The security industry is a critical resource for the pandemic

Issue 3 2021 News & Events

The CBRN (chemical, biological, radiological or nuclear warfare) sector is mostly made up of academics and professional practitioners that research and consider the above-mentioned threats.

For natural disasters, the governmental-related body has their academics and manpower that take full responsibility for servicing security, medical and feeding and housing the population because they are paid for it through taxes.

For biological threats, the governments, for specific reasons, use the military and police function on a macro level in managing specific protocols on the ground. However, it is the private security industry which is much larger than the military and police in some countries, that will play its part on the ground.

Actually, the two bodies that play an important role are the health community that set protocols (infection testing, social interactions and hygiene) for biological threats and the security industry that rolls the health protocols out and manages the implementation on the ground.

Boots on the infected ground

However, the security industry does more. The security industry adds security protocols to the mix because there are issues relating to tools (technology and equipment) that are used, the behaviour of the people and the crime related to the threats, being the threat itself and the outcome of the threat being the economic meltdown.

It is virtually impossible for the military and police to manage the health protocols, investigate the amount of and type of new crime in this scenario besides managing the numbers of people involved.

The CBRN community comprehend the fact that there are millions of private security practitioners on the ground that are actually doing the job of taking temperatures, managing the flow of people and ensuring hygiene criteria are met. Therefore, they realise that it is the private security industry, the largest force on the ground, that limit the collateral damage, as it is and that also has the equipment and skilled manpower to do so.

This current mutating biological threat has taught some lessons to some that bothered to be present and relevant and the flip side is that some in the security industry do not realise that they are actually doing biological threat security.

Now, based on the recent experiences, the private security industry has researched the issues related to this pandemic and thoroughly investigated specifics taking into consideration various issues.

When 911 happened, the security exhibitions grew in size because of two primary reasons. Firstly, at the same time IP (Internet Protocol) technology began to display their wares and all technologies entered the market with their solutions, be it biometrics, IP access control and IP driven CCTV, etc., which was mostly geared towards counter terrorism.

When COVID-19 began, once again the manufacturers entered the market with thermal imaging technologies, of which some did not comply with the Department of Health criteria. The health community have protocols relating to taking the temperature of people and have also explored the criteria for using thermal imaging. Unfortunately, there are brands that do not conform to the standards out of ignorance to the factual criteria and also there are some that provide misinformation about their capabilities.

It is the security industry that went through this scenario during 911 which brought about laboratories to test brand performance of emerging technologies and equipment. This means that the protocols for managing a biological threat and using technology or equipment must conform to the Health Department, besides labs that check brand performance.

Health protocols in public spaces

The health community has set protocols for social distancing but has not realised that the population are not sheep. The security industry knows that the behaviour of people can be extremely aggressive and volatile. Having said such, there are security practitioners that themselves have not acknowledged that their team on the ground are on ground zero where the staff are more at risk than medical teams such as nurses or doctors.

In a hospital the medical teams know who is infected and who is not. They then have protocols to dress according to the threat and apply the 'dress-code' using specific protocols. They have been trained in such. On the ground, the security practitioners have no idea of who is infected and who is not infected. They handle people that are shouting and perhaps pushing others around without out any form of medical grade protection or the full complement of protection gear that is used by ICU wards.

The protocols for managing people in security is by layering specific staff with certain character traits or skillsets to ensure a safe environment for the public and themselves. Security companies that are not using protocols place their client's customers at risk, besides their own staff. When customers avoid going to a site, the client loses revenue. This is not about loss prevention but more so profit protection. Furthermore, new crime and increased numbers of criminals erode and impact the profits of a site.

The CBRN teams may suggest certain steps to take, but at the end of the day it will be the private security industry that will roll it out and manage it on the ground.

If the security industry does not stand together and use the same protocols that fit standards and compliance criteria, then it will not be able to limit the level of collateral damage as it should with a mutating biological threat.

When the security industry does take action then it will earn the trust and respect from the CBRN community, the health community and the public at large.

The International Security Industry Organisation (ISIO) and the Central Association of Private Security Industry (CAPSI), representing +7 million practitioners, call on all stakeholders to participate alongside on this mission.

Find out more at www.intsi.org




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Wialon announces integration with fleet maintenance and optimisation platform
News & Events Transport (Industry) Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details are printed as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.