{"id":96559,"date":"2017-04-05T07:30:42","date_gmt":"2017-04-05T12:30:42","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=96559"},"modified":"2017-04-19T08:43:06","modified_gmt":"2017-04-19T13:43:06","slug":"expert-insights-1-cyber-threats-security-caribbean-2017-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2017\/04\/expert-insights-1-cyber-threats-security-caribbean-2017-update\/","title":{"rendered":"Expert Insights 1: Cyber threats and security in the Caribbean 2017 update"},"content":{"rendered":"

The first in our 2017 series of discussions with network\/IT security professionals on network intrusion and security in the Caribbean.<\/span><\/i><\/p>\n


\nNetwork security \u2013 and the lack thereof \u2013 continues to be a concern in the Caribbean. Although some incidents get reported; most are kept under wraps by the affected organisations, whilst\u00a0there are still others that are not (yet!) aware that their networks have been compromised.<\/span><\/p>\n

To help us all get a handle on what is going on in the IT\/network security space in the region, we are engaging Caribbean-based network security experts. To kick off the 2017 series, we are thrilled, once again, to have Niel Harper, who is no stranger to ICT Pulse and the Expert Insights series! <\/span><\/p>\n

Niel is the Founder and Managing Director of Octave Consulting Group, a boutique advisory firm specializing in CIO advisory, cybersecurity, IT assurance and information risk management services. He has had management responsibility, consulting engagements, and short-term assignments in over 20 countries, and has worked with organizations such as the Internet Society, United Nations Volunteers, Cable & Wireless, AT&T, Bermuda Commercial Bank, CIBC, and the Internet Engineering Task Force. Niel is a Fellow to: the British Computer Society; the OECD Technology Foresight Forum; and the Royal Society of Arts. He is an Incorporated Engineer (IEng) registered with the UK Engineering Council, and holds a number of industry certifications in information security, IT auditing, and business continuity management, and in 2014, he was recognized by the World Economic Forum as a Young Global Leader.<\/span><\/p>\n

ICT Pulse: \u00a0Niel, give us a quick recap of what have been the most prevalent types of incidents in Barbados and\/or in the Caribbean region over the past year or so? How has the threat landscape changed?<\/strong><\/p>\n

Neil Harper: \u00a0<\/strong>Michele, it\u2019s always difficult to quantify or qualify the number and types of cyber incidents that occur in the Caribbean because there are no mandatory breach notifications or transparency obligations in the various jurisdictions across the region. As such, public and private sector organizations do not notify the general public or individual data subjects when networks or personal data stores are compromised (yes I have said this a number of times, but it is still relevant and quite important). That being said, ransomware attacks have been quite prevalent across the region, and particularly targeting hospitals, educational institutions, government systems, financial services, and small-to-medium enterprises with insufficient resources to adequately respond to cyber threats. <\/span><\/p>\n

ICTP: \u00a0Over the past year, ransomware incidents appeared to have been quite plentiful across the region. Are they still as huge a threat?<\/strong><\/p>\n

NH: \u00a0<\/b>On a regional (and global) scale, ransomware has continued to be the most persistent business model for cybercriminals. One of the key reasons that ransomware has remained a major threat is because the tools used to initiate attacks are being continuously evolved and improved. For example, there was an over 150% increase in new ransomware variants in the first half of 2016. Moreover, cybercriminals are now operating Ransomware-as-a-Service (RaaS) with lower buy-in costs that allow less tech-savvy perpetrators to distribute ransomware. And the success of ransomware attacks is high because related exploit kits have been popping up more and more on legitimate websites.<\/span><\/p>\n

ICTP: \u00a0What are some of the new and emerging threats of which we should be more aware? And are there any particular areas of concern that you have for Caribbean organisations?<\/strong><\/p>\n

\"\"NH: \u00a0<\/b>One of my biggest concerns with regards to new and emerging threats is that nation states are increasingly developing offensive cyber capabilities, essentially weaponizing exploits and actively eroding trust online through disproportionate mass surveillance, targeted attacks, and information manipulation (fake news). On the other hand, threat actors are ramping up attacks against hardware and firmware vulnerabilities in processors, DRAM technologies, BIOS, and in firmware on devices such as USB, chargers, and external hard drives. IoT malware is on the rise and threatening individual privacy via regular household appliances and consumer devices. In 2017, ransomware continues to grow, and malware authors are focusing their efforts on mobile devices — attacking data repositories both on devices and in the cloud. \u2018Dronejacking\u2019 has become a growing threat with a noticeable increase in attacks due to consumer drones shipping with weak protection mechanisms. While not necessarily a new or emerging threats, the pervasive insecurity of IoT devices is fueling the perpetual threat of DDoS attacks, especially against ISPs with unsecured services such as DNS and BGP. All of these threat areas should be of concern to Caribbean organizations and individuals due to increased use of Internet-enabled devices at home and in the workplace.<\/span><\/p>\n

\"\"ICTP: \u00a0At the CARICOM\/regional level, there has been a growing awareness of cybercrime and cybersecurity, and calls by leaders for something be done. In your opinion, has there been any improvement in the cybersecurity-associated resources or support structures in Barbados, and\/or perhaps regionally? What might still be missing?<\/strong><\/p>\n

NH: \u00a0<\/b>I think the challenges with regards to cybercrime and cybersecurity are pretty constant across the Caribbean region — so I won\u2019t just focus on Barbados. While I think that awareness is increasing, I am deeply concerned that the response to these issues across CARICOM and the broader region is (still) severely lacking. For one, the vast majority of the countries in the Caribbean do not have a national cyber crime strategy. This includes legislative reform (e.g. computer misuse, data protection, privacy, e-commerce, etc.), incident response capabilities, threat intelligence sharing, cybersecurity education & training, and other important elements. The HIPCAR project to harmonize regional cyber legislation ended around 2012, and most countries have still not updated their national laws. That being said, this may actually be an opportunity as the final outputs from the project were largely inadequate, and regional leaders should now be looking towards options like signing on to the <\/span>Budapest Convention<\/span><\/a> and\/or modeling new data protection laws on the <\/span>EU\u2019s General Data Protection Regulations (GDPR)<\/span><\/a>.<\/span><\/p>\n

ICTP: \u00a0Does it even make sense for small companies to send their network administrators to security training courses when security is not their full-time job, and given the pace at which the security landscape is changing? Or should such companies just accept the fact that they need to outsource this function?<\/strong><\/p>\n

NH: \u00a0<\/b>This is a very good question. A network administrator is employed to oversee the smooth and effective running of the company\u2019s system environment. However, this individual cannot successfully meet the demands of their job if the environment is not adequately secured. Hence, in my opinion, a top-tier network administrator should be trained on security to properly round off his\/her capabilities and deliver real value to the organization. However, the tricky aspect is that small businesses generally can\u2019t afford to hire network administrators with such a diverse skill set or to finance security-related training, so outsourcing then becomes the only viable alternative. But then outsourcing of such a sensitive role may not be cost-effective and bring with it an entire new set of risks. It\u2019s somewhat of a Catch 22.<\/span><\/p>\n

ICTP: \u00a0Do you agree that user naivet\u00e9 is the number one security threat facing organisations? If not, what do you think is the most significant threat?<\/strong><\/p>\n

NH: \u00a0<\/b>I strongly contend that end users remain one of the biggest threats to online security due to their lack of awareness, poor judgement and carelessness with password management, sharing devices with others, accessing unprotected and open public networks, downloading files and apps from untrusted sources, visiting unknown websites and clicking on fraudulent links. However\u2026 An increasingly connected society, coupled with a highly complex and constantly evolving threat environment, makes it extremely difficult for an inexperienced end user not to be the weakest link in the chain of trust. This is why end user awareness and training programs are so critical in combating cyber threats.<\/span><\/p>\n

ICTP: \u00a0Should any organisation still be using tapes for data backup purposes?<\/strong><\/p>\n

NH: \u00a0<\/b>I totally understand why this question would be asked, especially given the widespread availability and popularity of alternatives like cloud backups, disk-to-disk backups, low-cost NAS backups, and others. However, I still think that tape backups should be used for a number of reasons. Firstly, newer LTO technologies are allowing for higher capacity, greater transfer rates, and lower total cost of ownership — SMEs generally can\u2019t afford the large Internet pipes or expensive hardware\/software required to support cloud and disk-to-disk backups. Tapes also have better reliability (error-rate) and longevity than disks. Additionally, tapes are highly portable with regards to moving them offsite to support disaster recovery. Tapes can also be combined with disk-to-disk or cloud backups to increase the robustness of disaster recover solutions (e.g. when Internet connectivity is unavailable or data center locations are inaccessible due to a major incidents). Other areas where tapes are superior to disks are scalability and backward compatibility.<\/p>\n

\"\"ICTP: \u00a0And finally, what are the top three (3) things businesses should be doing this year to improve their network\/IT security?<\/strong><\/p>\n

NH: \u00a0<\/strong>An important undertaking for organizations in 2017 should be to hire someone who has a strong skill set in the area of risk evaluation and management — an expert who can take a holistic look at the business to identify and qualify\/quantify risk exposures and impacts, decide which risks can be accepted, and develop mitigating actions for those that can\u2019t. <\/span><\/p>\n

Secondly, businesses need to implement a toolset that provides them with greater visibility into security events and information throughout their IT environment. This should include logs and events from firewalls, intrusion detection\/prevention systems, endpoint security, operating systems, network devices, databases, file integrity checkers, and data loss prevention or digital rights management solutions. IT personnel need to be able to identify anomalies across the organization, and proactively address intrusions before they occur or effectively detect and respond to those that have already happened.<\/span><\/p>\n

Thirdly, businesses should rationalize and implement a cloud strategy (if they haven\u2019t done so already). Cloud-based solutions provide a more affordable solution to traditional on-premise systems. And while they have their own distinct set of associated risks, cloud-based services have become increasingly more secure and reliable over the last couple of years. To ensure that they are well protected when migrating to cloud services, business must focus concerted attention on the service level requirements which their cloud partners must adhere to. Key areas such as jurisdiction, data ownership, security standards, availability, performance, data portability, right to audit, exit clauses, change management and problem management should not be neglected. A robust service level agreement (SLA) is pretty much an insurance policy when entering into a cloud services partnership.<\/span><\/p>\n

 <\/p>\n

Do you have any questions for Niel, or views you would like to share? Please leave them in the Comments section below.\u00a0<\/strong><\/em><\/p>\n

 <\/p>\n

Image credits: \u00a0Blogtrepreneur<\/a>\u00a0(flickr), Niel Harper\u00a0<\/em><\/p>\n

_________________<\/p>\n","protected":false},"excerpt":{"rendered":"

The first in our 2017 series of discussions with network\/IT security professionals on network intrusion and security in the Caribbean. Network security \u2013 and the lack thereof \u2013 continues to […]<\/p>\n","protected":false},"author":2,"featured_media":96563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,11],"tags":[105,38,39,207,15],"class_list":["post-96559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-caribbean","category-computing","category-ict-tech","tag-cybercrimecybersecurity","tag-data-protection","tag-equipment-security","tag-expert-insights-series","tag-trends","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2017\/04\/Data-Security-Breach-Blogtrepreneur-flickr.jpg?fit=640%2C480&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-p7p","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/96559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=96559"}],"version-history":[{"count":5,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/96559\/revisions"}],"predecessor-version":[{"id":97487,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/96559\/revisions\/97487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/96563"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=96559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=96559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=96559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}