Avoid reputational damage

Issue 9 2020 News

Over the past months, technology companies have run onto the market at a fast pace without considering the simple fact that clients are trying to limit the collateral damage of an active biological threat. This threat can deliver deadly outcomes and the investment that is spent calls for ‘professional responsibility’ that supersedes the ego of the lazy practitioner that simply buys the first thing they see, or uses the services of an inexperienced and uneducated advisor or installer without checking.

Months ago, the International Security Industry Organisation (ISIO) posted articles to limit the level of COVID-19 collateral damage and addressed technology and equipment, besides layered manpower by skillsets. We are gob-smacked to still see technology (already illegitimate in some countries) trying to enter the market or misinforming the market about their technology and equipment.

Implications

• What are the implications to the technology supplier, security consultant/advisor or sales outlet that is peddling ‘bad’ equipment?

• What are the implications of not installing, training or using the equipment properly?

• What are the implications for security managers if they are purchasing illegitimate equipment or equipment that is not installed correctly or used properly? Do you think they will get a job again when they are interviewed by someone that knows what is going on?

Transparency and Accountability

• Do the company’s technology advisor, security manager and training manager report to their seniors that the equipment and technology is not suitable and they must re-purchase again, or do they hide the fact?

• Can they take the chance of being the ostrich and not doing anything, hoping that no one finds out?

An active biological threat that can deliver life-impacting or deadly outcomes speaks for itself. They should not feel alone because many are in this situation – all people were desperate and at least they tried to do what they needed to do. Some people that are chasing the fast buck and have no conscience will be found out. They will lose their standing – word gets around.

Solution

There are two reference points to check for the right equipment, correct methods of installation and using such. Both reference points must be checked as they are different tasks. These are laid out in the security protocols besides other COVID-19 protocols that talk to fields of interest, because this is not a one-size-fits-all kind of thing. All are available on the intelligence guidance centre link on ISIO (www.intsi.org) and on HIM (www.human-investigation-management.com) websites.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: Take identity seriously
Issue 8 2020, Technews Publishing , News
The list of companies subject to data breaches continues to grow, both in Africa and beyond. The dangerous part is that in Africa, including South Africa (at the moment), the companies do not have to ...

Read more...
Free-flow smart weapons detection system
Issue 8 2020, XPro Security Solutions , News, Security Services & Risk Management, Products
Detecting people carrying weapons and preventing them from entering your venue is now possible, without sacrificing the visitor experience.

Read more...
Net2 integrates with additional thermal scanners
Issue 8 2020, Paxton , News, Access Control & Identity Management
Paxton has updated Net2 to include six new thermal temperature scanning integrations to assist in managing the pandemic.

Read more...
App Challenge winners
Issue 8 2020 , News, CCTV, Surveillance & Remote Monitoring
Security & Safety Things announced the winners of App Challenge for innovation in AI-enabled smart camera applications.

Read more...
ONVIF introduces Profile M Release Candidate
Issue 7 2020 , News
ONVIF has introduced its Profile M Release Candidate for standardising the communication of metadata and event handling of analytics for smart applications.

Read more...
First Distribution to distribute Video Storage Solutions
Issue 8 2020 , News, CCTV, Surveillance & Remote Monitoring, IT infrastructure
First Distribution has signed an agreement to distribute the entire Video Storage Solutions (VSS) product line of video surveillance appliances.

Read more...
Ring Africa launches new cameras in SA
Issue 8 2020 , News, CCTV, Surveillance & Remote Monitoring, Smart Home Automation
Ring Africa has officially launched a range of indoor and outdoor home security cameras in South Africa.

Read more...
VisionPass wins SIA award
Issue 8 2020, IDEMIA , News, Access Control & Identity Management
IDEMIA announced that VisionPass, its newly launched advanced facial recognition device, won the SIA New Product Showcase Award.

Read more...
Liquid Telecom unveils Cybersecurity unit
Issue 8 2020 , News, Cyber Security
Liquid Telecom has unveiled its Cybersecurity unit, which offers end-to-end managed services for digital security solutions.

Read more...
T-Systems and Fortinet launch cyber academy
Issue 7 2020 , News
T-Systems South Africa will be introducing cybersecurity education programmes to create a specialised Cyber Security Academy incorporated into the organisation’s existing ICT Academy.

Read more...