The report counted 21 confirmed dumps of information to the dark web, but Parasram estimates that twice that number were breached.
A privacy notice to let individuals understand what data is being collected, the legal reasons, retention period, security to protect data and a contact for any questions should have been a starting point for this data collection process.
Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
Every business process, whether it’s managed in-house or hosted in the cloud, still needs to have dedicated ownership to keep accountability where it belongs.
“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches.”
Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
The core of the event focused on practical skill-building and collaboration.
Following two rigourous ISO audits Digicel was successful in achieving re-certification for two key ISO standards.
“Symptai and Digicel have been working in tandem for a number of years now and as a business partner, Digicel has everything you could want for your company.”
Just two per cent of Instagram account holders visit the site on the desktop. It is overwhelmingly a mobile app platform.
Regionally, connecting a small population in a geographically homogeneous island should be relatively simple, but few islands fit that profile.
Do not submit PII to anyone, anywhere, unless you have initiated the contact and are absolutely clear that you are speaking with/logged into/emailing/form-filling in an environment you are certain is secure.

