Security tips for businesses

February 2009 Integrated Solutions

Crime is part of our everyday lives and it is therefore imperative for business owners to be vigilant and ensure they do not become part of the ever growing statistics.

Chubb South Africa is constantly working with the South African Police Service (SAPS) to combat the current situation and suggests some of the following ways in order to keep one step ahead of today’s criminals.

1. Consider the basic security issues first. Keep temptation at bay by keeping valuables out of sight, especially at night.

2. Train your staff on basic security principles. For example, the need to challenge strangers on the premises, closing window blinds at night, locking cabinets etc.

3. Ensure everyone understands entry/exit procedures.

4. Ensure your premises are well lit in the evenings.

5. Ensure staff are equipped in understanding how to deal with a fire, from using the various types of extinguishers through to evacuating the premises.

6. Always use a South African Intruder Detection Services Association (SAIDSA) approved security firm.

7. Remember cheap security is no security. Do not regard security as a cost, a good security approach can reduce your insurance premiums and improve staff productivity because they feel more secure.

8. In addition, take a broad view of security. The more you integrate your approach, the more you save and the better your security will be.

9. The life cycle of an alarm system is typically around five years. Chubb recommends a review of an installed system every two to three years with a major review after a five-year period.

10. Do not rely on an old alarm to work without regular servicing.

11. Any alteration in the structure or layout of your business or any major change in the value of the risk, should also be included in the re-assessment of your security system.

12. Do not rely on an alarm sounder only. An alarm without a response is just a noise. Ensure your alarm is monitored.

13. The onus rests firmly on the client to regularly test his/her alarm and ensures that their chosen security company’s monitoring centre is receiving regular signals.

14. Make sure your security provider has updated records of your correct contact details and those of your key holders.

15. Use your burglar alarm to its full potential. Your burglar alarm should be properly managed and checked on a regular basis to ensure that it is fully operational.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...