BitDepthFeatured

Where hackers begin

3 Mins read
  • Hackers exploit vulnerabilities in technology, processes, and human behavior.
  • Government, manufacturers, vendors, and users must collaborate to address cybersecurity challenges.
  • Focus on fundamental security measures like backups, segmentation, antivirus, and firewalls.

Above: Huawei’s Gabriel Nunez. Photo by Mark Lyndersay.

BitDepth#1488 for December 09, 2024

“We realised, in almost every single [digital breach] incident, the first thing is the hack,” said Anthony Peyson, president of the regional chapter of ISC2 on November 30 at the association’s inaugural Scam Defence 2024 seminar.

“You can hack technology. We know about hacking technology where the hacker breaks into systems. You can hack a process. You don’t often find a spotlight on that. And you can hack a human.”

ISC2 is the merciful acronym for the International Information System Security Certification Consortium, a global collaboration of cybersecurity professionals.
The Caribbean chapter was formed earlier in 2024 in the face of the global surge in cyber threats.

According to Peyson, Latin America and the Caribbean have faced 137 billion cyberattacks in the first half of 2024 alone, a 50 per cent rise over the same period in 2023.

The Scam Defence seminar was the first of a planned annual symposium discussing developments in cybersecurity and the changing face of how access to personally identifiable information (PII) from companies and individuals is being engineered.

The regional chapter has determined that the biggest challenge the Caribbean faces is phishing (fake emails and web links) and smishing (fake SMS text messages), both facets of growing sophistication in social engineering techniques.

“We are here to raise awareness, to educate the public and to foster collaboration, we are community,” Peyson said.

Anthony Peyson speaking at the 2024 ISC2 Scam Defence seminar. Photo by Mark Lyndersay.

At stake is the vulnerability of growing digital and intelligent economies to hacker takedowns.

Gabriel Nunez, Huawei’s Cybersecurity and Data Protection Officer for Latin America and the Caribbean believes that economy will grow from US$3.6 trillion in 2020 to $18.8 trillion by 2030.

Nunez saw parallels between how traffic is handled successfully through a collaboration of government and regulators, manufacturers, vendors, users and system architectures that might better protect digital systems.

“Government and regulators develop laws and supervise enforcement, manufacturers produce qualified equipment to international standards, vendors are certified and follow the rules and users comply with laws and rules and avoid known dangers,” Nunez said.

“No one can solve the traffic problem. Alone, they will not solve the traffic problem. We all have to interact.”

The world is moving, though far more slowly than the Internet’s bad actors, toward that kind of collaborative thinking.

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy. Action plans for green development have been released by 151 countries and regions.

All 193 UN member states can contribute to the draft UN Convention against Cybercrime, which includes legal support to support the criminalisation and prosecution of 11 key cybersecurity crimes across all UN nations.

Meanwhile, Caribbean nations can also consider benchmarking against the Global System for Mobile Communications Association’s (GSMA) Network Equipment Security Assurance Scheme (NESAS), which has been widely adopted and the association’s Mobile Cybersecurity Knowledge Base (MCKB), which has been adopted by 13 countries.

From Mr Nunez’ presentation.

Both voluntary standards align with the telecommunications safety standards proposed by the 3rd Generation Partnership Project (3GPP).

There’s no shortage of acronyms and technicalities available in the backroom of technology, but the real challenge facing cybersecurity experts is balancing the need to explain the dangers that users face – both as individuals and on behalf of the companies they work for – with the diligence they need to safely work with internet-connected computers.

The consequences of failure for the region on this critical frontline are dire.

“When we go in and we do a root cause analysis to figure out exactly what happened, what we realize is that it’s very small things that add up all together and lead to a full compromise,” said Anish Bachu, Manager of the TT Cybersecurity Incident Response Team.

Anish Bachu, Manager, TTCSIRT. Photograph by Mark Lyndersay

“So when we’re looking at defending ourselves, the emphasis should be on doing the basics well. We [should] have good backups, good [network] segmentation, antivirus and firewalls in place.”

“As soon as we see (a phishing attempt) on social media, our team acts to have the links they lead to taken down. That’s part of our responsibility right there.”

“Phishing that takes you to a particular site, we act to take that site down as soon as we are aware of it. So even if somebody comes after and clicks on the phishing link, it goes nowhere.”

According to Bachu, there were 52 breaches reported to the TTCSIRT in 2023 and 78 so far in 2024. He estimates that unreported breaches will increase those numbers by 20 per cent.

In addition to greater user awareness, there needs to be clearer reporting lines to action teams like TTCSIRT for the public and more active internal reporting of dubious messages and texts within companies.

Next week, the hacks that keep regional cybersecurity professionals awake at night.

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
FeaturedNews Briefs

Venture Credit Union announces recovery from ransomware attack

2 Mins read
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
Press Releases

iGovTT hosts first two-day cyberdrill

2 Mins read
The core of the event focused on practical skill-building and collaboration.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

Flexxon introduces silicon-level cybersecurity protection to TT

0
Share your perspective in the comments!x
()
x