classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Fraud prevention in a bad economy
September 2012, Cyber Security

Writing on fraud prevention in the workplace today is no small challenge. I could write pages on the security plans and assessments that need to be done to ensure that the recommendations are in line with the corporate image of a business as well the efficiency levels required to make a business profitable. This unfortunately will not always cover the more real aspects of what employees are experiencing in the difficult financial times most people find themselves in today.

Recently the Kansas City Business Journal reported on an intriguing study about the importance of corporate image. In light of heightened concern about ethical standards and conduct in the business and professional world, Fleishman Hillard, a public relations firm, and the World Economic Forum, surveyed 132 delegates about corporate reputation. Seventy-seven percent of the business leaders responded corporate reputation – its need to maintain a strong, positive image – has become more important recently.

This increased focus on reputation has stimulated a renewed interest in integrity. Integrity is defined as a strict adherence to a moral code of ethics. Whether we realise it or not, we all have a code of ethics we live by; unfortunately, many have no strong moral foundation.

In 2001, George Barna conducted research on this subject. When asked what basis they use to form their moral choices, 44% of those responding indicated that they go with whatever seems most pleasing or satisfying to them. Approximately 17% rely on the family values passed down to them, and another 17% act based on making others happy, to minimise conflict.

These approaches are frightening. Take basis number 1, for example. Imagine if all corporate executives made decisions based on what is pleasing to them personally. Is that not why an alarming number of once highly esteemed corporate executives now find themselves under indictment for criminal and unethical practices?

For those who rely on family values, the second most popular choice, to assess that impact all you have to do is consider the movie, ‘Pirates of the Caribbean.’ In the film, the pirates acted according to a code of ethics that had been passed on to them and that they passed on to others – but I would not want them as neighbours!

In addition, for those who want to avoid conflict, or make others happy, the end result likely will be that the strongest individuals rule – because they exercise control over those who try to please others so they can reduce conflict. There is a basic principle: If you try to make tyrants happy, they will certainly take advantage of your weaknesses. This does not sound like a way to minimise conflict.

Any risk assessment and advice on loss prevention should cover the following aspects and each area should be unpacked to understand the actual risk the organisation faces, the strengths or weaknesses in the existing system and then recommendations on how to manage risk going forward.

* Physical security.

* People security – including employees and third-party employees.

* The security of systems and procedures.

* Technology.

* The management of security.

iFacts has made a basic online risk assessment available free of charge and it can give you an indication of risks your home, business or complex may face. Please visit www.orangebusinessboost.co.za to assess the questionnaire.

For more information contact iFacts, +27 (0)82 600 8225, jenny@ifacts.co.za, jenny@orangebusinessboost.co.za


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • 2019 cybersecurity crystal ball
    February 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?
  • 50% of companies can’t detect IoT breaches
    February 2019, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
  • People risk in 2019
    February 2019, iFacts, Security Services & Risk Management
    Artificial intelligence has been around for some time now, but the ‘human element’ is going to cause some disruption in the more traditional HR space.
  • Data security sits at the heart of democracy
    February 2019, Cyber Security, Security Services & Risk Management
    A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.
  • Corporate fraud and insider threats
    February 2019, Cyber Security, Security Services & Risk Management
    Insider fraud and theft can often be more damaging to a company than risks from outside.
  • Corporate privacy in a selfie age
    February 2019, Cyber Security, Security Services & Risk Management
    Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.
  • SME cybersecurity: high risk
    February 2019, Cyber Security, IT infrastructure
    Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
  • Kaspersky unveils new partner programme
    February 2019, Kaspersky Lab, News, Cyber Security
    Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Using tomorrow’s tools to solve ­today’s security problems
    November 2018, Access Control & Identity Management, Cyber Security, Integrated Solutions
    It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.
  • NEC XON talks Industry 4.0 and disruption
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
    NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.