The cybersecurity issues have gained renewed importance since the pandemic of the new SARS-CoV-2 virus causing COVID-19 disease has caused significant numbers of people to be working remotely through so-called âteleworkingâ. This situation has brought new threats to the work environment that threaten the security of information and internal processes of companies and organizations.
In the wake of the pandemic, cyber-attacks such as phishing, identity theft, social engineering, e-mail spoofing and the common and well-known ransomware, by cyber criminals have increased significantly, with a 140% increase worldwide. It is everyoneâs responsibility to be alert to this reality, which can affect both companies and individuals.
Below, we will reflect on relevant aspects in Panama on this important topic. We will try to give a general overview of aspects such as legislation, strategies, among others.
Overview of Cybersecurity in Panama
The first important step that Panama took as a country was the creation in 2011, through Executive Decree No. 709, of the âCSIRT PANAMAâ (Computer Security Incident Response Team), National Response Team to Information Security Incidents of the Panamanian State, which is responsible for investigations related to incidents affecting the security of computer and communication systems of State entities.
The National Strategy for Cybernetic Security and Critical Infrastructure Protection was later approved by Resolution No. 21 of 2013 of the National Council for Government Innovation. This document, issued by the National Authority for Government Innovation, describes the different risks faced by Panama in the use of Information and Communication Technologies (ICT).
The pillars of the strategy are:
Panama is a signatory to the 2001 Budapest Convention on Cybercrime, approved by Law No. 79 of 2013. This law refers to the convention on cyber-crime, terminologies, measures to be adopted at the national level, computer crimes, crimes related to child pornography, crimes related to infringements of intellectual property and related rights, among others.
The Criminal Code of the Republic of Panama in its Title VIII, on crimes against the âLegal Security of Electronic Mediaâ categorizes crimes against computer security. Articles 289 through 292 establish the following crimes and their penalties: improperly access or use of a database, network, or computer system, and anyone who improperly appropriates, copies, uses, or modifies the data in transit or contained in a database or computer system, or interferes with, intercepts, obstructs, or prevents its transmission. Aggravating circumstances are also determined that increase the prison sentences.
We would like to take this opportunity to express our opinion on the need to develop legislation on this subject. Given the advance of technology, the aggressiveness and expertise of cyber-criminals, the two types of criminal offences mentioned above are highly insufficient. We need to update our laws to comply with the commitments made when we signed the Budapest Convention.
It is essential to remember that it is a serious mistake to assume that âthis is not going to happen to meâ. The threats to cyber security are real. In this digital age, individuals, small businesses, large companies and even governments are exposed to becoming victims of cyber-criminals. They face the threat of a breach or hacking of technological environments or data storage systems, through the use of ramsomware-based techniques, data breaches, malware, among others. Todayâs cyber-criminals act in an organized manner in criminal networks known as the âDark Webâ. Therefore, it is extremely important to establish all possible security measures to avoid being the victim of an attack by cyber-criminals as much as possible.
The most common attempts of breach come by impersonation and are sent through emails. For that reason, we make the following recommendations that will work in your job environment whether you are in an office or teleworking.
Be vigilant, attentive, and observant. Make a good habit of checking and evaluating very carefully the appearance, information, and even spelling or unusual data that may be brought in by an email asking to open an attachment or a password validation.
It is not safe to open any type of communication that raises doubts. There is an attack called email spoofing that impersonates known domains. Even if you are dealing with a known domain, you must be very perceptive of what the message is saying.
Criminals have the technical ability to generate communications through any domain, even public ones, and from there anyone downloading the attachment can give entry to the virus, or electronic forms where you are asked for your passwords, so never give out passwords by email, or by phone, validate immediately with your technology advisor.
The recommendations for corporate environments are broad, however, we outline general recommendations for Directors, Managers or CTOs of companies below.
Assess and implement a methodology that allows the organization to generate guidelines to protect its information and anticipate unexpected events. The steps to implement this methodology are:
Mario Preciado
Junior Associate