Government of the Republic of Trinidad and Tobago
gov.tt

Securing the Nation's Digital Infrastructure

The State Of Industrial Cybersecurity 2017

The need to secure industrial control systems (ICS) from the risk of cyber-attacks cannot be underestimated in a world where human error, online criminal activity and espionage are very real threats to businesses. The potential damage from cybersecurity incidents can be considerable. The consequences of these incidents are often far greater than the associated financial …

Moving Forward With Cybersecurity And Privacy 2017

Designing and implementing a cybersecurity and privacy program is challenging enough, but the work doesn’t stop there. Once a program is in place, disparate components must be thoroughly integrated, professionally managed and continuously improved. The “Moving Forward With Cybersecurity And Privacy Report 2017” can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/pwc.pdf

A Parental Guide To Social Networking Sites

By studying the five lessons in this McAfee e-guide, you’ll gain an understanding of social networking websites. The more you know, the better you’ll be able to educate your children and the safer they’ll be. The “McAfee: A Parental Guide To Social Networking Sites” Guide can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/childsocialsafety.pdf

How To Identify And Recover Your Hacked Snapchat Account

Snapchat account getting hacked isn’t uncommon. There are various websites that claim to offer services to hack Snapchat accounts. Additionally, there are many phishing websites that claim to offer awesome features if you login with your Snapchat account details and then they hack your account. Plus, Snapchat now lets you send payments to other people …

CISCO Cybersecurity Report 2017

The Cisco 2017 Cybersecurity Report presents additional findings from Cisco’s latest Security Capabilities Benchmark Study. Industry experts from Cisco offer recommendations on how these businesses can improve their security posture, including using services to bridge knowledge and talent gaps, reducing complexity in their IT environment, and embracing automation. This report can be downloaded via the …

Symantec Internet Security Report 2017

While ransomware and financial fraud groups continue to pose the biggest threat to end users, other threats are beginning to emerge. It was only a matter of time before attacks on IoT devices began to gain momentum, and 2016 saw the first major incident with the emergence of Mirai, a botnet composed of IoT devices …

ITU Global Cybersecurity Index Report 2017

The Global Cybersecurity Index Report 2017 is a survey that measures the commitment of Member States to cybersecurity in order to raise awareness. This report can be obtained through the TTCSIRT Website at http://ttcsirt.gov.tt/documents/gci2017.pdf

Symantec Internet Security Threat Report 2016

Symantec’a Internet Security Threat Report 2016 examines multiple facets including targeted attacks, smartphone threats, social media scams, and Internet of Things (IoT) vulnerabilities, as well as attackers’ tactics, motivations, and behaviors. This report can be obtained through the TTCSIRT Website at http://ttcsirt.gov.tt/documents/symantec2016.pdf

How To Recover A Hacked LinkedIn Account

If someone has hacked into your linkedin account, that means they have your password. Immediately change this so you can regain control. For further information on what to do if your LinkedIn Account has been compromised, please read the TTCSIRT Article entitled How To Recover A Hacked LinkedIn Account

Protect Your Privacy On Social Media

Let’s be honest, there are many reasons for being on social media: To see what your friends are doing, keeping up with news and sharing our opinions, getting fashion ideas and artistic inspirations or to share your vacation photos with your family. However, you need to take precautions to protect your privacy online against the …