BitDepthFeatured

An apathy of cybersecurity concerns

4 Mins read

Above: Photo by gorodenkoff/123rf.com

BitDepth#1467 for July 15, 2024

For just over a month, the website of the Guyana Cricket Board has been quite visibly defaced by hackers who demanded US$1,000 in BitCoin.

The defacement took the form of a warning and demand, stating partly, “Your company was hacked due to major security issues and your documents, contracts, work correspondence ended up in our possession, we would love to forget this incident but we cannot, so your business partners should not suffer because of your negligence to security.”

It’s kind of weird when a definitive statement about the importance of cybersecurity comes from the people who broke into your digital house.

I’ve been trying to understand the studious calm that’s followed the TSTT breach. What collective noun to describe an industry wide gathering of potential victims ardently burrowing for good soil to stick their heads into.

So I’ve decided on apathy, as in an apathy of cybersecurity concerns.
Consider the Blue Waters breach in December 2023, which dropped 10GB of that company’s data on the dark web.

The circle of individuals affected by the public distribution of personally identifiable information in that breach was significantly smaller than hundreds of thousands affected by the TSTT data breach, so there was little cause for public concern.

Almost nobody would have been concerned about Mrs Hadeed’s company-related Amazon purchases or the appalling salary of the company’s lone IT employee, but Blue Waters should have been concerned, because what got dumped on the dark web in that breach was a financial and organisational blueprint of how the company does business.

If a competitor decided to create a rival company, say, Black and Blue Waters, they had a ready-made roadmap, from raw materials acquisition to distribution systems to work from.

And that’s probably one of the reasons why the government has sensibly decided to incentivise a national hardening of the TT digital presence through a tax allowance of $500,000.

In an amendment to the Corporation Tax Act in December, the government further clarified that the allowance would cover cybersecurity investments between January 01, 2024 and December 31, 2025 up to a maximum of $500,000 over the two year access window.

iGovTT’s Charles Bobb-Semple

The allowance is a deduction on chargeable taxes allowable over the two-year period, and qualifying businesses can file multiple claims during that window of opportunity.

According to iGovTT, since the announcement was made, the agency has fielded questions from accountants responsible for the tax returns of multiple large business clients and questions from smaller businesses seeking a better understanding of how the allowance applies to them.

At a TTMA webinar on Tuesday, Charles Bobb-Semple, Deputy CEO of iGovTT explained other caveats.

Companies must be in full compliance with the Registrar General’s office and other necessities of doing business in TT to be eligible for the facility, and successful companies may be audited to ensure that the purchased products are actually deployed.

The facility does not cover services offered by individuals; so penetration testing is not covered. Products should meet international standards.

“Our focus is not on the product or the brand, it is not on who the vendor is,” explained Bobb-Semple.

“Does the thing that you’re purchasing abide by certain international standards? The spirit of the allowance is to defend the [cybersecurity] posture of the country.”

The CITA application process, from Mr Bobb-Semple’s TTMA presentation.

Regarding future incentives for improving cybersecurity, he said, “I am certain that the Minister of Finance and Minister of Digital Transformation will look at this as we progress, but I think what will encourage government is our uptake. So I’m really encouraging you to utilise it as much as possible.”

“The preferred position is implementation, so the overall posture that we have on the security side in terms of the software and infrastructure is really focused on retaliation against bad actors.”

“We want businesses to think about this the same way they plan for disaster preparedness,” said Nicole Greene, team lead for corporate communications at iGovTT in an interview.

“You want to plan and prepare in advance to reduce the impact of potential threats and have the fastest return to normalcy should the unthinkable happen.”

“Some don’t quite understand what constitutes a cybersecurity investment for a business of their size, or for their particular business. It’s not a practical thing for them.”

Still, there is a clear reluctance by iGovTT to offer even anonymised numbers of applicants for a programme that’s six months into a 24-month window of opportunity, even a month after the official application portal has been opened for a government-funded tax break worth half a million dollars.

iGovTT’s Nicole Greene

It might just be early days for a country that loves its last minute rush but what if it isn’t?

“I don’t think people are even bothered much anymore,” said Shiva Parasram, an enterprise risk consultant specialising in cybersecurity and ransomware exposure.

“People don’t seem to care unless it affects services or their finances directly. As more people realise that these things happen globally, they’re not too bothered as long as it doesn’t affect them. [Companies seem to think], we have no legislation, so why are we bothering?”

“I think that’s the gist of things. They will just use it to their advantage and say, well, we did have a firewall, we tried our best, but you know these clever hackers; they have certain ways to get things done.”

“Cybersecurity is big money. When you look at the economy and forex [availability], you have many barriers out there.”

Why cash is king in Trinidad and Tobago

Why cash is king in Trinidad and Tobago

In 2017, 16 per cent of users owned a credit card, a figure that dropped to 15 per cent by 2023.
Read More
I shopped at Temu!

I shopped at Temu!

Temu is great fun to explore and offers many bargains but product quality can be wildly variable.
Read More
What’s needed to make e-Governance happen?

What’s needed to make e-Governance happen?

“If we look at successful governments that have achieved a certain level in of success in these programs, some things stand out."
Read More
Changing the education conversation

Changing the education conversation

There are local schools that aspire to continuous improvement and others that struggle to make it through a working day without bloodshed.
Read More
Practical steps to reducing cybersecurity risks

Practical steps to reducing cybersecurity risks

The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Read More
The consequences of careless code

The consequences of careless code

The cruel reality of Crowdstrike is that it wasn't a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
Read More
What leaders are doing to enable digital transformation

What leaders are doing to enable digital transformation

If people in your organisation are coming to you, telling you we need to change these things, you really should listen.
Read More
Apple’s photography workflow

Apple’s photography workflow

Every Apple device has a Photos database and every image that's taken with a mobile iOS device or imported into the desktop Photos app gets added to it.
Read More
An apathy of cybersecurity concerns

An apathy of cybersecurity concerns

It's weird when a definitive statement about the importance of cybersecurity comes from the people who broke into your digital house.
Read More
Putting data to work to improve perception

Putting data to work to improve perception

When it comes to the data, the numbers are there, but it also has to work alongside your goals.
Read More
The state of TT broadband, 2024

The state of TT broadband, 2024

In 2022, mobile internet penetration it had risen to 62.9 per 100 citizens, almost twice the penetration rate of fixed wireless.
Read More
Apple’s plan for device domination

Apple’s plan for device domination

Siri, at 13, gets an upgrade with Apple Intelligence, promising a significant upgrade on Siri’s smarts in a small language model that functions on device.
Read More
Adobe’s terms of disservice

Adobe’s terms of disservice

The activation servers for Adobe's CS, CS2 and CS3 products were shut down between 2013 and 2017. In May last year, Adobe stopped its customer support from deactivating perpetual licenses...
Read More
Going virtual with medical diagnosis

Going virtual with medical diagnosis

In developing its own OMNI artificial intelligence agent, Patient Connect is training the large language model locally on selected resources, including information from NGOs and care providers.
Read More
How the police became a media outlet

How the police became a media outlet

Former CoP Gary Griffith authorised an increase in the unit from four officers to 23 emphasising a direct engagement with the public using social media, with an emphasis on Facebook.
Read More
Microsoft ARMs up

Microsoft ARMs up

Since the company was founded, its OS and apps have been almost exclusively coded for chips manufactured by Intel.
Read More
Flexxon introduces silicon-level cybersecurity protection to TT

Flexxon introduces silicon-level cybersecurity protection to TT

Flexon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change...
Read More
Will the iPad Pro humble the Mac Pro?

Will the iPad Pro humble the Mac Pro?

A premium configuration of the M4 iPad Pro, which is clearly being positioned as a laptop replacement, costs US$2,700.
Read More
Question Mark’s Baptiste founds creative group, plans arts magazine

Question Mark’s Baptiste founds creative group, plans arts magazine

There are no real publications that speak to who we are as creatives, who we are in the world and really takes advantage of the IP [we create]
Read More
Post News is dead

Post News is dead

"At the end of the day, our service is not growing fast enough to become a real business or a significant platform."
Read More
Why cash is king in Trinidad and Tobago Why cash is king in Trinidad...
I shopped at Temu! I shopped at Temu!
What’s needed to make e-Governance happen? What’s needed to make e-Governance happen?
Changing the education conversation Changing the education conversation
Practical steps to reducing cybersecurity risks Practical steps to reducing cybersecurity risks
The consequences of careless code The consequences of careless code
What leaders are doing to enable digital transformation What leaders are doing to enable...
Apple’s photography workflow Apple’s photography workflow
An apathy of cybersecurity concerns An apathy of cybersecurity concerns
Putting data to work to improve perception Putting data to work to improve...
The state of TT broadband, 2024 The state of TT broadband, 2024
Apple’s plan for device domination Apple’s plan for device domination
Adobe’s terms of disservice Adobe’s terms of disservice
Going virtual with medical diagnosis Going virtual with medical diagnosis
How the police became a media outlet How the police became a media...
Microsoft ARMs up Microsoft ARMs up
Flexxon introduces silicon-level cybersecurity protection to TT Flexxon introduces silicon-level cybersecurity protection to...
Will the iPad Pro humble the Mac Pro? Will the iPad Pro humble the...
Question Mark’s Baptiste founds creative group, plans arts magazine Question Mark’s Baptiste founds creative group,...
Post News is dead Post News is dead

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Practical steps to reducing cybersecurity risks

4 Mins read
The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
BitDepthFeatured

The consequences of careless code

5 Mins read
The cruel reality of Crowdstrike is that it wasn’t a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
FeaturedNews Briefs

The Crowdstrike bug's minimal impact on TT

2 Mins read
In statements, the Crowdstrike emphasised that the problem originated in a content update and was not a cyberattack or security breach.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Richard Hamel-Smith
Richard Hamel-Smith
2 months ago

Dear Mark,

Yes, we are pathetic!

Without legislation to make companies liable for data loss, no one in T&T is going to take this seriously.

I’ve had the experience of going with the managing director of a company to the Fraud Squad to make a report on an email attempt to defraud that company of US$290,000.00. The detective in the Fraud Squad scribbled notes on a yellow notepad while the only computer in the room stood in a corner, turned off and ignored.

I’m pretty sure those scribblings ended up in File 13.

But the thing that shocked me was, that as we were leaving, about to cross the road, I suggested to the managing director that, perhaps now would be a good time to review our IT security policy, which was dismissed with, “Nah, you just do whatever you feel is ok”.

Unless and until data privacy is a constitutional right of citizens of T&T, and both government and the private sector are criminally liable, nothing will change. I’ve been involved in IT for over 40 years and have yet to see any company (except to be fair, Amalgated Security) take any interest in this area.

People think computers are entertainment and not to be taken seriously. Company directors, when they think about IT at all, consider it an annoyance, not a benefit. They treat it like the plumbing, ignored until it breaks, spewing confusion all over the place.

We need legislation with teeth now! Where is the blessed Data Ombudsman we were promised?

trackback
1 month ago

[…] Caribbean – For just over a month, the website of the Guyana Cricket Board has been quite visibly defaced by hackers who demanded US$1,000 in BitCoin… more […]

×
BitDepthFeatured

Ransomware report reveals Caricom-wide attacks

2
0
Share your perspective in the comments!x
()
x