What is your risk profile?

August 2011 News & Events

The recent News of the World hacking scandal has taken pride of place on British television shows over the past weeks. The ease with which some people were able to hack into voice mail messages is astounding. You would think mobile carriers would by default implement some security system to protect private information, but where is the profit in that.

The fact that even with ample warning over the past year or so these companies have still not amended their contracts to comply with the law says it all – it seems to me customer is simply a euphemism for victim in these boardrooms.

Not that we are not used to that. However it does put the responsibility for security and privacy back in the hands of the customer. You cannot rely on these companies to lift a finger to protect your private information unless there is a profit to be made; if they can find a way to charge for it, that is a different story. Nonetheless, the question is, do you trust them?

Do you trust the company that profits from selling your computer's or mobile device's operating system to do everything it can to protect you, or do you rely on third-party applications to secure your system?

Taking it to another level, do you trust the police force to protect you or do you pay more money to a third party to provide additional security. And how do you know whether the third party will deliver on its promises? We have all seen or heard about security guards conveniently looking the other way, whether for profit or to protect themselves and their families. There seems to be no end to the horror stories. So what does one do?

In the end it comes down to identifying the risks you face and mitigating those you want to avoid while accepting those you can deal with.

Personally, if someone wants to listen to my voice mail messages or calls, they are welcome to. I would advise them to get a life. However, I have not been victim to a disaster that has taken a loved one away recently, if I had I would certainly have a different opinion. A company CEO would certainly not agree with me, his/her calls need to be protected at all times.

So it is about identifying and mitigating the risks you face according to your own risk profile – an ever-changing risk profile. Encrypting my phone calls is not something I would do, but there are others that will feel compelled to. I keep backups of my data files because I would be lost without them. They are not worth anything in real monetary terms, but they are worth endless hours of work and stress (and lost revenue) for me if they are lost. It is a risk that needs to be mitigated and it is worth paying for – in my profile.

As business ethics make way for profiteering, perhaps it is time we all examine our risk profiles, personal and business, to see what mitigation we need to implement to retain the safety, security and privacy standards we value.

Andrew Seldon



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...
From security technician to salesperson
News & Events
Being great at security sales starts with having the right mindset. How you think informs what you say and how you act; and how you act informs the results you will achieve in your business.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...