{"id":490,"date":"2016-07-05T09:43:58","date_gmt":"2016-07-04T21:43:58","guid":{"rendered":"http:\/\/geektactics.geektamin.com\/?p=490"},"modified":"2024-06-14T09:49:30","modified_gmt":"2024-06-13T21:49:30","slug":"get-wired-into-security","status":"publish","type":"post","link":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/","title":{"rendered":"Get Wired Into Security"},"content":{"rendered":"

One lesson you never want to learn from experience is how important security is. Maybe important files from your businesses computers were stolen. Or maybe your social media account was hacked into. People are quick to preach the importance of cyber security. But when it comes to residential and commercial security, people aren’t so bold.<\/p>\n

You would think more people would promote the importance of securing your home or business. Unfortunately most people don’t promote this because they themselves are not secure. They would feel like a hypocrite by saying to get an advanced security system when their burglar alarm ran out of battery four years ago.<\/p>\n

It’s time to get wired into security. More specifically wired security systems. Why wired security systems you may ask? Quite simply because they are more reliable. Also according to Chubb<\/a>,<\/p>\n

[Wireless security systems] offer a lower long term cost because the components don’t have batteries that need to be replaced, and the signals between system components are clear and powerful because there is no signal\u00a0interference\u00a0from the house construction.”<\/em><\/p><\/blockquote>\n

If you’re not yet wired into security contact Chubb. They offer excellent wired security systems<\/a> to keep your home or business secure.<\/p>\n

If you want to go one step further to secure your home or business, Chubb also offer alarm monitoring services<\/a> for burglary and intrusion, smoke and fire detection, and emergency\/panic alerts.<\/p>\n","protected":false},"excerpt":{"rendered":"

One lesson you never want to learn from experience is how important security is. Maybe important files from your businesses computers were stolen. Or maybe your social media account was hacked into. People are quick to preach the importance of cyber security. But when it comes to residential and commercial security, people aren’t so bold. […]<\/p>\n","protected":false},"author":4,"featured_media":491,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53],"tags":[144,84],"class_list":["post-490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opinion","tag-business","tag-security"],"yoast_head":"\nGet Wired Into Security - Geektactics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get Wired Into Security - Geektactics\" \/>\n<meta property=\"og:description\" content=\"One lesson you never want to learn from experience is how important security is. Maybe important files from your businesses computers were stolen. Or maybe your social media account was hacked into. People are quick to preach the importance of cyber security. But when it comes to residential and commercial security, people aren’t so bold. […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Geektactics\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-04T21:43:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T21:49:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"504\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Phil Scott\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Phil Scott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\"},\"author\":{\"name\":\"Phil Scott\",\"@id\":\"https:\/\/geektactics.co.nz\/#\/schema\/person\/0ab7be281ed22eb86bb1cb5fcb8f23be\"},\"headline\":\"Get Wired Into Security\",\"datePublished\":\"2016-07-04T21:43:58+00:00\",\"dateModified\":\"2024-06-13T21:49:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\"},\"wordCount\":240,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/geektactics.co.nz\/#organization\"},\"image\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png\",\"keywords\":[\"business\",\"security\"],\"articleSection\":[\"Opinion\"],\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\",\"url\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\",\"name\":\"Get Wired Into Security - Geektactics\",\"isPartOf\":{\"@id\":\"https:\/\/geektactics.co.nz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png\",\"datePublished\":\"2016-07-04T21:43:58+00:00\",\"dateModified\":\"2024-06-13T21:49:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#breadcrumb\"},\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage\",\"url\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png\",\"contentUrl\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png\",\"width\":504,\"height\":367},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/geektactics.co.nz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get Wired Into Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/geektactics.co.nz\/#website\",\"url\":\"https:\/\/geektactics.co.nz\/\",\"name\":\"Geektactics\",\"description\":\"Interesting Stuff for Geeks\",\"publisher\":{\"@id\":\"https:\/\/geektactics.co.nz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/geektactics.co.nz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-NZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/geektactics.co.nz\/#organization\",\"name\":\"Geektactics\",\"url\":\"https:\/\/geektactics.co.nz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/geektactics.co.nz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2024\/06\/geektactics-logo.png\",\"contentUrl\":\"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2024\/06\/geektactics-logo.png\",\"width\":2001,\"height\":831,\"caption\":\"Geektactics\"},\"image\":{\"@id\":\"https:\/\/geektactics.co.nz\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/geektactics.co.nz\/#\/schema\/person\/0ab7be281ed22eb86bb1cb5fcb8f23be\",\"name\":\"Phil Scott\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/geektactics.co.nz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3613a3c6f7f73eb2eeb6e71237ddabf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3613a3c6f7f73eb2eeb6e71237ddabf5?s=96&d=mm&r=g\",\"caption\":\"Phil Scott\"},\"url\":\"https:\/\/geektactics.co.nz\/blog\/author\/philscott\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Get Wired Into Security - Geektactics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/","og_locale":"en_US","og_type":"article","og_title":"Get Wired Into Security - Geektactics","og_description":"One lesson you never want to learn from experience is how important security is. Maybe important files from your businesses computers were stolen. Or maybe your social media account was hacked into. People are quick to preach the importance of cyber security. But when it comes to residential and commercial security, people aren’t so bold. […]","og_url":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/","og_site_name":"Geektactics","article_published_time":"2016-07-04T21:43:58+00:00","article_modified_time":"2024-06-13T21:49:30+00:00","og_image":[{"width":504,"height":367,"url":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png","type":"image\/png"}],"author":"Phil Scott","twitter_misc":{"Written by":"Phil Scott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#article","isPartOf":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/"},"author":{"name":"Phil Scott","@id":"https:\/\/geektactics.co.nz\/#\/schema\/person\/0ab7be281ed22eb86bb1cb5fcb8f23be"},"headline":"Get Wired Into Security","datePublished":"2016-07-04T21:43:58+00:00","dateModified":"2024-06-13T21:49:30+00:00","mainEntityOfPage":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/"},"wordCount":240,"commentCount":0,"publisher":{"@id":"https:\/\/geektactics.co.nz\/#organization"},"image":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage"},"thumbnailUrl":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png","keywords":["business","security"],"articleSection":["Opinion"],"inLanguage":"en-NZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/","url":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/","name":"Get Wired Into Security - Geektactics","isPartOf":{"@id":"https:\/\/geektactics.co.nz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage"},"image":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage"},"thumbnailUrl":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png","datePublished":"2016-07-04T21:43:58+00:00","dateModified":"2024-06-13T21:49:30+00:00","breadcrumb":{"@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#breadcrumb"},"inLanguage":"en-NZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#primaryimage","url":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png","contentUrl":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2015\/03\/Screen-shot-2015-03-21-at-10.43.23-AM.png","width":504,"height":367},{"@type":"BreadcrumbList","@id":"https:\/\/geektactics.co.nz\/blog\/get-wired-into-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/geektactics.co.nz\/"},{"@type":"ListItem","position":2,"name":"Get Wired Into Security"}]},{"@type":"WebSite","@id":"https:\/\/geektactics.co.nz\/#website","url":"https:\/\/geektactics.co.nz\/","name":"Geektactics","description":"Interesting Stuff for Geeks","publisher":{"@id":"https:\/\/geektactics.co.nz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/geektactics.co.nz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-NZ"},{"@type":"Organization","@id":"https:\/\/geektactics.co.nz\/#organization","name":"Geektactics","url":"https:\/\/geektactics.co.nz\/","logo":{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/geektactics.co.nz\/#\/schema\/logo\/image\/","url":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2024\/06\/geektactics-logo.png","contentUrl":"https:\/\/geektactics.co.nz\/wp-content\/uploads\/sites\/2\/2024\/06\/geektactics-logo.png","width":2001,"height":831,"caption":"Geektactics"},"image":{"@id":"https:\/\/geektactics.co.nz\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/geektactics.co.nz\/#\/schema\/person\/0ab7be281ed22eb86bb1cb5fcb8f23be","name":"Phil Scott","image":{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/geektactics.co.nz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3613a3c6f7f73eb2eeb6e71237ddabf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3613a3c6f7f73eb2eeb6e71237ddabf5?s=96&d=mm&r=g","caption":"Phil Scott"},"url":"https:\/\/geektactics.co.nz\/blog\/author\/philscott\/"}]}},"_links":{"self":[{"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/posts\/490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/comments?post=490"}],"version-history":[{"count":2,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/posts\/490\/revisions"}],"predecessor-version":[{"id":19893,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/posts\/490\/revisions\/19893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/media\/491"}],"wp:attachment":[{"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/media?parent=490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/categories?post=490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geektactics.co.nz\/wp-json\/wp\/v2\/tags?post=490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}