SlideShare a Scribd company logo
1 of 4
Download to read offline
The Leaders in privacy protection
CALL OUR TEAM TODAY TO GET A FREE QUOTATION
1800 008 726
www.thebugsweepers.com.au
ARE YOU BEING HARASSED?
ARE YOU A VICTIM OF IDENTITY THEFT?
IS YOUR BUSINESS LEAKING INFORMATION?
ARE YOU BEING FOLLOWED?	
DO YOU WANT PEACE OF MIND THAT YOUR BUSINESS AND PRIVATE
LIFE IS SECURE AND CONFIDENTIAL?
Protecting your privacy in your home, car or business from data theft and corporate espionage
WHAT ARE THE WARNING SIGNS IF YOU MAY BE BEING SPIED ON RIGHT NOW?
THIS JUST HAPPENED:
1.	 Your confidential or sensitive information is now in the media
2.	 You received an office gift from someone you don’t trust
3.	 Your private pictures have been posted in a public forum
4.	 You are being blackmailed
5.	 Your business marketing plans are now common knowledge in your industry
6.	 You lost a client recently and didn’t see it coming
7.	 An employee left without giving notice
8.	 Your competition is hiring your former staff
9.	 There is a lot of dust from the ceiling or wall brackets fallen to the floor or on the furniture
10.	You have been surprise audited, by the ATO, Workcover, IRC or OSR
11.	You have been outmanoeuvred in trade negotiations
12.	You about to launch a product or service that absolutely must not be interfered with
13.	You have failed to get a better deal from business customers, or wage negotiations with employees.
DANGEROUS BEHAVIOUR:
14.	You have divorce proceedings in action
15.	Employees are gossiping about your profitability details
16.	Friends and associates let slip information that no one should know
17.	Your staff are friends with staff employed by your competitors
18.	You suspect your security manager is incompetent
19.	You suspect your employees may potentially be involved in illegal activities
20.	Staff and associates that you do not trust have access to your sensitive data
21.	No one has checked the telephony IDF board on your floor for over 12 months
22.	No one has checked the Telephony MDF board in your building (all building tenants have access) in over 12 months
23.	You are a party to a legal Will that is currently being contested
24.	You are doing something that government departments may not be too happy about
25.	You are having an affair
THREATS HAPPENING NOW:
1.	 You sense you are being followed, or watched
2.	 Your car has been moved, or your car seat was left in a different position
3.	 You have you lost sensitive information now, and in the past mysteriously
4.	 You keep “Running into” someone you don’t want to
5.	 Your competitors are always one step ahead of you
6.	 You found a mysterious USB card around the workplace; and when checked that
	 data doesn’t make sense; it won’t register on a computer, or another language pops up
	 in the USB’s files e.g. Chinese, Russian.
7.	 The business would get sued if the client’s confidential information were to be released to the 	
	 public domain.
8.	 You found electronics that seem harmless, but you do not know what their function is
	 e.g. computer and phone adaptors?
9.	 Things are not where they were left in your office or home
10.	You will probably lose your job and the business would be liable if a staff member
	 was eavesdropping on other staff in high risk places such as:
	 change rooms, toilets, under desks
11.	You hear strange noises on your desk phone e.g. volume dropping/ swelling
12.	You work from home as well as the office; and have minimal security measures at home
13.	Technical counter surveillance sweeps are not in your security plan
14.	You have people who simply cannot be trusted around your business and extended family
15.	Your insurer has grounds to deny paying any future liability claims from any data theft
	 losses by claiming negligence; due to management not conducting regular TSCM sweeps
16.	You do not have an electronic eavesdropping attack management program
NEW IT SECURITY COMPANY POLICY:
1.	 No USB sticks in the office except those provided by
	 management with Identifiers.
2.	 All company paper must be shredded onsite by the end
	 of the day
3.	 All confidential information must be stored in a designated 		
	 locked storage area
4.	 Passwords must be changed every 4 weeks, with system
	 lock out reminders
5.	 Computers must be set to sleep after 15minutes of inactivity
6.	 Computers must be logged off at all breaks and when away 	
	 from the computer
7.	 No access to personal email, social media or personal
	 phones inside work times or premises
8.	 Staff will be instantly dismissed for using another staff
	 member’s computer, laptop, mobile device, desk phone
	 or mobile phone without permission from their manager
9.	 All employees who are leaving will be closed off from
	 accessing or removing company data once they have left.
10.	Enforce all staff to have a Clear desk at the end of their
	 shift, and lock up all sensitive information
	
NEW JOBS FOR YOUR IT SECURITY SPECIALIST
1.	 Encrypt all sensitive electronic data immediately
2.	 Secure physical and electronic access all your computer
	 network, data and communications
3.	 Install an industrial grade firewall and virus scanner
4.	 Get your computer network to be able to log, monitor
	 and audit employee online activity
5.	 Lock off sensitive data access with limited access to only
	 those who have need of it, by department
	 e.g. accounting/ marketing/ production/ sales
6.	 Have a secure data backup and recovery process offsite
7.	 Create log on and log off hours out of hours restriction.
8.	 Ensure remote registry service is disabled
MOST IMPORTANTLY:
Get your place swept by a competent TSCM technician
to find out if you are being electronically attacked
YOUR MOBILE PHONE:
1.	 You receive strange texts on your phone e.g. “Diverting”
2.	 You mobile phone power drops very quickly
3.	 Your mobile phone is very warm when it has not been in use
4.	 Someone has recently asked to borrow your cell phone
ANTI EAVESDROPPING RECOMMENDATIONS
How to quickly lock down your operation:
1.	 Check backgrounds of all service staff and subcontractors such
	 as cleaners who work unsupervised
2.	 Designate a trusted employee to ensure that all computer
	 terminals are turned on and off at locked master mains power
	 switch at the end of the working day. This will stop terminals
	 being turned on by cleaners etc.
3.	 Buy tougher locks to pick such as KABA MAS
4.	 Think of who is your weakest link that a spy would target as the
	 access manipulation point
	 e.g. loose talk on the phone, messy desk, young, or inexperienced.
5.	 Install an Intruder alarm system with motion detection
	 SMS / email notifications of entry out of hours in high value
	 areas to management
6.	 Put all staff through data safety training, and encourage them
	 to keep an eye out for warning signs, and other staff privacy 		
	 regulation breakages
7.	 Have a risk assessment conducted by a qualified security risk
	 assessor to find any and all gaps in your business’s security, 		
	 and implement the recommendations to close the gaps
8.	 Create a security informed and aware culture in the business
9.	 Immediately respond to negative workers agitation in workplace
10.	Have all staff sign water tight confidentiality contracts written by 		
	 an IP specialist lawyer, and an industrial relations lawyer. 	
	 Include warnings that they will be prosecuted as a matter of
	 company policy if they are caught stealing data
11.	Always switch off all Wi-Fi Routers from master control
WHAT IS TSCM?
TSCM stands for Technical Surveillance
Counter Measures.
TSCM is the systematic physical and electronic
examination of a designated area by properly
trained, qualified and equipped persons in an
attempt to discover electronic eavesdropping
devices, security hazards or security weaknesses.
SERVICES: The Bugsweepers will give you your privacy back
We will scan and eliminate all electronic eavesdropping devices in your:
BUSINESS: 	 HOME:	 VEHICLE GPS:
Board room, offices, risk sensitive areas 	 Home office, Living areas,	 Tracking and Audio/Visual of:
e.g. Research and development, change rooms	 Bedrooms, Hotel rooms	 Cars, Vans, Boats etc.
WHY THE BUGSWEEPERS?
Call our team today to get a FREE QUOTATION to conduct a comprehensive bug sweep of your premises.
The Bugsweepers:
•	 Is a trusted TSCM supplier to Government departments and private industry
•	 Has the world’s best and latest TSCM equipment and training at your disposal
•	 Has over 20 Years security industry experience
•	 Licenced and qualified risk assessor
•	 Assures your confidentiality
•	 Is fully licenced and insured
Like all other forms of physical and electronic security, such as guards, CCTV, and virus scanners:
…..call in professional security measures BEFORE you are attacked.
Find out for sure what’s really going on, and get PEACE OF MIND, Contact:
Charles Carter MBA
P: 1800 008 726
E: charles@thebugsweepers.com.au
W: www.thebugsweepers.com.au
NOTE:
Be sure to call from a different location and phone from the home or business that you suspect may be bugged for a
free assessment and quotation of your specific needs.
All enquiries are treated in the strictest confidence.
Disclaimer: Without advice
This brochure is for informational purposes only. The Bugsweepers accepts no responsibility for the information or action taken from the information presented.
The Bugsweepers………The leaders in privacy protection

More Related Content

What's hot

Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 
7. physical sec
7. physical sec7. physical sec
7. physical sec7wounders
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Information Security
Information SecurityInformation Security
Information Securityhaneefvf1
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 

What's hot (20)

Physical access control
Physical access controlPhysical access control
Physical access control
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Access control
Access controlAccess control
Access control
 
7. physical sec
7. physical sec7. physical sec
7. physical sec
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
03 cia
03 cia03 cia
03 cia
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Viewers also liked

TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3warezjoe
 
TSCM products presentation
TSCM products presentationTSCM products presentation
TSCM products presentationtscm
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscmmjbergstrom
 

Viewers also liked (6)

TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
Importance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To CorporationsImportance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To Corporations
 
TSCM-June15
TSCM-June15TSCM-June15
TSCM-June15
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3
 
TSCM products presentation
TSCM products presentationTSCM products presentation
TSCM products presentation
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscm
 

Similar to The Bug Sweepers TSCM Guide

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeESDS Software Solution Pvt. Ltd
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101Ramon Ray
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limitedoomagoolies
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxbjohn46
 

Similar to The Bug Sweepers TSCM Guide (20)

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
MADS6638
MADS6638MADS6638
MADS6638
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
12 facts about backups
12 facts about backups12 facts about backups
12 facts about backups
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docxSheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
 

The Bug Sweepers TSCM Guide

  • 1. The Leaders in privacy protection CALL OUR TEAM TODAY TO GET A FREE QUOTATION 1800 008 726 www.thebugsweepers.com.au ARE YOU BEING HARASSED? ARE YOU A VICTIM OF IDENTITY THEFT? IS YOUR BUSINESS LEAKING INFORMATION? ARE YOU BEING FOLLOWED? DO YOU WANT PEACE OF MIND THAT YOUR BUSINESS AND PRIVATE LIFE IS SECURE AND CONFIDENTIAL? Protecting your privacy in your home, car or business from data theft and corporate espionage
  • 2. WHAT ARE THE WARNING SIGNS IF YOU MAY BE BEING SPIED ON RIGHT NOW? THIS JUST HAPPENED: 1. Your confidential or sensitive information is now in the media 2. You received an office gift from someone you don’t trust 3. Your private pictures have been posted in a public forum 4. You are being blackmailed 5. Your business marketing plans are now common knowledge in your industry 6. You lost a client recently and didn’t see it coming 7. An employee left without giving notice 8. Your competition is hiring your former staff 9. There is a lot of dust from the ceiling or wall brackets fallen to the floor or on the furniture 10. You have been surprise audited, by the ATO, Workcover, IRC or OSR 11. You have been outmanoeuvred in trade negotiations 12. You about to launch a product or service that absolutely must not be interfered with 13. You have failed to get a better deal from business customers, or wage negotiations with employees. DANGEROUS BEHAVIOUR: 14. You have divorce proceedings in action 15. Employees are gossiping about your profitability details 16. Friends and associates let slip information that no one should know 17. Your staff are friends with staff employed by your competitors 18. You suspect your security manager is incompetent 19. You suspect your employees may potentially be involved in illegal activities 20. Staff and associates that you do not trust have access to your sensitive data 21. No one has checked the telephony IDF board on your floor for over 12 months 22. No one has checked the Telephony MDF board in your building (all building tenants have access) in over 12 months 23. You are a party to a legal Will that is currently being contested 24. You are doing something that government departments may not be too happy about 25. You are having an affair THREATS HAPPENING NOW: 1. You sense you are being followed, or watched 2. Your car has been moved, or your car seat was left in a different position 3. You have you lost sensitive information now, and in the past mysteriously 4. You keep “Running into” someone you don’t want to 5. Your competitors are always one step ahead of you 6. You found a mysterious USB card around the workplace; and when checked that data doesn’t make sense; it won’t register on a computer, or another language pops up in the USB’s files e.g. Chinese, Russian. 7. The business would get sued if the client’s confidential information were to be released to the public domain. 8. You found electronics that seem harmless, but you do not know what their function is e.g. computer and phone adaptors? 9. Things are not where they were left in your office or home 10. You will probably lose your job and the business would be liable if a staff member was eavesdropping on other staff in high risk places such as: change rooms, toilets, under desks 11. You hear strange noises on your desk phone e.g. volume dropping/ swelling 12. You work from home as well as the office; and have minimal security measures at home 13. Technical counter surveillance sweeps are not in your security plan 14. You have people who simply cannot be trusted around your business and extended family 15. Your insurer has grounds to deny paying any future liability claims from any data theft losses by claiming negligence; due to management not conducting regular TSCM sweeps 16. You do not have an electronic eavesdropping attack management program
  • 3. NEW IT SECURITY COMPANY POLICY: 1. No USB sticks in the office except those provided by management with Identifiers. 2. All company paper must be shredded onsite by the end of the day 3. All confidential information must be stored in a designated locked storage area 4. Passwords must be changed every 4 weeks, with system lock out reminders 5. Computers must be set to sleep after 15minutes of inactivity 6. Computers must be logged off at all breaks and when away from the computer 7. No access to personal email, social media or personal phones inside work times or premises 8. Staff will be instantly dismissed for using another staff member’s computer, laptop, mobile device, desk phone or mobile phone without permission from their manager 9. All employees who are leaving will be closed off from accessing or removing company data once they have left. 10. Enforce all staff to have a Clear desk at the end of their shift, and lock up all sensitive information NEW JOBS FOR YOUR IT SECURITY SPECIALIST 1. Encrypt all sensitive electronic data immediately 2. Secure physical and electronic access all your computer network, data and communications 3. Install an industrial grade firewall and virus scanner 4. Get your computer network to be able to log, monitor and audit employee online activity 5. Lock off sensitive data access with limited access to only those who have need of it, by department e.g. accounting/ marketing/ production/ sales 6. Have a secure data backup and recovery process offsite 7. Create log on and log off hours out of hours restriction. 8. Ensure remote registry service is disabled MOST IMPORTANTLY: Get your place swept by a competent TSCM technician to find out if you are being electronically attacked YOUR MOBILE PHONE: 1. You receive strange texts on your phone e.g. “Diverting” 2. You mobile phone power drops very quickly 3. Your mobile phone is very warm when it has not been in use 4. Someone has recently asked to borrow your cell phone ANTI EAVESDROPPING RECOMMENDATIONS How to quickly lock down your operation: 1. Check backgrounds of all service staff and subcontractors such as cleaners who work unsupervised 2. Designate a trusted employee to ensure that all computer terminals are turned on and off at locked master mains power switch at the end of the working day. This will stop terminals being turned on by cleaners etc. 3. Buy tougher locks to pick such as KABA MAS 4. Think of who is your weakest link that a spy would target as the access manipulation point e.g. loose talk on the phone, messy desk, young, or inexperienced. 5. Install an Intruder alarm system with motion detection SMS / email notifications of entry out of hours in high value areas to management 6. Put all staff through data safety training, and encourage them to keep an eye out for warning signs, and other staff privacy regulation breakages 7. Have a risk assessment conducted by a qualified security risk assessor to find any and all gaps in your business’s security, and implement the recommendations to close the gaps 8. Create a security informed and aware culture in the business 9. Immediately respond to negative workers agitation in workplace 10. Have all staff sign water tight confidentiality contracts written by an IP specialist lawyer, and an industrial relations lawyer. Include warnings that they will be prosecuted as a matter of company policy if they are caught stealing data 11. Always switch off all Wi-Fi Routers from master control WHAT IS TSCM? TSCM stands for Technical Surveillance Counter Measures. TSCM is the systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.
  • 4. SERVICES: The Bugsweepers will give you your privacy back We will scan and eliminate all electronic eavesdropping devices in your: BUSINESS: HOME: VEHICLE GPS: Board room, offices, risk sensitive areas Home office, Living areas, Tracking and Audio/Visual of: e.g. Research and development, change rooms Bedrooms, Hotel rooms Cars, Vans, Boats etc. WHY THE BUGSWEEPERS? Call our team today to get a FREE QUOTATION to conduct a comprehensive bug sweep of your premises. The Bugsweepers: • Is a trusted TSCM supplier to Government departments and private industry • Has the world’s best and latest TSCM equipment and training at your disposal • Has over 20 Years security industry experience • Licenced and qualified risk assessor • Assures your confidentiality • Is fully licenced and insured Like all other forms of physical and electronic security, such as guards, CCTV, and virus scanners: …..call in professional security measures BEFORE you are attacked. Find out for sure what’s really going on, and get PEACE OF MIND, Contact: Charles Carter MBA P: 1800 008 726 E: charles@thebugsweepers.com.au W: www.thebugsweepers.com.au NOTE: Be sure to call from a different location and phone from the home or business that you suspect may be bugged for a free assessment and quotation of your specific needs. All enquiries are treated in the strictest confidence. Disclaimer: Without advice This brochure is for informational purposes only. The Bugsweepers accepts no responsibility for the information or action taken from the information presented. The Bugsweepers………The leaders in privacy protection