The weakest link

September 2008 News & Events

The saying goes that a chain is only as strong as its weakest link and this is especially true in the world of security. No matter how sophisticated a system or how well trained its personnel, if one aspect of the system is ignored or badly designed the whole solution fails.

While the industry grapples with issues such as the integration of people and technology in the development of security systems, the creation of an holistic process is often ignored in favour of point solutions due to time and cost considerations. A business may want CCTV surveillance for specific benefits it can deliver, not realising what else is required to make surveillance effective enough to deliver the returns desired and what other benefits there are to be derived in the process.

This is where the security industry has a responsibility to act as advisors and consultants to clients, guiding them in the implementation of an effective solution that meets their business or personal goals. Unfortunately, this does not always happen. Some security providers are there to make a buck and then vanish, tarnishing the industry’s reputation in the process. On the other side of the coin, some people consider security a grudge purchase as well as a simple job anyone with a screwdriver can do. Both result in unhappy customers and ineffective solutions.

In this month’s Surveillance/CCTV section, we run an article from Bruce Schneier highlighting some of the failures of CCTV. In particular, he asks if the thousands of surveillance cameras being deployed in cities worldwide are really having an impact on the crime rate. It is a great article that raises some pertinent questions.

It is too late to find out after the installation that your cameras lack functionality or the required resolution. It is also pointless having cameras if you do not have the people who are trained in their use. It is even more pointless having cameras, trained operators but nobody to follow up once the right images are obtained and alarms raised.

I am reminded of a garage owner in Johannesburg whose business was robbed at gunpoint some time ago. The company had CCTV cameras installed and got perfect images of the criminals. Sadly, not even the police were interested in the pictures. Even worse, the criminals knew this and made no effort to hide their faces – why bother when you know there will be no comebacks.

Fortunately this is not always the case as the case studies in the same section prove. A carefully designed system integrating all aspects of the security landscape delivers an effective solution. This only works when an end-to-end solution is employed, highlighting the importance of every person or department in the process and ensuring they all know the role they have to play – and making sure they are equipped to play it.

Getting the buy-in required is a tough job, but it means keeping people and assets safe with the minimum inconvenience or overt intrusion. And that is a win-win situation for everyone.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.