Sheet1WeaknessViolates a policy or procedureThreatWhat is th.docx
The Bug Sweepers TSCM Guide
1. The Leaders in privacy protection
CALL OUR TEAM TODAY TO GET A FREE QUOTATION
1800 008 726
www.thebugsweepers.com.au
ARE YOU BEING HARASSED?
ARE YOU A VICTIM OF IDENTITY THEFT?
IS YOUR BUSINESS LEAKING INFORMATION?
ARE YOU BEING FOLLOWED?
DO YOU WANT PEACE OF MIND THAT YOUR BUSINESS AND PRIVATE
LIFE IS SECURE AND CONFIDENTIAL?
Protecting your privacy in your home, car or business from data theft and corporate espionage
2. WHAT ARE THE WARNING SIGNS IF YOU MAY BE BEING SPIED ON RIGHT NOW?
THIS JUST HAPPENED:
1. Your confidential or sensitive information is now in the media
2. You received an office gift from someone you don’t trust
3. Your private pictures have been posted in a public forum
4. You are being blackmailed
5. Your business marketing plans are now common knowledge in your industry
6. You lost a client recently and didn’t see it coming
7. An employee left without giving notice
8. Your competition is hiring your former staff
9. There is a lot of dust from the ceiling or wall brackets fallen to the floor or on the furniture
10. You have been surprise audited, by the ATO, Workcover, IRC or OSR
11. You have been outmanoeuvred in trade negotiations
12. You about to launch a product or service that absolutely must not be interfered with
13. You have failed to get a better deal from business customers, or wage negotiations with employees.
DANGEROUS BEHAVIOUR:
14. You have divorce proceedings in action
15. Employees are gossiping about your profitability details
16. Friends and associates let slip information that no one should know
17. Your staff are friends with staff employed by your competitors
18. You suspect your security manager is incompetent
19. You suspect your employees may potentially be involved in illegal activities
20. Staff and associates that you do not trust have access to your sensitive data
21. No one has checked the telephony IDF board on your floor for over 12 months
22. No one has checked the Telephony MDF board in your building (all building tenants have access) in over 12 months
23. You are a party to a legal Will that is currently being contested
24. You are doing something that government departments may not be too happy about
25. You are having an affair
THREATS HAPPENING NOW:
1. You sense you are being followed, or watched
2. Your car has been moved, or your car seat was left in a different position
3. You have you lost sensitive information now, and in the past mysteriously
4. You keep “Running into” someone you don’t want to
5. Your competitors are always one step ahead of you
6. You found a mysterious USB card around the workplace; and when checked that
data doesn’t make sense; it won’t register on a computer, or another language pops up
in the USB’s files e.g. Chinese, Russian.
7. The business would get sued if the client’s confidential information were to be released to the
public domain.
8. You found electronics that seem harmless, but you do not know what their function is
e.g. computer and phone adaptors?
9. Things are not where they were left in your office or home
10. You will probably lose your job and the business would be liable if a staff member
was eavesdropping on other staff in high risk places such as:
change rooms, toilets, under desks
11. You hear strange noises on your desk phone e.g. volume dropping/ swelling
12. You work from home as well as the office; and have minimal security measures at home
13. Technical counter surveillance sweeps are not in your security plan
14. You have people who simply cannot be trusted around your business and extended family
15. Your insurer has grounds to deny paying any future liability claims from any data theft
losses by claiming negligence; due to management not conducting regular TSCM sweeps
16. You do not have an electronic eavesdropping attack management program
3. NEW IT SECURITY COMPANY POLICY:
1. No USB sticks in the office except those provided by
management with Identifiers.
2. All company paper must be shredded onsite by the end
of the day
3. All confidential information must be stored in a designated
locked storage area
4. Passwords must be changed every 4 weeks, with system
lock out reminders
5. Computers must be set to sleep after 15minutes of inactivity
6. Computers must be logged off at all breaks and when away
from the computer
7. No access to personal email, social media or personal
phones inside work times or premises
8. Staff will be instantly dismissed for using another staff
member’s computer, laptop, mobile device, desk phone
or mobile phone without permission from their manager
9. All employees who are leaving will be closed off from
accessing or removing company data once they have left.
10. Enforce all staff to have a Clear desk at the end of their
shift, and lock up all sensitive information
NEW JOBS FOR YOUR IT SECURITY SPECIALIST
1. Encrypt all sensitive electronic data immediately
2. Secure physical and electronic access all your computer
network, data and communications
3. Install an industrial grade firewall and virus scanner
4. Get your computer network to be able to log, monitor
and audit employee online activity
5. Lock off sensitive data access with limited access to only
those who have need of it, by department
e.g. accounting/ marketing/ production/ sales
6. Have a secure data backup and recovery process offsite
7. Create log on and log off hours out of hours restriction.
8. Ensure remote registry service is disabled
MOST IMPORTANTLY:
Get your place swept by a competent TSCM technician
to find out if you are being electronically attacked
YOUR MOBILE PHONE:
1. You receive strange texts on your phone e.g. “Diverting”
2. You mobile phone power drops very quickly
3. Your mobile phone is very warm when it has not been in use
4. Someone has recently asked to borrow your cell phone
ANTI EAVESDROPPING RECOMMENDATIONS
How to quickly lock down your operation:
1. Check backgrounds of all service staff and subcontractors such
as cleaners who work unsupervised
2. Designate a trusted employee to ensure that all computer
terminals are turned on and off at locked master mains power
switch at the end of the working day. This will stop terminals
being turned on by cleaners etc.
3. Buy tougher locks to pick such as KABA MAS
4. Think of who is your weakest link that a spy would target as the
access manipulation point
e.g. loose talk on the phone, messy desk, young, or inexperienced.
5. Install an Intruder alarm system with motion detection
SMS / email notifications of entry out of hours in high value
areas to management
6. Put all staff through data safety training, and encourage them
to keep an eye out for warning signs, and other staff privacy
regulation breakages
7. Have a risk assessment conducted by a qualified security risk
assessor to find any and all gaps in your business’s security,
and implement the recommendations to close the gaps
8. Create a security informed and aware culture in the business
9. Immediately respond to negative workers agitation in workplace
10. Have all staff sign water tight confidentiality contracts written by
an IP specialist lawyer, and an industrial relations lawyer.
Include warnings that they will be prosecuted as a matter of
company policy if they are caught stealing data
11. Always switch off all Wi-Fi Routers from master control
WHAT IS TSCM?
TSCM stands for Technical Surveillance
Counter Measures.
TSCM is the systematic physical and electronic
examination of a designated area by properly
trained, qualified and equipped persons in an
attempt to discover electronic eavesdropping
devices, security hazards or security weaknesses.
4. SERVICES: The Bugsweepers will give you your privacy back
We will scan and eliminate all electronic eavesdropping devices in your:
BUSINESS: HOME: VEHICLE GPS:
Board room, offices, risk sensitive areas Home office, Living areas, Tracking and Audio/Visual of:
e.g. Research and development, change rooms Bedrooms, Hotel rooms Cars, Vans, Boats etc.
WHY THE BUGSWEEPERS?
Call our team today to get a FREE QUOTATION to conduct a comprehensive bug sweep of your premises.
The Bugsweepers:
• Is a trusted TSCM supplier to Government departments and private industry
• Has the world’s best and latest TSCM equipment and training at your disposal
• Has over 20 Years security industry experience
• Licenced and qualified risk assessor
• Assures your confidentiality
• Is fully licenced and insured
Like all other forms of physical and electronic security, such as guards, CCTV, and virus scanners:
…..call in professional security measures BEFORE you are attacked.
Find out for sure what’s really going on, and get PEACE OF MIND, Contact:
Charles Carter MBA
P: 1800 008 726
E: charles@thebugsweepers.com.au
W: www.thebugsweepers.com.au
NOTE:
Be sure to call from a different location and phone from the home or business that you suspect may be bugged for a
free assessment and quotation of your specific needs.
All enquiries are treated in the strictest confidence.
Disclaimer: Without advice
This brochure is for informational purposes only. The Bugsweepers accepts no responsibility for the information or action taken from the information presented.
The Bugsweepers………The leaders in privacy protection