Dishonest employees can destroy a business

Access & Identity Management Handbook 2006 Surveillance

Pressure on bottom lines, intense ­competition and long working hours are part and parcel of what it takes to ­succeed in any business today.

What companies do not have to accept, though, is additional financial pressure caused by dishonest employees - a phenomenon that is undermining the overall profits of South African companies and organisations, according to Francois Smuts, product manager of Elvey Security Technologies' closed circuit television (CCTV) division.

"It is tough enough to make it in business without your employees ripping you off," he says, referring to staff members who help themselves to money and merchandise as liabilities. These, he says, are hidden, expensive partners who can - and do - take businesses into bankruptcy. "We regularly encounter people with little in the way of ethics or morals who steal from their employers without any guilt or sense of wrong-doing," says Smuts.

Referring to the findings of Elvey's most recent trend study on dishonest employees, Smuts says people find reasons to justify stealing. These include feeling that they are underpaid, unrecognised, unappreciated or even exploited. "Whatever the reason, they convince themselves that they are entitled to a share of the spoils."

Apart from amoral staff members, there are also those whose drug or alcohol problems could put their companies at risk, he adds. "The pay cheques of people with uncontrolled addictions will never be big enough so it is a good idea for management always to be on the alert for the telltale signs of an addict." According to Smuts, these signs include frequent sickness, lying, lateness, absenteeism and a generally shabby or unkempt appearance.

The solution

Monitoring lies at the heart of combating employee dishonesty, says Smuts, whose experience in this field spans 18 years. "There are many ways to monitor your employees with today's evolving security technology, the best and most accurate of which is video surveillance in the form of remote video management systems."

Today's top-of-the-range systems allow for staff monitoring at any given time, unlike traditional video surveillance systems that recorded their surrounds solidly without a break. "There is no longer any need to go through hours of video footage if everything you need to know is being sent to you as it happens via a smart video management system that only records footage of pre-assigned events," says Kenny Chiu, marketing manager of Elvey Security Technologies. "Business owners do not want to spend hours looking through video footage and now it is possible for them to receive video e-mails of events in realtime," he added. "With the latest in video technology, business owners have the freedom to simply login and view what is happening on their premises via camera at any time of the day or night, and wherever they are in the country or world."

Being able to preset a camera to take pictures at given times and then having the images sent immediately to an e-mail address or cellphone, is just one of the many innovative aspects of today's technology, continues Chiu. "The capabilities of these systems go far beyond video alarm verification. One example is that businesses can now reduce their onsite guard requirements through automatically scheduled video guard tours, with huge cost savings.

"Another great application is the availability of 'open/close' video reports which allows owners to see who opened and closed the business, whether anyone was with them and if they carried anything away with them when they left."

For Chiu, there is no doubt that digital technology and video streaming have enabled businesses to move into an era where they are able to conduct comprehensive video surveillance and store the resulting evidence indefinitely.

This, he says, can create an environment of awareness which will play a significant role in deterring dishonesty since staff will be aware of the very real risk of getting caught stealing. "It will also provide companies with the necessary proof to take action against dishonest employees," he concludes.

For more information contact Kenny Chiu, Elvey Security Technologies, +27 (0) 11 401 6700, kenny.chiu@elvey.co.za, www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.