The security industry is a critical resource for the pandemic

Issue 3 2021 News & Events

The CBRN (chemical, biological, radiological or nuclear warfare) sector is mostly made up of academics and professional practitioners that research and consider the above-mentioned threats.

For natural disasters, the governmental-related body has their academics and manpower that take full responsibility for servicing security, medical and feeding and housing the population because they are paid for it through taxes.

For biological threats, the governments, for specific reasons, use the military and police function on a macro level in managing specific protocols on the ground. However, it is the private security industry which is much larger than the military and police in some countries, that will play its part on the ground.

Actually, the two bodies that play an important role are the health community that set protocols (infection testing, social interactions and hygiene) for biological threats and the security industry that rolls the health protocols out and manages the implementation on the ground.

Boots on the infected ground

However, the security industry does more. The security industry adds security protocols to the mix because there are issues relating to tools (technology and equipment) that are used, the behaviour of the people and the crime related to the threats, being the threat itself and the outcome of the threat being the economic meltdown.

It is virtually impossible for the military and police to manage the health protocols, investigate the amount of and type of new crime in this scenario besides managing the numbers of people involved.

The CBRN community comprehend the fact that there are millions of private security practitioners on the ground that are actually doing the job of taking temperatures, managing the flow of people and ensuring hygiene criteria are met. Therefore, they realise that it is the private security industry, the largest force on the ground, that limit the collateral damage, as it is and that also has the equipment and skilled manpower to do so.

This current mutating biological threat has taught some lessons to some that bothered to be present and relevant and the flip side is that some in the security industry do not realise that they are actually doing biological threat security.

Now, based on the recent experiences, the private security industry has researched the issues related to this pandemic and thoroughly investigated specifics taking into consideration various issues.

When 911 happened, the security exhibitions grew in size because of two primary reasons. Firstly, at the same time IP (Internet Protocol) technology began to display their wares and all technologies entered the market with their solutions, be it biometrics, IP access control and IP driven CCTV, etc., which was mostly geared towards counter terrorism.

When COVID-19 began, once again the manufacturers entered the market with thermal imaging technologies, of which some did not comply with the Department of Health criteria. The health community have protocols relating to taking the temperature of people and have also explored the criteria for using thermal imaging. Unfortunately, there are brands that do not conform to the standards out of ignorance to the factual criteria and also there are some that provide misinformation about their capabilities.

It is the security industry that went through this scenario during 911 which brought about laboratories to test brand performance of emerging technologies and equipment. This means that the protocols for managing a biological threat and using technology or equipment must conform to the Health Department, besides labs that check brand performance.

Health protocols in public spaces

The health community has set protocols for social distancing but has not realised that the population are not sheep. The security industry knows that the behaviour of people can be extremely aggressive and volatile. Having said such, there are security practitioners that themselves have not acknowledged that their team on the ground are on ground zero where the staff are more at risk than medical teams such as nurses or doctors.

In a hospital the medical teams know who is infected and who is not. They then have protocols to dress according to the threat and apply the 'dress-code' using specific protocols. They have been trained in such. On the ground, the security practitioners have no idea of who is infected and who is not infected. They handle people that are shouting and perhaps pushing others around without out any form of medical grade protection or the full complement of protection gear that is used by ICU wards.

The protocols for managing people in security is by layering specific staff with certain character traits or skillsets to ensure a safe environment for the public and themselves. Security companies that are not using protocols place their client's customers at risk, besides their own staff. When customers avoid going to a site, the client loses revenue. This is not about loss prevention but more so profit protection. Furthermore, new crime and increased numbers of criminals erode and impact the profits of a site.

The CBRN teams may suggest certain steps to take, but at the end of the day it will be the private security industry that will roll it out and manage it on the ground.

If the security industry does not stand together and use the same protocols that fit standards and compliance criteria, then it will not be able to limit the level of collateral damage as it should with a mutating biological threat.

When the security industry does take action then it will earn the trust and respect from the CBRN community, the health community and the public at large.

The International Security Industry Organisation (ISIO) and the Central Association of Private Security Industry (CAPSI), representing +7 million practitioners, call on all stakeholders to participate alongside on this mission.

Find out more at www.intsi.org




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Securex gears up for Cape Town
News & Events
Four industry expos debut in Cape Town from 21–23 October, providing access to Africa’s tech hub and a rapidly expanding local market, through a platform covering security, OSH, facilities management, and fire safety solutions in one venue.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.