We continue our conversation with\u00a0network\/IT security professionals \u2013 our second\u00a0instalment \u2013 on network\u00a0intrusion and security in the Caribbean, in the hope of gaining new insights for 2016.<\/em>
\nIn this the second in our Expert insights series for 2016 in which we discuss\u00a0matters related to cyber threats and security in the Caribbean,\u00a0we are thrilled, once again, to have Hector Diaz of Intel Security.\u00a0Intel Security, which is still\u00a0more popularly known as McAfee, is a globally recognised and well known computer and network security software firm. Intel Security’s Caribbean office is in the Dominican Republic, which serves\u00a0the Dominican Republic, Puerto Rico, all of the West Indies, and Bermuda. Hector is Intel Security’s\u00a0Regional Account Manager, Caribbean. He has \u00a0extensive experience in the IT security space, and possesses a diverse skill set that includes a strong technical background in infrastructure and security. Further, he has access to the depth and breadth of intelligence that a firm, such as\u00a0Intel Security, can offer,\u00a0which strengthens the insights he can share.\u00a0Below is the first part of our Q&A session with Hector.<\/span><\/p>\n
Hector Diaz:<\/strong> \u00a0Based on the information that we collect through our Global Threat Intelligence Network, after three quarters of decline, the number of new malware samples (worldwide) resumed its ascent in Q4 2015, with 42 million new malicious hashes discovered, 10% more than in Q3 and the second highest on record. The growth in Q4 was driven, in part, by 2.3 million new mobile threats, 1 million more than in Q3.<\/p>\n
An important percentage of these types of threats are prevalent in the Caribbean region, especially:<\/p>\n
Figure1: New and Total Ransonware in 2014 and 2015 (Source McAfee Labs)<\/p><\/div>\n
Figure 2: New Macro Malware in 2014 and 2015 (Source McAfee Labs)<\/p><\/div>\n
Figure 3: New and Total Mobile Malware in 2014 and 2015 (Source McAfee Labs)<\/p><\/div>\n
Figure 4: 2016 Cybersecurity Skills Gap Infographic (Source ISACA)<\/p><\/div>\n
HD: \u00a0<\/strong>The increase in the amount and complexity of the computing services that companies are offering to the public or for internal consumption, think about, Internet Banking, ATMs that can now receive deposits, Mobile apps, cloud services for multiple purposes, virtualization and the mobile worker that can connect and compute everywhere is causing concern on the level of effectiveness that the ICT teams may have in the event of an incident.<\/p>\n
An overwhelming volume of malware is reaching endpoint systems, especially when they travel off-network. New and emerging threats, specifically designed to get past traditional security (AV, firewall, URL filtering \u00a0etc.) defences, result in a hectic and reactive \u201cfirefighting\u201d IT security environment that pulls IT security resources away from more strategic activities.<\/p>\n
IT security wants to reduce the number of resources needed to manually piece together data for investigations and thus improve response times. If we think about it for a second, most companies have invested responsibly in capabilities, aligned against threats\/risk, yet they have little sustainable advantage over adversaries. They\u2019ve got all the right countermeasures, but the friction and fragmentation they are required to overcome is leaving the combat ineffective.<\/p>\n
Based on this reality, one area where this challenge is very visible is in incident response \u2013 Security teams are overwhelmed in a constant state of firefighting \u2013 exceeding their capacity. This is why many organisations are shifting their investments from primarily protection to a balance across protection, detection, and correction. We can think of Incident Response as a funnel with events entering at one end and over time, ultimately being eliminated at the other. Through this funnel we have the 3 stages of threat mitigation: protect, detect and correct.<\/p>\n
I personally think that this new \u201cmindset\u201d is what drives most companies this year.<\/p>\n
HD:<\/strong> As you know, at a government\/law level, things take time and require consensus. Last march, CARICOM had a regional cybersecurity meeting that attracted a number of experts from Interpol, FBI and some other technology actors.<\/p>\n
We have also seen a number of efforts across the region to promote Cybersecurity at the state level with multiple initiatives and we as intel Security have participated in several meetings where IT security is a top priority.<\/p>\n
<\/p>\n
Part 2 of our Q&A session with Hector Diaz\u00a0of Intel Security Caribbean will be published on 13 May 2016.<\/strong><\/p>\n
In the meantime, do you\u00a0have any questions of comments? Please share them below.<\/strong><\/p>\n
<\/p>\n
Image\u00a0credits: \u00a0www.perspecsys.com<\/a><\/p>\n
______________<\/p>\n","protected":false},"excerpt":{"rendered":"