Trends to enhance safety and security

Issue 2/3 2023 Security Services & Risk Management

While companies seek innovative crime prevention measures, criminals are also exploring better ways to commit crimes. There is no doubt that load shedding has made the jobs of security providers harder, as it poses a double threat, compromising existing security resources and emboldening criminals to operate with more impunity.

With this in mind, residents and business owners need to stay ahead of criminal activities, this according to George Fitzroy, Managing Director of Security at facilities management company, Servest. He offers some security trends to enhance safety and security.

Remote Biometric Authentication (RBA) is the future.

For those security providers who can keep the lights on during load shedding, Remote Biometric Authentication (RBA) is perhaps the leading example of security innovation that can enhance the security of access to sensitive data at home, work, or when using money management systems. This is done through voice or other types of biometric authentication, including face recognition, palm vein, or fingerprints.

Banks and financial institutions were among the first to use RBA for digital authentication. The use of RBA is growing in healthcare, retail, telecommunications, education, government, and the travel and tourism industries. The use of biometrics in security presents an opportunity to better trace criminal activities and improved efficiencies in tracking them.

Specialised security for syndicate crime prevention

Syndicate-related crimes cannot be handled in the same way as conventional criminal activity anymore. Syndicate-related activities have significantly increased since 2010. Criminal activities now need to be curtailed through highly trained tactical deployments that can deal with syndicate crime.

Crime syndicates in South Africa range from heroin and cocaine trafficking to people-smuggling, rhino poaching, and metal stripping from state power, water and transportation companies, as well as kidnappings for ransom.

Specialised security services present one of the best options for curbing syndicated crime activities.

Centralised control centres

Centralised control centres will continue to play a significant role in the monitoring of high-risk areas. As disruptive technologies such as the Internet of Things (IoT) emerge, centralised monitoring should be leveraged to speed up security response time.

Mobile phones for enhanced security monitoring

Mobile phones have become a fundamental tool for enhancing security. It is estimated that South Africa has just over 53 million smartphones in use. With criminal activity on the rise, it's essential to have access to information at your fingertips. Furthermore, mobile phones enable secure tracking and tracing, as well as the ability to continuously monitor facilities and assets.

It is, however, important to also ensure that mobile phones are protected from cyberattacks.

Security convergence

Integrating IT and physical security programmes is enhancing security responses. Although often overlooked, physical security is essential to preventing crime. Both individuals and organisations need to pay more attention to physical security measures, integrated with specialised IT systems.

The purpose of security convergence is to leverage information systems and security to enable physical teams to be more responsive in bridging security gaps that cannot be filled by physical security alone. Convergence in security presents an opportunity to enhance security resilience, detection, prevention, risk mitigation and response to threats. Thereby creating an overall more robust security system.

AI and machine learning

By using artificial intelligence, analytics and machine learning, security providers will be able to uncover fresh insights that would otherwise go unnoticed. AI in security continues to propel efforts to identify, predict and respond to security threats, including cybersecurity threats, effectively and efficiently with very minimal human intervention.

“By effectively leveraging a combination of these tools, among others, security providers will be able to stay current with technological innovations and respond to security threats more rapidly – be it for residential or commercial facilities,” Fitzroy concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.