

When you hear the word “Caribbean,” what come’s to your mind? Is it the awesome beaches? Clear waters full of marine life perfect for diving? Pirates? Spring break? I know many will have different opinions on this one but would you ever think of the Caribbean islands as victims of cyber hacking?
According to Internet World Stats, 28.7% or 11.9 million users out of the total 41.4 million Caribbean population now use the Internet and almost 70% of the population is now using mobile phones which can be used for mobile banking, cash/cardless transactions, logging into social networking sites, and download apps. Most of the mentioned activities access a user’s personal information and if their internet connections aren’t secured, consumers would be vulnerable to identity theft as well as become victims of malware, phishing and other malicious web activities.
Rising cyber threats
Earlier this month, Telecoms Company LIME Barbados said in a press release that they experienced a deliberate attack on their internet infrastructure from an external source but assured customers that the incident was not widespread and their servers were not compromised.
This type of attack is serious but the Caribbean Governments aren’t paying much attention to the issue.
Time to wake up
Informative and thought-provoking Caribbean web blog, ICT Pulse, published a two-part piece regarding the state of cybersecurity in the Caribbean. The first part consisted of the interview with Barbados-based Niel Harper who has over 16 years experience in Telecommunications Engineering, Information Security Management, Business Continuity Management, Enterprise Risk Management, and ICT Regulation and Policy. The second part featured the interview with Garfield Gordon, Territory Systems Engineer for Cisco Systems Inc., based in Jamaica.
When asked about the state of cybersecurity in Barbados and in the Caribbean in general, Harper stated that, “Precise figures are hard to provide due to the fact that many companies in Barbados and the wider Caribbean do not report breaches. This can be due to numerous reasons, ranging from the reputation (regulatory consequences and service outages) and financial (share prices hits or revenue decreases) risks associated with the compromise of private information, to the fact that there are no pervasive legislative frameworks which mandate that firms report breaches to government or to their customers.”
“However, I would say that approximately 60% of organizations in the region have had at least one security incident over the last 1–2 years. This is mainly due to the growth in online data, as well as the increasing sophistication and organization of attackers. Other key factors are poor security practices, insufficient training and support, and the continuing use of unpatched or out-dated software. Comparatively, the statistics for personal users may be even higher given the significantly weaker or non-existent security controls present in many home computing environments.”
Harper also added that the most common misconceptions of organizations about cyber security is that technology alone can provide adequate, effective and sustainable protection for information assets. He also gave some tips as to how organizations and individuals could avoid cyber intrusion.
“I would recommend that organisations, as well as casual users, take steps to classify the information which they store on their computer systems,” Harper stated. “Information classification is the basis for developing any security regime. It is basically the categorization (e.g. Top Secret, Confidential, Internal, and Public) of the various forms of information which are kept. Each category of data should have an owner; the owner should then determine who is allowed to access the data and what level of protection should be implemented to protect the data set.”
Gordon was asked the same questions and he backed what Harper claimed.
“It is common knowledge within the IT community that there are various intrusion attempts daily,” Gordon stated. “What is not stated or readily apparent is the success rate of some of these attempts. Most of these attempts can be classified by the methods being used: port scanning, “script kiddie” type applications, and orchestrated intrusion attempts that are very clinical in targeting a specific vulnerability within a system.”
He also added that aside from network security, organizations should also consider the physical security and application security.
Gordon gave some tips on how to avoid becoming a victim of cyber intrusion.
“User education is the front line of every stand against fraud–especially computer fraud,” says SiliconANGLE editor Kit Dotson. “By attacking the problem from both the enterprise level by providing better patches and software and educating end users at the same time, it will greatly impact this sort of crime for Caribbean people and buisnesses.”
THANK YOU