BitDepthFeatured

Cybersecurity must be driven from the top

4 Mins read

Above: Illustration by ArtemisDiana/Depositphotos

BitDepth#1415 for July 17, 2023

Leading the June 29 panel discussion on building a security minded culture at the AMCHAM Tech Hub Islands Summit, Bryan Kane, Innovation Director for Digicel Business, offered a provocative question.

Putting two links to a Digicel website up on a slide; he asked a room of experts which was the fake.

Kane was demonstrating a homoglyph domain used in phishing, which disguises the real URL by using a letter from another language in the domain name.

The “L” in Digicel was a letter in another language that appeared identical to the Latin character set.

Microsoft analysed 1,700 homoglyph domains between January and July 2022 and discovered that 170 techniques were used to disguise URLs, but seven per cent of domains used just 14 techniques.

Quick tip. Hovering your cursor over a text URL on most modern operating systems will reveal the actual link you will be directed to.

“Seventy per cent of attacks are the result of human error or misunderstanding,” Kane said. “People are the major culprits in cybersecurity lapses.”

“I want you to remember that every single day within your organisations, your people, your citizens, your employees, your users, are having to deal with all these things, all the time. So they’re receiving emails, Teams messages, SMS messages. How do they know what’s real and what’s not?”

Vitra Gopee.

The consequences can be dire. Vitra Gopee, moderator for the panel discussion, noted that according to IBM, it takes an average of 197 days to identify a security breach and 69 days to contain it.

Factor in the months that can be lost trying to reconstruct lost business records and the cost of cybersecurity prevention begins to look much less expensive.

“I work with a lot of customers throughout the region and there is there is a gap between the board and CEO and cybersecurity,” said Stephen Juteram, VP for Sales at Hitatchi.

“What we’ve seen happen is that organisations are taking strategic decisions for digital transformation and in many cases, cybersecurity is an afterthought.”

“We’ve started to see more chief information security officers being hired to be that person at the C-Suite level, making sure that security and privacy are embedded by design into the projects from day one.”

“Some businesses can’t justify having a full time CIO, so organisations have been offering those services to give boards support in making those decisions.”

“CEOs are responsible for cybersecurity,” agreed Kane.

“When a board of directors hires a CEO [cybersecurity] needs to be an interview question during that stage. Because when you think about it, CEO’s can be fired for [the consequences of] a cyberattack. Now it’s a boardroom conversation.”

But Kane also advocates a company-wide response to the growing cybersecurity threat.

“To build a cybersecurity minded culture, it’s really all about education. Teach everybody everything. From the CEO, all the way down to every individual user within the organisation. Everybody needs to understand why they’re part of the problem and how they can be part of the solution. Don’t leave any gaps. The CEO or the CIO is responsible for how this happens.”

Bryan Kane.

“People are causing the problem, but people are also the solution to the problem. [It can be] very hard to get them understand that and get into that cybersecurity mindset.”

“When you can’t get the people to guide the organisation, it becomes very difficult to manage things, to decide how to do things, how to implement, what to buy, how to buy it.”

The cybersecurity challenge is only going to grow as artificial intelligence begins to power tools. AI doesn’t need nap-time or breaks or vacations, Kane warned.

“It just keeps going until it finds a way into the organisation, and then it passes that [access] on to a hacker.”

“AI can bring 24 -7 [response] visibility, it brings you to that point where you’re able to collect information, analyse it in real time, you’re able to isolate and you’re able to repair and remediate.”

“[Let’s say that] Brian logs on to his laptop in Trinidad and then 20 minutes later, he logs on to his laptop in Poland. That sort of behaviour is not normal. AI can now detect this and help you to isolate Brian off the network, protect everybody else while we’re dealing with Brian. Brian’s a nuisance.”

Kane warns that spending money on cybersecurity doesn’t improve safety.

“There are companies who spend hundreds of millions on cybersecurity, but they still get breached every single year, so it’s really about how cleverly you implement it, who’s watching in real time, what are you doing every single day of the week?”

“Are we missing some of the alerts that are coming in every single day? Are we catching everything and filtering correctly?”

The most important thing is to make a start and make it a good beginning.
“Stay vigilant.” Kane warned. “Don’t allow them even an inch into your infrastructure. Do not give them any opportunity to get in. “

“Always look for new ways to protect yourselves. Always be training your staff. Be vigilant when they’re following the frameworks that you’ve laid out for them.”

“And it’s simple things. You know the password policy? Nope? If you don’t change a password, you’re off the network. Be diligent about it. Be strict about it.”

“I believe in execution, I believe in beginning, I believe in starting something, even if it is just the basics. Even if it’s just the training and the endpoint protection with just those two things alone, you can reduce your attack surface by up to 85 per cent.”

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

Digicel will spend $20 million on its network, retires 2G on December 31

2 Mins read
DigicelTT is improving the backbone of its network to optimize its performance. This includes moving important fibre lines underground.
Press Releases

Garvin Medera returns to Digicel

1 Mins read
“This is where I first learned the true weight of connecting people, not just through technology, but through service.”
Press Releases

Digicel Business offers free Dark Web scan to businesses

2 Mins read
At Digicel Business, we are committed to empowering organizations to stay resilient, protect their data, while continuing to operate safely
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

Strengthening cybersecurity for your business

1
0
Share your perspective in the comments!x
()
x