FeaturedOpinion

Taran Rampersad: Are websites increasing cybersecurity vulnerabilities?

3 Mins read

Above: Illustration by vectorlab/DepositPhotos

Why So Many Breaches in Trinidad?

Taran Rampersad wrote this piece for his website, knowprose.com and it is reproduced here with his permission.

People continue to ask why there are so many data breaches happening in Trinidad and Tobago. I’m not someone who would call himself a security expert by a stretch, but it’s an intriguing enough question that I decided to look into it.

Are there commonalities in Website Technology?

First, I checked the websites of those that had been breached, which might reveal some commonalities. Bear in mind, it’s possible that the websites weren’t how the information was accessed.

TSTT, which had the most noteworthy breach, runs Wix – which was quite a surprise if only because of the vendor lock-in associated with it. I was expecting a more commonly used content management system but instead, Wix.

The Office of the Attorney General’s website, attacked earlier this year and probably the 2nd most important breach overall since it paralyzed the Judiciary is using WordPress. It also is actually not the first time; a teen was charged in 2007 for hacking into the Attorney General’s Office.

MassyStorestt.com also runs WordPress, but is substantially behind in upgrades. Pricesmart.com runs mostly BloomReach and a bit of Drupal. Their breach was reported yesterday.

It’s apparent that this isn’t an issue of common platforms being compromised. Yet there is a hint in here. MassyStoresTT.com being substantially behind in WordPress updates.

Maintenance

When I was heavily into developing CMS websites, I tried doing that locally in Trinidad and Tobago and found that people thought they could just buy a website and it would simply be done and they could go about their business without maintenance contracts. It simply doesn’t work that way.

Maybe even after years, that hasn’t changed. Maybe these websites aren’t being maintained and kept up to date with technology, which includes patching for exploits that allow their data to be breached or otherwise attacked. Maybe.

Personally, with my experience in dealing with local companies and government offices, I don’t see them seeing maintenance as a priority. In fact, I didn’t do business with companies in Trinidad and Tobago for that same reason because… I didn’t want my name associated with poorly maintained sites.

Is this the only conclusion? Definitely not.

Who Has Access Anyway?

Everyone talks about the breaches, but the public always assumes that the people with access to the information had a reason to access the information. In the TSTT data breach, scanned copies of people’s identification were found and I have to wonder what TSTT’s information policy is. Who needs access to that level of information, and why?

I’d be surprised if it were available through the website because that would be just asking for trouble.

Assuming they themselves can be trusted with your personal information, there’s social engineering, which the video below explains…

We forget at times that the people with access to information themselves are open to attack to get to something bigger. Maybe their own computer systems they use to access the data are compromised, maybe they’ve been compromised.
Conclusions

Again, I’m no security expert. Some of the information available from these breaches and the way attacks happened on some websites was clearly associated with the websites themselves. TSTT’s data breach seems different in that regard because no sane company would have that information accessible through their website.

Altogether, it seems like a lack of maintenance for most of these breaches – and maybe there were deeper issues with all of them, but in particular the TSTT data breach.

What is most disturbing is that these are the breaches we’re worried about, which could be a fraction of the number of breaches that happened. The announced breaches we found out about because either someone showed evidence or it created an issue that impacted products and services.

The insidious breaches, the ones where people simply mine the information and don’t get caught or brag, we don’t know about. That’s what concerns me most.

We should be worried.

About the author

Taran Rampersad

Taran Rampersad has over three decades of experience working with technology, the majority of which was as a software engineer.

He is a published author on virtual worlds and was part of the team of writers at WorldChanging.com that won the Utne Award and an outspoken advocate of simplifying processes and bending technology’s use to society’s needs.

His volunteer work related to technology and disasters has been mentioned by the media (BBC), and is one of the plank-owners of combining culture with ICT in the Caribbean (ICT) through CARDICIS and has volunteered time towards those ends.

As an amateur photographer, he has been published in educational books, magazines, websites and NASA’s ‘Sensing The Planet’. These days, he’s focusing more on his writing and technology experiments. Feel free to contact him through Facebook Messenger.

Journalism and news monitoring

Journalism and news monitoring

News monitoring platforms are quietly revolutionizing investigative journalism.
Read More
Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
NPICTT and TSTT announce strategic national partnership for digital payments and eKYC

NPICTT and TSTT announce strategic national partnership for digital payments and eKYC

NPICTT now operates as the national payments infrastructure provider, while its Innovation Centre functions as the entry point for certified digital solutions to be rolled out across the public sector.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
Choosing the best KYC verification tool for your business

Choosing the best KYC verification tool for your business

Fraud attempts today are much more advanced with the use of fake IDs. deepfakes, synthetic identities, and account takeovers.
Read More
Media monitoring in today’s information economy

Media monitoring in today’s information economy

Companies must strike a balance between the desire to be enlightened and the need to observe individual rights and social values.
Read More
What Does Your Music Say About You?

What Does Your Music Say About You?

The virality of “musical age” reflects a deeper pattern: algorithms have blurred generational boundaries.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
TSTT, PSA announce Affinity Plan for 16,000 members

TSTT, PSA announce Affinity Plan for 16,000 members

PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
Read More
Vendor screening: Why it matters for compliance, security, and partnership

Vendor screening: Why it matters for compliance, security, and partnership

Current regulatory demands require organizations to maintain constant oversight of vendor operations throughout the entire relationship
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Personalization will be the core of the next tech revolution

Personalization will be the core of the next tech revolution

Personalization is no longer a marketing add-on. It is the backbone of the next technology wave.
Read More
Journalism and news monitoring Journalism and news monitoring
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
NPICTT and TSTT announce strategic national partnership for digital payments and eKYC NPICTT and TSTT announce strategic national...
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
Choosing the best KYC verification tool for your business Choosing the best KYC verification tool...
Media monitoring in today’s information economy Media monitoring in today’s information economy
What Does Your Music Say About You? What Does Your Music Say About...
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
TSTT, PSA announce Affinity Plan for 16,000 members TSTT, PSA announce Affinity Plan for...
Vendor screening: Why it matters for compliance, security, and partnership Vendor screening: Why it matters for...
Old Mac, new OS Old Mac, new OS
Personalization will be the core of the next tech revolution Personalization will be the core of...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedPress Releases

NPICTT and TSTT announce strategic national partnership for digital payments and eKYC

3 Mins read
NPICTT now operates as the national payments infrastructure provider, while its Innovation Centre functions as the entry point for certified digital solutions to be rolled out across the public sector.
Press Releases

TSTT, PSA announce Affinity Plan for 16,000 members

2 Mins read
PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
Press Releases

UTC, TSTT and National Payment Company sign agreement for national e-KYC platform

2 Mins read
It’s scalable, secure, and meets international standards — a strong statement of what our local teams can accomplish
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
2 years ago

[…] Trinidad and Tobago – People continue to ask why there are so many data breaches happening in Trinidad and Tobago. I’m not someone who would call himself a security expert by a stretch, but it’s an intriguing enough question that I decided to look into it… more […]

×
FeaturedNews Briefs

ShopCourts, Pricesmart online data breached

1
0
Share your perspective in the comments!x
()
x