What is your risk profile?

August 2011 News & Events

The recent News of the World hacking scandal has taken pride of place on British television shows over the past weeks. The ease with which some people were able to hack into voice mail messages is astounding. You would think mobile carriers would by default implement some security system to protect private information, but where is the profit in that.

The fact that even with ample warning over the past year or so these companies have still not amended their contracts to comply with the law says it all – it seems to me customer is simply a euphemism for victim in these boardrooms.

Not that we are not used to that. However it does put the responsibility for security and privacy back in the hands of the customer. You cannot rely on these companies to lift a finger to protect your private information unless there is a profit to be made; if they can find a way to charge for it, that is a different story. Nonetheless, the question is, do you trust them?

Do you trust the company that profits from selling your computer's or mobile device's operating system to do everything it can to protect you, or do you rely on third-party applications to secure your system?

Taking it to another level, do you trust the police force to protect you or do you pay more money to a third party to provide additional security. And how do you know whether the third party will deliver on its promises? We have all seen or heard about security guards conveniently looking the other way, whether for profit or to protect themselves and their families. There seems to be no end to the horror stories. So what does one do?

In the end it comes down to identifying the risks you face and mitigating those you want to avoid while accepting those you can deal with.

Personally, if someone wants to listen to my voice mail messages or calls, they are welcome to. I would advise them to get a life. However, I have not been victim to a disaster that has taken a loved one away recently, if I had I would certainly have a different opinion. A company CEO would certainly not agree with me, his/her calls need to be protected at all times.

So it is about identifying and mitigating the risks you face according to your own risk profile – an ever-changing risk profile. Encrypting my phone calls is not something I would do, but there are others that will feel compelled to. I keep backups of my data files because I would be lost without them. They are not worth anything in real monetary terms, but they are worth endless hours of work and stress (and lost revenue) for me if they are lost. It is a risk that needs to be mitigated and it is worth paying for – in my profile.

As business ethics make way for profiteering, perhaps it is time we all examine our risk profiles, personal and business, to see what mitigation we need to implement to retain the safety, security and privacy standards we value.

Andrew Seldon



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.