From the Editor: The lockdown issue

Issue 3 2020 News & Events

Welcome to the first (and hopefully, only) issue of Hi-Tech Security Solutions that was put together in lockdown. I think the Chinese took their saying of “May you live in interesting times” a little too seriously.

This column is being written in lockdown long before the print issue gets to the printers. So, for those reading this in the print edition of Hi-Tech Security Solutions, we hope the lockdown is over and we are able to get back to business, while those reading this online or in the PDF or e-book format may still be stuck at home. The print issue, as you will notice, is rather small due to the nervousness pervading the business world, but the electronic editions will have more editorial that couldn’t fit into the print magazine – you will always find more online, but in this instance, a lot more.

But while uncertainty and fear are the norm these days amidst great, and valid concerns about the post-lockdown period in our and the world’s economy, one has to give the South African President and the Minister of Health credit for the way they demonstrated leadership and did what was necessary. What’s really sad is that strong leadership stands out as an anomaly in this country.

Of course, there are those who say the lockdown was not necessary, but something had to be done with the information at hand and the lockdown was the best option out of a bunch of bad and worse choices. The real challenges still lie ahead as lockdown ends, or is extended.


Andrew Seldon.

One of the interesting things that I noticed during this period is how unprepared people and companies were for working at home. Issues of connectivity and security abound. Many people seem lost without someone looking over their shoulder, while some managers who spend their time ‘shoulder surfing’ have found themselves at a loss when they couldn’t do that anymore. It comes down to managing by looking out of your office and seeing people sitting at their desks in the belief that presence equates to productivity; or managing by the value people add by what they do. I guess the latter is harder to determine if you don’t have set processes in place. Some may say the latter is harder if you’re a bad manager, but I would never suggest that.

Of course, that only applies to those who were able to work from home. Many were simply sent home on forced leave or unpaid leave, which is an even harder burden for them to bear. And then there are those who were sent home without a job, the worst scenario of all.

In any case, let’s hope things get back on track quickly and the potential human tragedy of the coronavirus can be avoided as much as possible. Hi-Tech Security Solutions wishes all our readers, suppliers and partners, as well as our colleagues, health and sanity during these fearful times, wherever in the world you may be.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
Mobile credentials taking off
Technews Publishing SMART Security Solutions Paxton Secutel Technologies Access Control & Identity Management
Mobile smartphone access is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...