The first in our 2017 series of discussions with network\/IT security professionals on network intrusion and security in the Caribbean.<\/span><\/i><\/p>\n
\nNetwork security \u2013 and the lack thereof \u2013 continues to be a concern in the Caribbean. Although some incidents get reported; most are kept under wraps by the affected organisations, whilst\u00a0there are still others that are not (yet!) aware that their networks have been compromised.<\/span><\/p>\n
To help us all get a handle on what is going on in the IT\/network security space in the region, we are engaging Caribbean-based network security experts. To kick off the 2017 series, we are thrilled, once again, to have Niel Harper, who is no stranger to ICT Pulse and the Expert Insights series! <\/span><\/p>\n
Niel is the Founder and Managing Director of Octave Consulting Group, a boutique advisory firm specializing in CIO advisory, cybersecurity, IT assurance and information risk management services. He has had management responsibility, consulting engagements, and short-term assignments in over 20 countries, and has worked with organizations such as the Internet Society, United Nations Volunteers, Cable & Wireless, AT&T, Bermuda Commercial Bank, CIBC, and the Internet Engineering Task Force. Niel is a Fellow to: the British Computer Society; the OECD Technology Foresight Forum; and the Royal Society of Arts. He is an Incorporated Engineer (IEng) registered with the UK Engineering Council, and holds a number of industry certifications in information security, IT auditing, and business continuity management, and in 2014, he was recognized by the World Economic Forum as a Young Global Leader.<\/span><\/p>\n
ICT Pulse: \u00a0Niel, give us a quick recap of what have been the most prevalent types of incidents in Barbados and\/or in the Caribbean region over the past year or so? How has the threat landscape changed?<\/strong><\/p>\n
Neil Harper: \u00a0<\/strong>Michele, it\u2019s always difficult to quantify or qualify the number and types of cyber incidents that occur in the Caribbean because there are no mandatory breach notifications or transparency obligations in the various jurisdictions across the region. As such, public and private sector organizations do not notify the general public or individual data subjects when networks or personal data stores are compromised (yes I have said this a number of times, but it is still relevant and quite important). That being said, ransomware attacks have been quite prevalent across the region, and particularly targeting hospitals, educational institutions, government systems, financial services, and small-to-medium enterprises with insufficient resources to adequately respond to cyber threats. <\/span><\/p>\n
ICTP: \u00a0Over the past year, ransomware incidents appeared to have been quite plentiful across the region. Are they still as huge a threat?<\/strong><\/p>\n
NH: \u00a0<\/b>On a regional (and global) scale, ransomware has continued to be the most persistent business model for cybercriminals. One of the key reasons that ransomware has remained a major threat is because the tools used to initiate attacks are being continuously evolved and improved. For example, there was an over 150% increase in new ransomware variants in the first half of 2016. Moreover, cybercriminals are now operating Ransomware-as-a-Service (RaaS) with lower buy-in costs that allow less tech-savvy perpetrators to distribute ransomware. And the success of ransomware attacks is high because related exploit kits have been popping up more and more on legitimate websites.<\/span><\/p>\n
ICTP: \u00a0What are some of the new and emerging threats of which we should be more aware? And are there any particular areas of concern that you have for Caribbean organisations?<\/strong><\/p>\n
NH: \u00a0<\/b>One of my biggest concerns with regards to new and emerging threats is that nation states are increasingly developing offensive cyber capabilities, essentially weaponizing exploits and actively eroding trust online through disproportionate mass surveillance, targeted attacks, and information manipulation (fake news). On the other hand, threat actors are ramping up attacks against hardware and firmware vulnerabilities in processors, DRAM technologies, BIOS, and in firmware on devices such as USB, chargers, and external hard drives. IoT malware is on the rise and threatening individual privacy via regular household appliances and consumer devices. In 2017, ransomware continues to grow, and malware authors are focusing their efforts on mobile devices — attacking data repositories both on devices and in the cloud. \u2018Dronejacking\u2019 has become a growing threat with a noticeable increase in attacks due to consumer drones shipping with weak protection mechanisms. While not necessarily a new or emerging threats, the pervasive insecurity of IoT devices is fueling the perpetual threat of DDoS attacks, especially against ISPs with unsecured services such as DNS and BGP. All of these threat areas should be of concern to Caribbean organizations and individuals due to increased use of Internet-enabled devices at home and in the workplace.<\/span><\/p>\n
ICTP: \u00a0At the CARICOM\/regional level, there has been a growing awareness of cybercrime and cybersecurity, and calls by leaders for something be done. In your opinion, has there been any improvement in the cybersecurity-associated resources or support structures in Barbados, and\/or perhaps regionally? What might still be missing?<\/strong><\/p>\n
NH: \u00a0<\/b>I think the challenges with regards to cybercrime and cybersecurity are pretty constant across the Caribbean region — so I won\u2019t just focus on Barbados. While I think that awareness is increasing, I am deeply concerned that the response to these issues across CARICOM and the broader region is (still) severely lacking. For one, the vast majority of the countries in the Caribbean do not have a national cyber crime strategy. This includes legislative reform (e.g. computer misuse, data protection, privacy, e-commerce, etc.), incident response capabilities, threat intelligence sharing, cybersecurity education & training, and other important elements. The HIPCAR project to harmonize regional cyber legislation ended around 2012, and most countries have still not updated their national laws. That being said, this may actually be an opportunity as the final outputs from the project were largely inadequate, and regional leaders should now be looking towards options like signing on to the <\/span>Budapest Convention<\/span><\/a> and\/or modeling new data protection laws on the <\/span>EU\u2019s General Data Protection Regulations (GDPR)<\/span><\/a>.<\/span><\/p>\n
ICTP: \u00a0Should any organisation still be using tapes for data backup purposes?<\/strong><\/p>\n
Image credits: \u00a0Blogtrepreneur<\/a>\u00a0(flickr), Niel Harper\u00a0<\/em><\/p>\n
_________________<\/p>\n","protected":false},"excerpt":{"rendered":"