{"id":81623,"date":"2016-04-15T08:01:28","date_gmt":"2016-04-15T13:01:28","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=81623"},"modified":"2017-04-07T19:33:55","modified_gmt":"2017-04-08T00:33:55","slug":"expert-insights-1-cyber-threats-security-caribbean-2016-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2016\/04\/expert-insights-1-cyber-threats-security-caribbean-2016-update\/","title":{"rendered":"Expert Insights 1: Cyber threats and security in the Caribbean 2016 update"},"content":{"rendered":"

Having taken a break\u00a0last year, we are\u00a0updating our series of discussions with network\/IT security professionals on network\u00a0intrusion and security in the Caribbean, in the hope of gaining new insights for 2016.<\/em>
\nOver the past several months, we have noted\u00a0an\u00a0increase\u00a0in\u00a0network attacks that have been occurring across government offices and private organisations\u00a0in the\u00a0Caribbean. Some of the incidents have been reported in the press, but no doubt, countless others are not publicly discussed, but nonetheless have crippled the affected organisations, and hopefully has been a sobering wake-up call regarding\u00a0the threats that exist. We, here at ICT Pulse, thus thought\u00a0it opportune engage\u00a0network security specialists across the Caribbean, to\u00a0secure some\u00a0\u00a0firsthand insights and advice on cybercrime and cybersecurity across the region,<\/p>\n

We are thrilled, once again, to launch our 2016 cybersecurity Expert Insights series with Niel Harper. Niel\u00a0is the Founder and Managing Director of Octave Consulting Group, a boutique advisory firm specializing in CIO advisory, cybersecurity, IT assurance and information risk management services. He has had management responsibility, consulting engagements, and short-term assignments in over 20 countries. He is a Fellow to: the British Computer Society; the OECD Technology Foresight Forum; and the Royal Society of Arts. He is an Incorporated Engineer (IEng) registered with the UK Engineering Council, and holds a number of industry certifications in information security, IT auditing, and business continuity management. In 2014, Niel\u00a0was recognized by the World Economic Forum as a Young Global Leader. He\u00a0has worked with organizations such as the Internet Society, United Nations Volunteers, Cable & Wireless, AT&T, Bermuda Commercial Bank, CIBC, and the Internet Engineering Task Force.<\/p>\n

ICT Pulse:<\/strong> \u00a0Niel, it has been two years since our last Expert Insights Series, give us a quick recap of what have been the most prevalent incidents in Barbados and\/or in the Caribbean region since 2014?<\/h4>\n

\"NielHarper_2016\"Niel Harper: \u00a0<\/strong>Over the last 2 years, various government web sites in Barbados have been compromised and defaced by hackers. Websites included the Barbados Government Information Service (BGIS), Barbados Stock Exchange (BSE), Barbados Revenue Authority (BRA), Royal Barbados Police Force, and the Barbados Supreme Court, to name a few. Private websites such as the Barbados Advocate were hacked as well.<\/p>\n

There are still no data protection laws in the country, so due to absence of mandatory breach notifications, the few reported incidents are only the tip of the iceberg. The prevalence of ATM skimming attacks have also increased. However, because the marketplace is dominated by mostly Canadian banks, Sarbanes-Oxley regulatory requirements have led to stronger controls, and many of the skimming attacks have resulted in arrests.<\/p>\n

In the wider Caribbean, there have been similar trends of government websites being compromised. A number of organizations in St. Vincent, Grenada, St. Kitts & Nevis and other countries have been subject to malicious online attacks. One of the major commonalities across the region is that organizations with limited resources and untrained personnel have been the targets of successful attacks. This is a key reason why capacity building is critical to improving the region\u2019s overall cyber response capabilities.<\/p>\n

ICTP: \u00a0<\/strong>How has the threat landscape changed over the past two years? Are there any particular areas of concern that you have for Caribbean organisations?<\/h4>\n

NH: \u00a0<\/strong>The smartphone footprint continues to grow and with it the attack surface of mobile devices. That being said, many device manufacturers are focusing their efforts on enhanced security as a product differentiator. Still, end user education is necessary as an additional layer of protection against malicious threats.<\/p>\n

Given the increased hardening of operating systems and applications, attackers are focusing on areas lower down the \u2018stack\u2019 such as BIOS, firmware, and graphics chipsets. Controls such as boot security, trusted execution, and active memory protecting are making these attacks more difficult, but I expect these types of threat vectors to increase.<\/p>\n

Newer technologies such as IoT (Internet of Things), M2M (machine-to-machine) communication, Network Functions Virtualization (NFV), and Software Defined Networks (SDN) are growing in terms of their deployment base. But this also introduces significant challenges in terms of security: single points of failure, open source software, and complexity. The fact that commonly used items such as televisions, refrigerators, and even automobiles, are now accessible through the Internet has vastly changed the threat landscape, and should force manufacturers and end users alike to focus more on cybersecurity.<\/p>\n

The explosion of cloud computing, the increasing popularity of crypto-currencies, and the emergence of mobile payments (e.g. Apple Pay, Google Wallet, etc.) are also areas for concern with regard to an expanding threat surface.<\/p>\n

All of these areas are of particular concerns for Caribbean organisations, especially those who are seeking to be on the cutting edge.<\/p>\n

ICTP: \u00a0<\/strong>At the CARICOM\/regional level, there has been a growing awareness of cybercrime and cybersecurity, and continued calls by leaders that something be done. In your opinion, has there been any improvement in the cybersecurity-associated resources or support structures in Barbados, and\/or perhaps regionally? What might still be missing?<\/h4>\n

NH: \u00a0<\/strong>I don\u2019t want to be the harbinger of doom, but from all accounts, there is still not enough of an urgency or commitment being demonstrated by regional leaders as it pertains to cyber security. Most all CARICOM countries have no national cybersecurity strategy or centralized function\/organization that is tasked with cyber incident response. While many countries have some legislation in place in terms of computer misuse, there are material deficiencies with regards to procedural law, legal interception, and computer forensic evidence collection. There continues to be wide scale delays in implementing data protection and privacy legislation (include responsible disclosure). Mechanisms in the private and public sectors for cyber defense coordination are virtually non-existent. Cyber security awareness is frighteningly low, and governments have not generally diverted sufficient resources to the development of national cyber security education. As a result, there is limited trust in key economic drivers such as the use of online services, e-government, and e-commerce. The aforementioned issues exist in Barbados as well as across the wider Caribbean.<\/p>\n

ICTP: \u00a0<\/strong>Are you observing any real evidence of a greater willingness among organisations to take cyber\/network security more seriously? How is that awareness (or lack thereof) being manifested?<\/h4>\n

NH: \u00a0<\/strong>To be quite honest, the organizations that take cyber\/network security are mostly the ones in heavily regulated industries such as financial services (mostly North American banks). Because of the high financial, operational, reputation, and regulatory risks, they are pretty much forced to apply concerted efforts to improving their security posture. Their entire status as a going concern is dependent on this. What I am seeing in other organizations is a lackadaisical approach to cyber security. Most organizations don\u2019t have roles such as Chief Security Officer, Head of IT Risk, or IT Auditor. The expectation is that the Network Administrator should be a security specialist (a clear violation in terms of segregation of duties). Additionally, cyber\/network security is not even a topic in many executive committee meetings or at the Board level.<\/p>\n

ICTP: \u00a0<\/strong>Have you observed any changes in end-user behaviour? Do you think IT staff have done enough sensitisation to bring about behavioural change in their users?<\/h4>\n

NH: \u00a0<\/strong>Security awareness is not a common practice in many organizations in developed and developing countries. A bevy of industry surveys have highlighted that a large percentage of companies do not even have security awareness programmes in place. In the 2016 Cybersecurity Report published by the OAS and IDB, security awareness was cited as a major deficiency in the majority of CARICOM states. Hence, my belief is that there is still much work to be done in terms of positively altering the risky behaviors of end users.<\/p>\n

ICTP: \u00a0<\/strong>As you are aware, there has been considerable concern and discussion about ransomware. If there is one thing people should know about this threat, what would that be? Can organisations recover their network data that has been corrupted by ransomware? What would be your best advice to minimise the effect of ransomware?<\/h4>\n

NH: \u00a0<\/strong>The one thing people should know about ransomware is that it is highly unlikely that they will be allowed to pay in fiat currencies (attackers are requesting payment in Bitcoin more and more). When I speak to my customers about recovering from ransomware, my primary advice is that they have an effective data backup and recovery scheme in place. The best way to recover from ransomware variants such as TeslaCrypt, Cryptowall or Cryptlocker is to ensure that you have recent copies of your data backed up to tape or disk (and encrypted if at all possible). I also advise them to deploy hardened desktops and servers, as well as ensure that all applications have recent patches applied.<\/p>\n

ICTP: \u00a0<\/strong>Finally, are there any key areas businesses should be investing their network security\/IT dollars this year?<\/h4>\n

NH: \u00a0<\/strong>I would say that the best investment as it pertains to cyber\/network security is in highly trained staff. A top-tier cyber security specialist will have the necessary knowledge and experience to adequately and effectively secure computing environments to best mitigate risk exposures from online threats.<\/p>\n

 <\/p>\n

Do you have any questions for Niel, or views you would like to share? Please leave them in the Comments section below.\u00a0<\/strong><\/em><\/p>\n

Looking forward to your feedback! \u00a0<\/strong><\/em><\/p>\n

 <\/p>\n

Image credits: \u00a0CyberHades<\/a> (flickr); \u00a0Niel Harper<\/em><\/p>\n

________________<\/p>\n","protected":false},"excerpt":{"rendered":"

Having taken a break\u00a0last year, we are\u00a0updating our series of discussions with network\/IT security professionals on network\u00a0intrusion and security in the Caribbean, in the hope of gaining new insights for […]<\/p>\n","protected":false},"author":2,"featured_media":81629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,11],"tags":[71,105,38,39,207,15],"class_list":["post-81623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-caribbean","category-computing","category-ict-tech","tag-businesses","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-expert-insights-series","tag-trends","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2016\/04\/Network-Unlocked-Closeup-by-Cyber-Hades-flickr.jpg?fit=425%2C282&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-lev","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=81623"}],"version-history":[{"count":5,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81623\/revisions"}],"predecessor-version":[{"id":97014,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/81623\/revisions\/97014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/81629"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=81623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=81623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=81623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}