Avoid reputational damage

Issue 9 2020 News & Events

Over the past months, technology companies have run onto the market at a fast pace without considering the simple fact that clients are trying to limit the collateral damage of an active biological threat. This threat can deliver deadly outcomes and the investment that is spent calls for ‘professional responsibility’ that supersedes the ego of the lazy practitioner that simply buys the first thing they see, or uses the services of an inexperienced and uneducated advisor or installer without checking.

Months ago, the International Security Industry Organisation (ISIO) posted articles to limit the level of COVID-19 collateral damage and addressed technology and equipment, besides layered manpower by skillsets. We are gob-smacked to still see technology (already illegitimate in some countries) trying to enter the market or misinforming the market about their technology and equipment.

Implications

• What are the implications to the technology supplier, security consultant/advisor or sales outlet that is peddling ‘bad’ equipment?

• What are the implications of not installing, training or using the equipment properly?

• What are the implications for security managers if they are purchasing illegitimate equipment or equipment that is not installed correctly or used properly? Do you think they will get a job again when they are interviewed by someone that knows what is going on?

Transparency and Accountability

• Do the company’s technology advisor, security manager and training manager report to their seniors that the equipment and technology is not suitable and they must re-purchase again, or do they hide the fact?

• Can they take the chance of being the ostrich and not doing anything, hoping that no one finds out?

An active biological threat that can deliver life-impacting or deadly outcomes speaks for itself. They should not feel alone because many are in this situation – all people were desperate and at least they tried to do what they needed to do. Some people that are chasing the fast buck and have no conscience will be found out. They will lose their standing – word gets around.

Solution

There are two reference points to check for the right equipment, correct methods of installation and using such. Both reference points must be checked as they are different tasks. These are laid out in the security protocols besides other COVID-19 protocols that talk to fields of interest, because this is not a one-size-fits-all kind of thing. All are available on the intelligence guidance centre link on ISIO (www.intsi.org) and on HIM (www.human-investigation-management.com) websites.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The human element remains the cornerstone of success
News & Events
Gallagher Security, has unveiled its Security Industry Trends Report 2025, offering insights into the rapid evolution of security systems and the broader role they play in business operations worldwide.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
The IoT trends shaping a smarter, more connected future
IoT & Automation News & Events
The Internet of Things (IoT) is revolutionising sectors across Africa. In 2025, IoT is expected to continue driving digital innovation, enhancing operational efficiencies, and enabling the creation of smarter, more sustainable ecosystems.

Read more...
New AI advisor for robot selection
News & Events Industrial (Industry) AI & Data Analytics
Igus’ new AI chatbot has been added to its online platform to enable companies with little previous experience and technological expertise to quickly and reliably put together Low-Cost Automation (LCA) solutions to become more competitive.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...