FeaturedOpinion

What does the TSTT breach mean for customers?

2 Mins read

Above: Rishi Maharaj.

Data protection consultant Rishi Maharaj on the TSTT Breach

From a Data Protection standpoint (which we don’t have but other countries in the region have adopted) there are several areas of concern.

Timing of the Disclosure: TSTT mentions that they became aware of the cyber-attack on October 9th, 2023. The gap between the attack and public disclosure appears to be significant, which could be concerning under Data Protection principles, especially as people’s personal data was comprised. From a data Protection perspective, reports should be made to a regulator within a specific time frame, namely 3 to 5 days and individuals must be informed, but alas we have no laws that place these requirements on companies here.

Nature of the Data: The breach reportedly includes customer lines, ID scans, and database dumps. ID scans can be considered as sensitive data, and its exfiltration poses significant risks for identity theft and fraud.

Assertion of ‘No Loss or Compromise’: TSTT states that there was “no loss or compromise of customer data”. However, considering the purported evidence available on the dark web, this claim may appear to contradict the presented data by RansomEXX. Under Data Protection best practice, transparency and accuracy in communication are critical.

Data Volumes and Relevance: TSTT points out that its platforms generate terabytes of data, possibly attempting to downplay the significance of the purported 6GB of exfiltrated data. While this might be accurate in the context of total data volume, GDPR focuses on the quality and sensitivity of data, not quantity. The sheer number of affected customers and the types of data involved make this breach significant.

In light of the recent cyber-attack on TSTT, their statement raises several concerns from a Data Protection perspective. The delayed disclosure, and the apparent contradiction between their claims and evidence presented by the hackers are alarming.

While TSTT’s proactive response in securing their systems is commendable, the nature of the data involved—especially the ID scans—poses a significant risk.

TSTT’s emphasis on the vast amounts of data they handle might be an attempt to downplay the breach’s gravity. However, from a Data Protection standpoint, it’s not the volume but the sensitivity and relevance of the data that counts. The situation underscores the need for transparent, accurate, and prompt communication in the face of security breaches.

Again, it places the need for revised legislation not only from a Data Protection perspective but also a cyber crime perspective to provide for an independent regulator and also to empower TT CSIRT with the ability to independently act and ensure accuracy and timely release of information and investigations and also to hold companies honest and accountable.

About Rishi Maharaj

Rishi Maharaj is a graduate of the University of the West Indies with a BSc. and MSc. in Government. He is a Certified Information Privacy Manager and provides consultancies through Privicy Advisory Services which assists organizations through data expansion and digital transformation, emphasizing the reduction of compliance burdens.

With over 15 years in the public and privacy sectors, he offers deep insights into government workings and the challenges of digital transformation. Notably, Rishi spearheaded the finalization and partial proclamation of Trinidad and Tobago’s Data Protection Act in 2011 and contributed to international model data protection legislation.

In the private sector, he helps businesses to align with GDPR and regional data protection standards, using compliance as a unique differentiator to boost organizational value and foster trust and engagement. He is a member of both the Canadian Institute of Access and Privacy Professionals and the International Association of Privacy Professionals.

Related Posts…

Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
Choosing the best KYC verification tool for your business

Choosing the best KYC verification tool for your business

Fraud attempts today are much more advanced with the use of fake IDs. deepfakes, synthetic identities, and account takeovers.
Read More
Media monitoring in today’s information economy

Media monitoring in today’s information economy

Companies must strike a balance between the desire to be enlightened and the need to observe individual rights and social values.
Read More
What Does Your Music Say About You?

What Does Your Music Say About You?

The virality of “musical age” reflects a deeper pattern: algorithms have blurred generational boundaries.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
TSTT, PSA announce Affinity Plan for 16,000 members

TSTT, PSA announce Affinity Plan for 16,000 members

PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
Read More
Vendor screening: Why it matters for compliance, security, and partnership

Vendor screening: Why it matters for compliance, security, and partnership

Current regulatory demands require organizations to maintain constant oversight of vendor operations throughout the entire relationship
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Personalization will be the core of the next tech revolution

Personalization will be the core of the next tech revolution

Personalization is no longer a marketing add-on. It is the backbone of the next technology wave.
Read More
WiDay 2025 – WiPay’s five-pillar ecosystem

WiDay 2025 – WiPay’s five-pillar ecosystem

Wayne underscored WiPay’s role in bringing the unbanked online through a cash-to-digital voucher network.
Read More
Digital New Year’s resolutions Digital New Year’s resolutions
Choosing the best KYC verification tool for your business Choosing the best KYC verification tool...
Media monitoring in today’s information economy Media monitoring in today’s information economy
What Does Your Music Say About You? What Does Your Music Say About...
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
TSTT, PSA announce Affinity Plan for 16,000 members TSTT, PSA announce Affinity Plan for...
Vendor screening: Why it matters for compliance, security, and partnership Vendor screening: Why it matters for...
Old Mac, new OS Old Mac, new OS
Personalization will be the core of the next tech revolution Personalization will be the core of...
WiDay 2025 – WiPay’s five-pillar ecosystem WiDay 2025 – WiPay’s five-pillar ecosystem

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

TSTT, PSA announce Affinity Plan for 16,000 members

2 Mins read
PSA members have access to bundles that combine mobile, broadband internet, TV/landline, and home security services at discounted rates.
Press Releases

UTC, TSTT and National Payment Company sign agreement for national e-KYC platform

2 Mins read
It’s scalable, secure, and meets international standards — a strong statement of what our local teams can accomplish
BitDepthFeatured

Caribbean cryptocurrency concerns

3 Mins read
In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
2 years ago

[…] Trinidad and Tobago – From a Data Protection standpoint (which we don’t have but other countries in the region have adopted) there are several areas of concern… more […]

trackback
2 years ago

[…] writing at Tech News T&T was data protection consultant Rishi Maharaj, who expressed concerns about the timing of the data […]

×
FeaturedNews Briefs

Updated: TSTT reported hacked by RansomEXX exploit

2
0
Share your perspective in the comments!x
()
x