even years. Consequently, when the intrusion is finally detected, it is frequently\u00a0unknown for long it had been present, and the extent of the damage or loss it has caused.<\/p>\n Worldwide, unauthorised intrusions are on the rise; but how are we protecting ourselves? Many of us, especially businesses and organisations, rely, almost exclusively, on free antivirus software.<\/p>\n <\/a>Free antivirus software does provide\u00a0baseline protection to PCs and similar devices, but there are reasons why it is free. Free software offers the most basic protection, which tends to be limited to virus detection and removal on your device. The broader aspects of computer security \u2013 such as added protection for online banking and shopping, personal data and even your keyboard \u2013 are not included.<\/p>\n On the other hand, in organisations that have in-house network or IT personnel, frequently, much of their time and attention is spent\u00a0addressing problems staff have with the equipment, leaving little time to comprehensively oversee the integrity of the businesses\u2019 network and systems. More importantly, the majority of\u00a0organisations are not as concerned as they should be with the security of\u00a0their networks, and are exceedingly modest in their spend on this area. Hence many are not prepared\u00a0to supplement their in-house support with dedicated network security specialists, who would monitor\u00a0an organisation\u2019s systems and networks, and could either be employed directly, or contracted to provide the requisite services.<\/p>\n Even with the most sophisticated\u00a0protective measures, organisations, and even the individual\u00a0user, must adopt good practices to limit the opportunities for unauthorised intrusions. A glaring weakness that is frequently overlooked is the USB flash drive that we use to save and carry information between devices. Similar to the floppy disk that preceded it, USB drives can harbour a broad range of malicious code that we, as users, unwittingly transfer or save to those drives, and then spread, when we connect them to other devices.<\/p>\n On another note;<\/p>\n Many of us are not as vigilant as we should be. Hence we may not even be aware of some of the changes that are occurring in our computing devices, particularly vulnerabilities that basic security measures would flag if we used them well.<\/p>\n Finally, it is important to highlight that Computer Emergency Response Teams (CERTs) or Computer Security Incident Response Teams (CSIRTs)<\/a>\u00a0still have not been established at\u00a0either country or regional level across most of the Caribbean. CERTs\/CSIRTs\u00a0can be\u00a0established within institutions, among organisations, as well as nationally, to provide\u00a0another layer of intelligence and technical expertise\u00a0to its members, which in turn strengthen the capability of the collective.<\/p>\n Several organisations, including the Organisation of American States and the Commonwealth Secretariat, have technical support to establish\u00a0such CERTs\/CSIRTs in the region, but few, if any, have been launched. \u00a0Currently, it is unclear what difficulties are being experienced\u00a0to implement\u00a0CERTs\/CSIRTs, but the region is increasingly seen as a conduit for cybercrime\u00a0to developed countries, since it has implemented relatively few measures to address\u00a0it. Hence the Caribbean could be seen as less than credible, should it wish to be\u00a0seen as being vigilant about cybercrime\u00a0and security, but is yet to implement\u00a0some of the critical measures that would demonstrate its commitment to addressing this issue.<\/p>\n <\/p>\n Image credits:\u00a0<\/em> chanpipat, Stuart Miles \/ FreeDigitalPhotos.net<\/a>; Null Value <\/a>\/ flickr<\/p>\n ___________<\/p>\n","protected":false},"excerpt":{"rendered":" To varying degrees, the Caribbean is seen\u00a0as a haven for cybercrime\u00a0targeted at developed countries, but increasingly local private and public institutions are experiencing intrusions. This post challenges us to discuss […]<\/p>\n","protected":false},"author":2,"featured_media":2939,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,11],"tags":[71,105,38,39,32,43],"class_list":["post-7928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-caribbean","category-computing","category-ict-tech","tag-businesses","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-information-society","tag-internet-governance","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2012\/02\/Crime-Scene-Photo-Null-Value-flickr.jpg?fit=240%2C160&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-23S","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/7928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=7928"}],"version-history":[{"count":10,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/7928\/revisions"}],"predecessor-version":[{"id":7961,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/7928\/revisions\/7961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/2939"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=7928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=7928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=7928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Increasing sophistication of perpetrators and threats<\/h3>\n
Penny wise, pound foolish<\/h3>\n
Poor internal policies and practices<\/h3>\n
\n
Collective resourcing and learning<\/h3>\n