SlideShare a Scribd company logo
1 of 1
Download to read offline
Tech Traps




How
safe are
your
secrets?
Hackers, scammers and spammers
can cause mayhem for your
texts, emails and documents
but the greatest risk may come
from the people you trust.
by David Lomas & Joanne Black/
photo by Amos Chapple




F
           or workers at Paragon Investi-     linked to cameras watching them from             unauthorised person can gain access to
           gations head office on Auck-       every angle.                                     its files.
           land’s North Shore, getting           Inside is a sensitive burglar alarm system       Welcome to the world of New Zealand’s
           access requires tapping in a       that, if triggered outside office hours, fills   leading industrial security company.
           key code and putting a finger      the building with a thick smoke-like sub-           For Paragon managing director Ron
into a fingerprint identification device.     stance, reducing visibility to zero and          McQuilter, a former policeman who has
Visitors need to press a buzzer at the main   effectively blinding an intruder. It gives       worked as a private investigator for the
entrance, then speak into an intercom         the company’s security people time to get        past 28 years, security is paramount. “We
linked with surveillance cameras.             to the building before the intruder flees.       cannot tell our clients to trust us with
   Once they pass the first entrance door,       The company’s own computer net-               their secrets if we cannot guarantee we
more cameras follow them as they walk         work is regularly checked. Paragon’s com-        can keep them safe,” he says. “With what
up the stairs to the second entrance          puter forensic team, which undertakes            we do, we know we could be a target
where they are again greeted by a security    much of the security firm’s corporate and        ourselves.”
door with yet another intercom system         domestic bugging operations, ensures no             On his computer screen McQuilter has

16                                                                                                                    Listener May 28 2011

More Related Content

Similar to Listener Article May 2011 P1/6

Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communicationsPhantom Encrypt
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsRemo Hardeman
 
Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsGary Hinson
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limitedoomagoolies
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hackingjoeymar143
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri KramGRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri KramJiri Kram
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdDr. Idris Ahmed
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022CapRockTelephone
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecuritynathan-axonius
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 

Similar to Listener Article May 2011 P1/6 (20)

Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent Threats
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Internet
InternetInternet
Internet
 
expert tips
expert tipsexpert tips
expert tips
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri KramGRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
New Age Cybersecurity
New Age CybersecurityNew Age Cybersecurity
New Age Cybersecurity
 

More from William Grieve

5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebookWilliam Grieve
 
Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ramWilliam Grieve
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterWilliam Grieve
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011William Grieve
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1William Grieve
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1William Grieve
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011William Grieve
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantileWilliam Grieve
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 onlyWilliam Grieve
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigationsWilliam Grieve
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overviewWilliam Grieve
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident trainingWilliam Grieve
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensicWilliam Grieve
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact usWilliam Grieve
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv camerasWilliam Grieve
 

More from William Grieve (20)

5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
 
Paragon flyer final
Paragon flyer finalParagon flyer final
Paragon flyer final
 
NZIPI Update
NZIPI UpdateNZIPI Update
NZIPI Update
 
Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ram
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1
 
Paragon on Graffiti
Paragon on Graffiti Paragon on Graffiti
Paragon on Graffiti
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantile
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 only
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigations
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overview
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident training
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensic
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact us
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv cameras
 
Lawyer talk advert
Lawyer talk advertLawyer talk advert
Lawyer talk advert
 
Nzipi update may 11
Nzipi update may 11Nzipi update may 11
Nzipi update may 11
 

Recently uploaded

Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfauroraaudrey4826
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 

Recently uploaded (16)

Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdf
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 

Listener Article May 2011 P1/6

  • 1. Tech Traps How safe are your secrets? Hackers, scammers and spammers can cause mayhem for your texts, emails and documents but the greatest risk may come from the people you trust. by David Lomas & Joanne Black/ photo by Amos Chapple F or workers at Paragon Investi- linked to cameras watching them from unauthorised person can gain access to gations head office on Auck- every angle. its files. land’s North Shore, getting Inside is a sensitive burglar alarm system Welcome to the world of New Zealand’s access requires tapping in a that, if triggered outside office hours, fills leading industrial security company. key code and putting a finger the building with a thick smoke-like sub- For Paragon managing director Ron into a fingerprint identification device. stance, reducing visibility to zero and McQuilter, a former policeman who has Visitors need to press a buzzer at the main effectively blinding an intruder. It gives worked as a private investigator for the entrance, then speak into an intercom the company’s security people time to get past 28 years, security is paramount. “We linked with surveillance cameras. to the building before the intruder flees. cannot tell our clients to trust us with Once they pass the first entrance door, The company’s own computer net- their secrets if we cannot guarantee we more cameras follow them as they walk work is regularly checked. Paragon’s com- can keep them safe,” he says. “With what up the stairs to the second entrance puter forensic team, which undertakes we do, we know we could be a target where they are again greeted by a security much of the security firm’s corporate and ourselves.” door with yet another intercom system domestic bugging operations, ensures no On his computer screen McQuilter has 16 Listener May 28 2011