Well planned is half complete

June 2013 Security Services & Risk Management

For good reason, the employee risk assessment environment is becoming crowded with practitioners, equipment and techniques to the extent of bewilderment. As the business world expands, so do the risks associated with it, especially the people risks. The requirement today is for an assessment procedure that is concise, sensibly priced and accessible; one that cuts the time and money such investigation can unnecessarily demand. Are we anywhere nearer such a Golden Fleece?

Perhaps the total solution is still out of reach and will stay that way as long as the industry continues to expand and constantly reinvent itself. For this state of the sector’s development, a tool is needed that guides employers through the risk assessment jungle and delivers them to a place where risks are easier to see and deal with.

iFacts has developed a process that literally arms you with information, in itself proving the adage that 'knowledge is power'.

Complete company security is a labyrinth, but only to be feared if you do not know your way around it. The company says it can show you how and prove its commitment that ‘we remove the people risk’.

iFacts’ independent risk assessment is like a do-it-with-us process that will improve the protection of companies’ staff and assets by examining and evaluating the effectiveness of existing security from intelligence gathering to security vulnerability testing and everything in between. With this information at hand a complete and updated security plan can be prepared.

Throughout the process, the key is thoroughness. For example, in the intelligence category we analyse crime perpetration in all its guises in the area going back over as many years as it takes to complete the picture. Such input is invaluable to the risk analysis itself and the capability of existing systems and their security effectiveness.

This takes us on to an assessment of the security personnel – from the efficacy of its employee screening processes, if any; the calibre of security staff, and implementing training programmes for security staff and employee awareness procedures. An inventory is made of security-related equipment for modernisation and effectiveness. Are security personnel up to standard and is upkeep maintained and costs kept in check?

How the security task is planned and performed is the foundation. Henry Ford remarked when he installed his first motor car assembly line: “Well planned is half complete”. Henry never said anything truer, and it applies in great measure to the company’s security component. Plan it to the last detail and then implement the plan as thoroughly.

Laying the groundwork for the assessment is as important as what goes on top. This includes interviews with management, employees and contractors, with the premises being visited at all hours allowing company security procedures to be assessed, including the security financials.

Adding value to our independent risk assessment and non-financial due-diligence offering, iFacts has joined forces with AfricaEye (www.africaeye.co.za), an online solution designed for investors, businesses, researchers and entrepreneurs. We can now offer clients access to market analysis and demographic insights for a greater number of South African and other African cities.

In its premier offering, AfricaEye gives users access to data from 100 South African and 20 African cities and major towns that provide in-depth information in user-defined catchment areas. It also makes user friendly by offering a more basic product that sources data from 650 South African and 30 African cities and major towns.

“With AfricaEye, any individual or institution around the world now has access to affordable, industry-tested, reliable, granular household income and retail expenditure data to improve planning and map their market potential and African expansion more accurately,” says Sybrand Strauss, MD of Fernridge Consulting.

The AfricaEye dataset makes use of aerial photography, property research, demographic data, global positioning system (GPS) fieldwork and industry-tested consulting experience and methods.

For more information contact iFacts, +27 (0) 82 600 8225, [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Key timelines to ensure compliance
Security Services & Risk Management
Regulations to the Occupational Health and Safety Act that apply to major hazard installations require that certain actions be taken to manage health and safety risks – some with timelines for compliance that must be monitored.

Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Is AI the game-changer for streamlining anti-money laundering compliance?
Financial (Industry) Security Services & Risk Management
In the aftermath of South Africa's recent grey listing, companies are now confronted with the imperative to address eight identified strategic deficiencies, while simultaneously reducing their financial crime risk through anti-money laundering compliance processes.

Five ways to reduce your cyber insurance premiums
Security Services & Risk Management News
With the global costs of cybercrime expected to soar to $13 trillion within the next five years, cyber insurance is booming as organisations try to mitigate the risk of financial losses.

Client satisfaction boosted by 85% at Thungela Mine
Thorburn Security Solutions News Security Services & Risk Management Mining (Industry)
Thorburn Security, a division of Tsebo Solutions Group, has announced its recent collaboration with Kwa-Zulu Natal security company, Ithuba Protection Services, as part of its Enterprise Supplier Development (ESD) initiatives across Africa.

Migrating to the cloud? Beware the many hurdles
IT infrastructure Security Services & Risk Management
While there are undoubtedly many benefits, there are also numerous hurdles to cloud adoption. Some of the biggest challenges revolve around managing cloud spend, understanding the cost components of cloud infrastructure, and how those costs can scale.

Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Planning for the worst is key to success
Technews Publishing Security Services & Risk Management
Planning for the worst is key to success when disaster strikes. Amidst frequent load shedding and often unpredictable stages of power outages, many businesses are concerned about the possibility of a total blackout.

Protecting South African systems through XDR cybersecurity
Cyber Security Security Services & Risk Management
Carlo Bolzonello, Country Lead for Trellix South Africa, discusses how the country can protect its valuable digital assets through the artificial intelligence-enabled Extended Detection and Response (XDR) cybersecurity approach.

[Sponsored] Protecting Against Ransomware Attacks: Lessons from Recent POPIA Fine
Cyber Security Security Services & Risk Management
According to Sophos' most recent ransomware report, an alarming 78% of the South African organisations that Sophos surveyed experienced ransomware attacks in the past year.