Attorneys for the Law Association of T&T (LATT) have told Chief Justice Ivor Archie’s attorneys he is not above the law and as with all public officials, is subject to public scrutiny.
You are here
Protecting your digital assets
The recent credit card security breach at US retail giant Target affected 70 million customers was a major wake up call to businesses around the world. The incident underscores that the notion of a hacker as some lone, geeky miscreant, tapping away at a keyboard in a darkened room, is now obsolete. The modern cybercriminal is formidable, sophisticated and very well organised.
The shifting frontlines
Data breaches like the one Target suffered are typically conducted by organised crime syndicates or similar groups with high levels of technology savvy, engaging highly-skilled resources from around the world. They present a very real threat to the modern technology-enabled organization – both large and small.
The first line of defense is also no longer simply the individual, as it once was. In today’s cloud-based, digitally-stored-information world consumers no longer "own" their data. Much of the information consumers routinely share with government, banks, insurance companies, businesses and schools, for example, are now stored on many servers they neither see nor control.
The key then is to counter cyber threats with the same level of investment, sophistication and thoughtfulness as the cybercriminals. As clever and well-resourced as they may be, they can be thwarted.
User comments posted on this website are the sole views and opinions of the comment writer and are not representative of Guardian Media Limited or its staff.
Guardian Media Limited accepts no liability and will not be held accountable for user comments.
Guardian Media Limited reserves the right to remove, to edit or to censor any comments.
Any content which is considered unsuitable, unlawful or offensive, includes personal details, advertises or promotes products, services or websites or repeats previous comments will be removed.
User profiles registered through fake social media accounts may be deleted without notice.