Instant security?

March 2013 Integrated Solutions

The most common mistake I encounter with clients is them jumping to a particular solution. They want me to develop and implement that solution (CCTV, card access, alarm products, audit procedures etc.) instead of defining their problem and going through a functional design process. It is amazing how much money they waste without solving the problem before I can get them to stop and answer my questions.

The other day I sat in a security meeting of a large corporate company with all the managers present in the meeting, and again I realised that people in South Africa do not understand security. The impression is still that security is perceived the same as going to the store and buying a soda or a plug-in alarm system. Companies do not do proper planning in regards to security.

This company had very poor security and as I tried explaining the concept of security risk assessment to them, I realised that their time-line was far too short. The more I tried to explain to them the importance of having their security assessed to determine all the vulnerabilities, of which they had plenty, the importance of checking all aspects of their security, that only after the assessment and understanding their unique working circumstances, a proper security plan could be established, they were only interested in a quick, instant solution. The final security plan must then ultimately put their management in charge of the security. Eventually the meeting was dismissed, but I still do not think that they really understood what I was explaining to them.

They still have the mindset that security is the last item on the agenda, so it is not very important, and that you do not spend a lot of money on security. They still give the impression that they see security as just a guard with a baton and a dog.

Keeping in mind that I was sitting in a boardroom of this large corporate entity surrounded by managers, the questions these managers were asking me clearly showed that they never give their company’s security much thought. That they were still looking for an instant solution after I explained security risk assessment to them in detail was very disconcerting. This also proved that the security of their company as well as many other corporate companies in South Africa is in a very poor state. Security is never on the top of their priority lists and hence not given much thought.

Below I have compiled a list of common mistakes companies make with regards to security.

Common mistakes made in security

* Security based on guesses.

* Do not have time for security.

* Not informed about the best ways to secure their property.

* Not in control before or after criminal attack.

* Security system that is always too small (too little capacity).

* No security plans for the future.

* Never make sure that all security providers are PSIRA registered.

* No training (employees and security officers).

* Never having conducted an independent security risk assessment.

* Always employing the lowest bidder to provide security services.

* Not having a proper security budget.

* Most organisations view their physical security measures as an expense, not an asset.

* Physical security is viewed as a secondary concern compared with information system security.

* Do not read a security risk proposal completely.

* The person reading the proposal does not understand the purpose of the assessment and the final goal that is to be achieved.

* Allowing friends or family members to do the security installations/arrangements.

* Security based only on one leg (desire/opportunity/ability).

* Thinking because it worked in the past and that is how we will continue to do it.

* Copy security plans of one property to implement at other properties.

* Ignoring the most important step in the security process, such as having an independent security risk assessment done.

“Currently wisdom comes from disaster.” This perfectly illustrates the attitude of most South Africans towards the security of their business and homes. It should not take a nasty crime incident, resulting in huge financial loss, or even worse, before we wake up to reality.

For more information contact Alwinco, +27 (0)71 319 4735, [email protected], www.alwinco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.