SlideShare a Scribd company logo
Tech Traps




How
safe are
your
secrets?
Hackers, scammers and spammers
can cause mayhem for your
texts, emails and documents
but the greatest risk may come
from the people you trust.
by David Lomas & Joanne Black/
photo by Amos Chapple




F
           or workers at Paragon Investi-     linked to cameras watching them from             unauthorised person can gain access to
           gations head office on Auck-       every angle.                                     its files.
           land’s North Shore, getting           Inside is a sensitive burglar alarm system       Welcome to the world of New Zealand’s
           access requires tapping in a       that, if triggered outside office hours, fills   leading industrial security company.
           key code and putting a finger      the building with a thick smoke-like sub-           For Paragon managing director Ron
into a fingerprint identification device.     stance, reducing visibility to zero and          McQuilter, a former policeman who has
Visitors need to press a buzzer at the main   effectively blinding an intruder. It gives       worked as a private investigator for the
entrance, then speak into an intercom         the company’s security people time to get        past 28 years, security is paramount. “We
linked with surveillance cameras.             to the building before the intruder flees.       cannot tell our clients to trust us with
   Once they pass the first entrance door,       The company’s own computer net-               their secrets if we cannot guarantee we
more cameras follow them as they walk         work is regularly checked. Paragon’s com-        can keep them safe,” he says. “With what
up the stairs to the second entrance          puter forensic team, which undertakes            we do, we know we could be a target
where they are again greeted by a security    much of the security firm’s corporate and        ourselves.”
door with yet another intercom system         domestic bugging operations, ensures no             On his computer screen McQuilter has

16                                                                                                                    Listener May 28 2011

More Related Content

Similar to Listener Article May 2011 P1/6

Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
Phantom Encrypt
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
Remo Hardeman
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
Ehab El Barbary
 
Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent Threats
Gary Hinson
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
oomagoolies
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
Dr. Idris Ahmed
 
Internet
InternetInternet
Internet
hetal001
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
Dean Bonehill ♠Technology for Business♠
 
expert tips
expert tipsexpert tips
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
joeymar143
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
Kristin Helgeson
 
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri KramGRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
Jiri Kram
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
Dr. Idris Ahmed
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
CapRockTelephone
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
ethanBrownusa
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
GTreasury
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
New Age Cybersecurity
New Age CybersecurityNew Age Cybersecurity

Similar to Listener Article May 2011 P1/6 (20)

Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent Threats
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri KramGRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
GRC Summit London 2016 - THE CYBER CHALLENGE by Jiri Kram
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
New Age Cybersecurity
New Age CybersecurityNew Age Cybersecurity
New Age Cybersecurity
 

More from William Grieve

5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
William Grieve
 
Paragon flyer final
Paragon flyer finalParagon flyer final
Paragon flyer final
William Grieve
 
NZIPI Update
NZIPI UpdateNZIPI Update
NZIPI Update
William Grieve
 
Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ram
William Grieve
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
William Grieve
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011
William Grieve
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1
William Grieve
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1
William Grieve
 
Paragon on Graffiti
Paragon on Graffiti Paragon on Graffiti
Paragon on Graffiti
William Grieve
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011
William Grieve
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantile
William Grieve
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 only
William Grieve
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigations
William Grieve
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overview
William Grieve
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident training
William Grieve
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensic
William Grieve
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact us
William Grieve
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv cameras
William Grieve
 
Nzipi update may 11
Nzipi update may 11Nzipi update may 11
Nzipi update may 11
William Grieve
 

More from William Grieve (20)

5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
 
Paragon flyer final
Paragon flyer finalParagon flyer final
Paragon flyer final
 
NZIPI Update
NZIPI UpdateNZIPI Update
NZIPI Update
 
Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ram
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1
 
Paragon on Graffiti
Paragon on Graffiti Paragon on Graffiti
Paragon on Graffiti
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantile
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 only
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigations
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overview
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident training
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensic
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact us
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv cameras
 
Lawyer talk advert
Lawyer talk advertLawyer talk advert
Lawyer talk advert
 
Nzipi update may 11
Nzipi update may 11Nzipi update may 11
Nzipi update may 11
 

Recently uploaded

What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 

Recently uploaded (9)

What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 

Listener Article May 2011 P1/6

  • 1. Tech Traps How safe are your secrets? Hackers, scammers and spammers can cause mayhem for your texts, emails and documents but the greatest risk may come from the people you trust. by David Lomas & Joanne Black/ photo by Amos Chapple F or workers at Paragon Investi- linked to cameras watching them from unauthorised person can gain access to gations head office on Auck- every angle. its files. land’s North Shore, getting Inside is a sensitive burglar alarm system Welcome to the world of New Zealand’s access requires tapping in a that, if triggered outside office hours, fills leading industrial security company. key code and putting a finger the building with a thick smoke-like sub- For Paragon managing director Ron into a fingerprint identification device. stance, reducing visibility to zero and McQuilter, a former policeman who has Visitors need to press a buzzer at the main effectively blinding an intruder. It gives worked as a private investigator for the entrance, then speak into an intercom the company’s security people time to get past 28 years, security is paramount. “We linked with surveillance cameras. to the building before the intruder flees. cannot tell our clients to trust us with Once they pass the first entrance door, The company’s own computer net- their secrets if we cannot guarantee we more cameras follow them as they walk work is regularly checked. Paragon’s com- can keep them safe,” he says. “With what up the stairs to the second entrance puter forensic team, which undertakes we do, we know we could be a target where they are again greeted by a security much of the security firm’s corporate and ourselves.” door with yet another intercom system domestic bugging operations, ensures no On his computer screen McQuilter has 16 Listener May 28 2011