Surge protection for your ­residential appliances

Residential Estate Security Handbook 2018 Security Services & Risk Management, Residential Estate (Industry), Products & Solutions

Across South Africa, citizens will remember the rolling blackouts of 2014 and 2015 with varying shades of discomfort depending on whether they could, or could not, afford generators for their homes. When national utility provider Eskom was unable to match energy supply to demand, the result was a new term: ‘load shedding’, which basically meant planned (and sometimes unplanned) area-wide power outages. The results included costs to the economy in general at the national level, and frustration at the individual level.

During the power cuts, which were frequently accompanied by power surges when the electricity finally came back on, many expensive domestic appliances were blown: fridges, kettles, toasters, decoders … Today, while we trust that the rolling black-outs which took place regularly according to an actual schedule lie largely in the past, most people are aware that the threat remains, at least to some extent. Against this background, no individual consumer ever wants to experience the misery of having their appliances taken out en masse by even ad hoc power surges. Hano Oelofse, technical director at DEHN Africa, the local subsidiary of DEHN, points out that having insurance cover is not always enough to protect your family from the economic loss incurred by domestic appliances that are damaged or destroyed by power surges. He says, “Taking surge protection measures is arguably a simpler option than relying on insurance cover for your domestic appliances. In addition to financial issues that result from surges, as well as the time taken to process a claim, surges can often cause the loss of personal data. So, as they say, prevention is better than cure.”

Step one: system protection

Consider all lines leaving or entering the building, including power supply, telephone and lighting lines, TV and satellite connections, connections for PV systems and so on.

• DEHNshield protects power supply technology.

• DEHNbox is used for telephone connections.

• DEHNrail and BLITZDUCTOR XT protect heating systems.

• DEHNguard surge arrestors protect further distribution boards, particularly low voltage.

Step two: protection of terminal devices

The next step is to protect all terminal devices, which are fed by several power supply systems, by installing surge protective devices at their inputs. These terminal devices include TVs, video and stereo equipment, as well as alarm and video surveillance systems.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.