How To Prevent Workplace Theft

Workplace theft what your organization should know and do (1)

Workplace theft is a nightmare to every business owner. This threat refers to a property crime which occur within a work setting with intent to run down the business. It may involve company or personal property. For instance, if a customer’s car was stolen from a company’s car park regardless a cautionary disclaimer; it is a workplace theft. Similarly, if a business keeps experiencing inventory shrinkage at its warehouse, organized stealing is active there. As a business open its doors to different individuals who are perceived to have values that would assist to drive goals of such business, chances are some persons with ulterior motive will likely mix up, if the process is not watertight to detect the attempt. It is said, a thief at workplace will steal as much as the business permits. Workplace theft oftentimes is an organized crime. It requires well thought-out organized strategy. Business owners, insurance managers, corporate security risk managers’/asset protection practitioners, law enforcement agents, statutory courts, etc. have continue to device controls and mechanisms against this threat however, its trend has remained unabated. In most cases, criminal actors who are involved in stealing at workplaces are successful because of many factors which prominently include opportunity, motivation and rationality. Here are some hard beliefs about workplace theft: Thieves steal as much as the business permits. Workplace theft can be curtailed to barest minimum. Workplace theft is a craft, mastered by some persons. Employees and others steal from business for various reasons. 10% of workers may never steal from your company, no matter the condition. 80% of worker might steal from your company, if given the opportunity, or under motivation and rationality. 10% of worker will actively look for ways to steal from your company. There are about 90% chances that stealing would happen at your organization.  What may contribute to workplace theft include: Opportunity to steal Pressure from various sources Perceived chance of detection Workplace security culture Job satisfaction Personal greed Vengeance Rationalization Socialization/subculture Tone from the top -TFT Available markets for stolen items what can be stolen? Physical assets Sensitive information Money Time Peace Potential victims of workplace theft: Business owner Risk manager Employees Management team Your organization can approach this threat through prevention, detection & response. See brief highlight. PREVENTION: Carry out background checks on workers and other stakeholders Make the workplace ethical & friendly Show genuine care for workers Promote job satisfaction and job security Activate functional security controls through people, process & technology DETECTION: Maintain functional security controls Carry out periodic audit RESPONSE: Have a strong policy and standard Workplace theft must never be romanced Be consistent and firm in implementing the policy and standard In concluding this piece: note that thieves will always be amongst the workforce who prowl the labour market to seek hire. If your business grants them the opportunity, they would come in and settle.  These thieves, having settled at the organization can steal only as much as the organization permit through available or created opportunity. The recommended strategies to manage this threat should be built around prevention, detection and response. Opportunity for stealing at business place must be consciously blocked. ALSO READ: Benefits Of Employee Background Check

10 Ways To Prevent Workplace Violence

10 ways to prevent workplace violence in your organization (1)

Workplace violence is a potential safety and security risk that must command committed attention from every organization. Any credible act of bully, harassment, aggression, intimidation, assault, and attack carried out within the confines of a business place can pass this test. Workplace varies in nature and culture; so, does the threats of violence. Some business places may be prone to this threat than some others. For instance, the threat of workplace violence will be high in health and medical facility, hospitality and night club, production or manufacturing organizations. Same phenomenon may score low in corporate settings like financial offices, ports, county/government offices and other corporate arena. However, regardless of environment, threat of  violence against persons holds water across board. Occupational safety which resonates closely with workplace violence was recently prioritized by the state of California in US through passing into law of SB 553 which now makes it mandatory for employers to have in place “an effective workplace violence prevention plan”. Hence, it becomes unlawful and illegal for an organization in California not to have in place a comprehensive and effective prevention plan for potential attacks in business settings. This move underscores the significance of putting the safety of world’s first assets (human resources) first and other resources next. Organizations have obligation to ensure safety of all persons at their work premises, regardless of the purpose of visit. To activate processes and communication towards fulfilling this obligation is the way to go for any business who truly prioritize occupational safety. Workplace violence is a very complex security threat, because it targets human resources which are key drivers to business success. David Burke’s act of extreme aggression on flight 1771 of Pacific Southwest Airlines in December 7, 1987 which led to the plane crash and the death of forty-three persons onboard is a classic example of a determined attacker in act of workplace violence.  Here are five common types of workplace violence: Crime based: this occurs in active crime scene where the victim is not a primary target, however, got caught up in the web. Customer based: this is where a customer transfers aggression of frustration against a worker, a fellow customer or some others. Worker based: this occurs when a disgruntled or unstable worker goes berserk. The act may be against an employer, a fellow workers, or others. David Burke’s flight 1771 case was a good example of worker-based workplace violence. Owner-based: this obtains when the employer is the one attacking persons in the business premise. Such attack could be against a worker, a customer, a vendor, etc. Authority based: this type is done by persons who use their statutory authority to unleash violence on others in a workplace. Example is when on-duty law enforcement personnel carry out aggression against defenseless citizens. Redflags for workplace violence that must be taken seriously. Substance abuse Workplace toxicity Subtle act of bullying Uncontrollable emotion Fascination for violence Direct or indirect threats Obsessive acts of stalking Uncontrollable temperament Subtle violation of simple rules Subtle lack of respect for authority Sense of entitlement to “authority shield”. 10-Ways to prevent and mitigate workplace violence: Carry out risk assessment: this will enable the organization determine its exposure to this threat. Establish workplace violence prevention policy and plan: the policy as a statement of intent will set the tone and the plan will roll out follow-up reactions. Engage the workforce and communicate the policy to them: workers and other stakeholders must be informed of the position of the business about it. Activate security measures and controls: such controls should be embedded in physical and procedural security operation; e.g., surveillance, alarm, and visibility. Create incident reporting and response channel: there must be open channels for victims and observers to speak up about signs or occurrence of attack. Respond promptly: every perceived suspicion or real act of workplace violence must be visited with full wrath of the policy and plan. Provide support system: those who might suffer direct or indirect impact of attacks should receive necessary supports that are legally available as a duty of care. Ensure smart hire through background check: organization must know who they want to hire and the implications or otherwise of such hire. Maintain continuous training: beside onboarding inductions, organizations must continue to keep workers aware of its stance on the subject. Carry out random drug and alcohol test in the premise: such exercise will expose persons who may likely be a threat to the workplace. Threats of attack at business place is a security risk that must receive deserved attention and prioritization. Prevention is the best approach. When its early warning beams, it should not be taken for granted. As complex as it appears, this piece has highlighted some strategic approach to apply. ALSO READ: How Your Organization Should Prepare For Civil Disturbance

How Your Organization Should Prepare For Civil Disturbance

how your organization should prepare for civil disturbance 1 transformed

Civil disturbance is any organized mass mobilization of civil groups for expression of disagreement or dissatisfaction over a course through open and public demonstration. Such course oftentimes includes government actions or policies, civil right concerns, animal right, business concerns, and socio-economic or religious issues. Civil disturbance may occur in form of industrial strike where an interest group may decide to down tool and refuse to work for their organization unless a particular concern is addressed. It may be a protest where some civil groups march on the streets or other locations with placards to show dissatisfaction about a concern. Civil disturbance can come as a demonstration – where the concern groups march in different form within the community to show non-acceptance or disagreement over a course. Other coercive ways civil disturbance may take place include picketing, lockout, riot and stay-at-home. This forms are usually marked by intent for commotion and violence. In the fast-evolving contemporary world characterized by volatility, uncertainty, complexity and ambiguity otherwise known as VUCA it makes sense for organizations to be prepared to respond to civil disturbance with its potential for business disruption in different ways. Many countries of the world are currently faced with challenge of dealing with and addressing civil disturbance. Regardless of the form a civil disturbance takes, it has potential to cause worry. See below, some common concerns during civil disturbance and the strategic ways your organization can approach and mitigate its impacts. Safety and security concerns: civil disturbance is perceived to be a threat to safety and security of people and assets within the community. In reality, especially in cases where it turns to violence it can actually cause injuries, damages, destruction and even fatality. Apprehension: civil disturbance takes away peace and spread fears, anxiety and uneasiness in the community. This is enough to affect productivity in the workplace. Potential business disruption: civil disturbance can alter routine business activity. E.g., it disrupts movement of people and supply chain. Potential revenue loss: civil disturbance can lead to loss of revenues for businesses impacted by it. Example is when customers, clients and service providers are unable to move around to exchange goods and services. Man-hour loss is also a revenue loss. Elevated risk: civil disturbance has potential to increase business risk especially when it persists beyond anticipated period. It creates uncertainties and increases high cost of doing business. How your organization should prepare for civil disturbance:  Set up BCP committee: business continuity planning committee must be in place. This committee should be comprised of functional leads and other critical stakeholders in the organization. The group will be charged with strategic response before, during and after event of civil disturbance and other emergencies.  Have comprehensive BCP: your organization should have a business continuity plan. This document will provide step by step guide for responding to emergencies which have potential to cause business disruption. The plan should be a fit-for-purpose one; that considers peculiarity of your operating environment. It is recommended that SWOT analysis precedes this plan. Maintain strategic communication: the business continuity plan must make explicit declaration about communication during emergencies. This should include, the focal person, what should be communicated? How it will be communicated? And who should carry out such communication? The essence of strategic communication is to manage panic and to comply with regulatory requirements. Reach out to stakeholder: contemporary business world thrives better on shared resources. Reaching out to community and industry stakeholders during civil disturbance is highly recommended. Such group may include regulatory authorities, law enforcement, and industry players. When you reach out, you will know more and take better informed decision. Maintain frequent updates: it pays better to ensure that frequent updates are provide to your employees and relevant others during civil disturbance. Your workforce will have reasonable trust and confidence for updates shared from trusted authority within the organization than being bamboozled by social media updates. Updates from the organization must be credible, apt and direct enough to reflect the real-time situation report and the approved actions. Civil disturbance is a reality of modern VUCA world. It will always occur in different dimensions. To be prepared for it, is the way your organization should go, so as to mitigate its impact on your business. ALSO READ: Electricity Energy Theft Is A Crime

Benefits Of Employee Background Check

employee background check

Employee background check is a key business tool every organization must deploy and optimized as access control. Hiring the right candidate for a position is critical for success of any business. Employee background check is a conscious activity to prove or disprove claims made by applicant seeking job opportunity in an organization. It is a verification exercise to know the veracity of information provided about an individual. Honest, discipline and good candidates abound in the labor market however, in their midst are also dishonest, dirty, criminal and evil-minded candidates who always disguise as good fit seeking job opportunity. The conduct of a criminal minded and unfit employee (s) can put an organization out of business in one fell swoop. In a modern world characterized by shrinking employment opportunities, it is expected that available jobs will attract many applicants, who out of desperation will be willing to give misleading information or withhold material facts about themselves.  Due diligence demands that organizations must consciously screen candidates through different lens before opening their doors. While other skillset remain import for success in the job, integrity stands out as key trait to seek during hire. Employee background check is the tool. Key security concerns include: Resume fraud Workplace violence Workplace fraud & theft Drug & alcoholic abuse Insider threats The sensitivity of job position should determine the scope and the depth of background check. However, such check must include some of these essentials: Residences Criminal profile Education and certificates Present or previous workplace References & guarantors Credit history Medical history Affiliations Benefits of employee background check to your business: Enables KYE: know your employee can only be made possible by background check. Some business may take informed decision and take a chance to hire someone with questionable background. Such employee will be on close watchlist of the organization. Guarantees safety & security:  rigorous background check will provide assurance that a criminal, irrational or dangerous person was not hired. Safety and security of workplace begins with having good and honest people. Compliance to regulation: employee background check in some areas may be a strict requirement by a regulatory authority. To avoid sanctions or business disruption, it must be done. Prevents negligence hiring: in event of negative actions of an on-duty employee which result to legal reaction; proven employee background check may weaken negligent hire argument against the organization. Reduce employee turnover: the rate of employee turnover will likely be low if your organization have sound background check practice. Reason is, more honest and less dangerous people will be employed. This in turn will decrease chances for employment terminations or dismissals. Increases revenue: it cost money to hire and to fire employee. When organization’s personnel turnover is low, revenue will increase because the business budget for hire and fire is not draining. Furthermore, there will be less disruption in routine operation of the business. Promotes informed decision: when an organization decide to employee a candidate with questionable character; perhaps for technical reasons, it is an informed decision. Such action should be backed up with other countermeasures. Promotes healthy workplace: a workplace full of honest and good people will be healthy and less toxic. Such community will be characterized by trust, confidence, peace and mutual growth. Improves reputation: a workplace full of honest and good people will attract trust and confidence from customers/clients. Customers’ trust builds reputation and increases revenue for the business.  Discourages dishonesty and encourages honesty: an organization with sound background check practice will discourage criminals and dangerous persons from applying to their jobs. In the same vein, honest and good persons will be encouraged to apply for the jobs. Society will grow better with more honest people. In conclusion: employee background check has significant benefits for any organization that truly practice it. The return on investment is high. Prominently, it shuts the gate against criminals and dangerous persons and it increases revenues for the business. ALSO READ: Remote work and the future of the workplace 

Security Guides for Hiring Domestic Workers

Security guides for hiring domestic workers

Security guides for hiring domestic staff is worth all efforts in this era of collapsing extended family system and increasing acceptance of nuclear family. Domestic workers have come to close the gap created by absence of assistance from extended family members. Domestic workers refer to persons employed by a home owner to provide home support services. Domestic workers may include nanny, maid, driver, security, cook, fitness instructor, home teacher or coach. The rich and affluence needs domestic workers to keep their homes running to the satisfaction of their desired glamor. The middle-class group, women empowerment and the increasing presence of working-class mothers have also made it almost inevitable for modern urban families to function normal without hired domestic workers to fulfill home services. Domestic workers in all ramification are creating real time value in our contemporary society. Regardless, there are associated potential security risks when domestic workers are hire without proper due diligence. Employing strangers into your private home automatically exposes yourself and your family to some risks. As such, it is essential to conduct some kind of security checks. Note, not every domestic worker is a criminal; however, the rising cases of both simple, heinous and organized crimes committed by some domestic workers has casted some sort of apprehension in the mind of people who inevitably require their services. Hence, this security guide for public enlightenment. See below basic security guides to apply when hiring and after hiring domestic workers. Hire from trusted source: contract employment of domestic workers to a registered and reputable Human Resources organization. A reputable HR company would carry out expected due diligence and maintain duty of care for its clients during the partnership. As much as possible, avoid artisanal or self-hire. Background check report: this should be mandatory. It would provide insight to past and possibly the present background of the applicant you intend to employ. Police character certificate: a mandatory report to have. This is issued by the Police to show criminal records about an applicant. Social media check: in this age of physical or virtual life it is also key to profile an applicant online using acceptable social media platforms such as Instagram, facebook, Twitter or X, etc. before a job is offered. Have a personnel file: maintain a periodically updated personnel file for domestic workers. Such file should contain relevant data which must include curriculum vitae, updated copy of guarantor forms, copy of recent full-glare photograph, updated copy of utility bill for non-residence workers, updated medical fitness report, a copy of standard identity card, Police clearance report and any other documents considered to have safety and security relevance. Having this updated records about a worker would create some security deterrence effect. Ensure to keep all personal information and records strictly confidential, and restricted access should apply. If the applicant is successful and employment is offered, next phase of guide should include: Periodic medical fitness: to ascertain that applicant is fit to continue work. Monitor life their style: to know their associate, character, behavior, and manner. Do not take for granted any cue or clue which suggest that your domestic worker may possess a dangerous personality or may have motive associated with criminality. Install smart home CCTV: this would show surveillance of activities within the home and provide intelligent insight. Install smart panic alarm: this would be activated for assistance during emergency or dangerous situation. Keep valuables out of sight: this would prevent temptation to steal or to connive with others to organize home theft. Practice emotional intelligence: be humble, treat your workers nice, relate with them as a fellow human, not as slaves. Show empathy and care, give extra assistance when it is necessary. In conclusion: it is believed that a reputable worker will be known, only after employment is given. Having domestic workers indeed exposes your home, yourself and family members to real time potential security and safety risks. It is advised to consciously take precautionary steps to know who you want to employ; during the contract, to know who you have employed. In this era of raw criminality, no efforts are too much to invest to have peace. ALSO READ: Cybersecurity Threat Of Social Engineering

Electricity Energy Theft Is A Crime

Electricity energy theft is a crime

Electricity energy theft refers to deliberate and clandestine use of electricity without paying for it. This criminal activity is becoming increasing and a disturbing phenomenon following the 2013 partial privation of power sector in Nigeria. Currently, the power sector is divided into three components viz; Generation companies, Transmission company and Distribution companies. While private sector organizations are running the Generation and the Distribution companies, Federal Government still runs and manages the Transmission company. How the value chain works is that, generation company would source energy, transmission company would transport it, and the distribution companies would sell it to direct end users. The three hubs must interact to make electricity energy available for customers. Electricity theft directly affects distribution companies who interface with end users. However, its adverse effects also indirectly impact generation and transmission subsectors, with overall negative implication for entire Nigerian Electricity Supply Industry – (NESI). The revenue loss incurred by distribution companies due to electricity theft hinders their ability to seamlessly fulfill contractual business obligations to both transmission and generation companies.  About 21 billion naira is estimated as the annual average loss caused by electricity energy theft to the industry. Electricity energy theft is currently witnessing significantly increase. The rising trend is believed to be influenced by service-based tariff (SBT) which was recently introduced and enforced by Nigerian Electricity Regulatory Commission – NERC. The practice categorized electricity customers into five bands with discriminatory service access and tariff. Band A has minimum of 20 hours of power supply and highest tariff Band B has minimum of 16 hours of power supply and high tariff Band C has minimum of 12 hours of power supply and moderate tariff Band D has minimum of 8 hours of power supply and below moderate tariff Band E has minimum of 4 hours of power supply with the least tariff. Investment in energy sector is highly capital intensive. It takes lots of business gut and risk to venture into it. Electricity energy theft is widespread and has become an underground economy where organized criminals unleash their heist to undermine growth in the industry and the overall economy. The Electric Power Sector Reform Act – EPSRA of 2005, through the Nigerian Electricity Regulatory Commission – NERC makes provisions that strongly criminalizes electricity energy theft. The law makes it clear that any person who willfully and unlawfully taps electric connections anywhere, tampers with a meter, damages or destroyed electric apparatus and equipment shall be punished with terms of imprisonment as applicable, between five to seven years. Some states such as Lagos state have also made legislative law that makes electricity theft a criminal offence. The organized criminal agents who carry out electricity energy theft in Nigeria are either aware of these laws but chose to violate them; or they are ignorant about its existence. These agents are suspected to include electricity user customers, staff of the industry, artisanal electrical engineers and others who oftentimes witness and ignore it. What is more? these criminals perceive their malicious acts as “normal”. There is nothing normal in criminality under any guise. The overall negative impacts of electricity energy theft to Nigerian Electricity Supply Industry are wild. It makes the industry economically unviable, as such less attractive to entrepreneurial. It is stunting growth of the industry and the wider national economy as a lot of micro and macro activities depend on power to thrive. It is one of the major contributors to unstable power supply due to inability of the industry to maintain consistent increase in generating target megawatt. Note, Nigeria’s electricity megawatt target was 10000, however, the industry never exceeded 5000 since current inception. Methods of electricity energy theft include: Bypass: run a double connection to bypass normal meter reading, and use electricity direct from the grid. Illegal connection: carry out unapproved connection to undervalue used electricity. Meter tampering: rig meter reading for customer to pay less. Ways to prevent and detect electricity energy theft: Smart metering: adopt installation of smart meters to all electricity users. Smart metering system has capacity to generate user analytics, create patterns, detect and alert control room about attempted and real tampers. Public awareness: create awareness to educate energy users that electricity theft in any manner is a criminal offence and offenders are liable to jail terms of five to seven years. Undercover agent: create undercover and whistleblowing agents who carries out surveillance operation and report credible findings to appropriate authority for necessary and prompt actions. Strict enforcement of extant laws: enforce the laws without bias or compromise where guilt is established. In summary, electricity energy theft is real. It is a criminal activity oftentimes carry out by organized criminal gangs which include customers who use electricity at their homes or businesses. Their activity is largely contributing to instability of the Nigerian Electricity Supply Industry. ALSO READ: Clean Energy: 5 Importance Of Utilizing It

Cybersecurity Threat Of Social Engineering

Cybersecurity threat of social engineering

Cyber security threat is any criminal activity that has potential to take place through the use of computer devices and the internet. There are many types of cybersecurity threats today – they include social engineering, malware attack through viruses and warms, man-in-middle attack, denial of service attack, inject attack and supply chain attacks. This article will focus on and briefly introduce cybersecurity of social engineering. Cyber security threats may come different sources technically known as vectors. Such sources may include state actors, terrorist groups, organized criminal groups, hackers, malicious insiders like; employee, supplier, vendor, competitor, etc. Social engineering happens when a criminal deceives internet users to provide sensitive personal information; the information given is oftentimes used to commit various kinds of crimes against the person or the organization they represent. Social engineering attack makes use of tricks and games to get information from ignorant people and use such information to commit cybercrime. It is a malicious activity. Social engineering is gaining popularity. The trend is also disturbing due to increasing presence of innocent and ignorant computer users who knew next to nothing about it. Social engineering exploit human curiosity, feeling, ignorance, greed, naivety and mistakes to strike. Common types of social engineering attacks include; baiting, phishing, vishing, pretexting, and smishing. See below, brief description of these various methods of social engineering. Baiting: the attacker would lure the user through free gifts and/or others largesse. Phishing: the attacker would send fraudulent email pretending to have come from a trusted source. Vishing:   the attacker would use voice phone call and pretend to come a trusted source. Pretexting: the attacker pretends to represent a trusted authority so as to elicit information from the user. Smishing: the attacker would use fraudulent text message to trick the user. Every act of criminality takes advantage of weak controls or ignorance in some cases. This is technically known as opportunity. With this in mind, the dark web guys (the criminals) prowl on cyber space; spying, hunting, exploiting and experimenting with many of the weak links and the ignorance of users; oftentimes they are successful. To avoid being a victim of social engineering see below; a few recommended guidelines you should practice so as to keep you protected from this menace. Activate 2-factor authentication in all online accounts, including social media. Avoid accessing shared links from strangers, always reconfirm shared links from a known sender. Avoid use of public wifi; if you must use it, do not expose personal information while there. Avoid sharing personal information publicly on social media, it exposes you to criminals. You may wish to patronize software which protects against the threats of social engineering. Do not share personal information or “sent code/pin” to those who would call on phone and claim to be agents from your bank or financial service providers. Visit your bank/others for transactions and confirmations. Do not disclose or click a shared link/code/pin from strangers who would claim to be “Admin” from a WhatsApp group you belong to. Call the Admins to verify and reconfirm before taking decision to accept. Maintain situational awareness (that is, alertness) at all times. Cyber security threat of social engineering is real. It is very common in cyber space where contemporary presence is gaining increasing dominance. Many internet users are not aware of this threat, hence this enlightenment. ALSO READ: CYBERCRIME OF IDENTITY THEFT

Business And Career Opportunities In Private Security Industry

ImgResizer 20240731 0814 08207

Private security industry is growing rapidly globally. It is estimated to worth about 235.37 billion USD in 2023. Contemporary society is faced with myriads of security threats. Virtually every aspect of life has one of security challenges or the other. There are challenges in physical, socio-political, health, economic, cyber, and food security amongst others.  Security challenges have kept abreast with societal development. Of recent, the 9/11 2001 terrorist attack at World Trade Centre in New York USA has completely changed the perception of security and pushed it to front burner of budget proposals. Organizations, being it public or private have obligations to protect their assets including people and information. Those who have the required knowledge, competence and skills to assist in fulfilling these needs are creating values, wealth and confidence and earn from it. Business and career opportunities abound in private security industry and the field is large, it is still expanding. For basic understanding, private security industry refers to all security related functions, services and products outside of public law enforcement and the military. It is driven by private individuals but regulated by government of the state. See below, some business and career opportunities available in private security industry. Contractor to military, police and others: provision of services, supply of kits and various accessories to government security agencies, e.g., Military, Police, etc. Security consultancy: proffer and execute advanced security solutions to meet needs that are peculiar to clients. Training consultancy: develop and sell security related knowledge. Guard force service: provide man-guarding solution to clients. Road or Rail escort: provide road or rail escort to people and cargo. Airport protocols: provide meet, greet, & ease services at airport. Cash-In-Transit escort: provide fortified escort for cash movements to financial institutions. Executive protection: provide intelligence, & physical protection to VIPs and their interests. Bouncer/body guard: provide body-guard protection for personnel and for events. Security kits & accessories: supply security uniform kits and accessories to security companies and others. Canine (K9) dog service provision: provide security dog services to clients. Canine dog training (instructor): breed, train and provide dogs for k9 service companies. Private investigation: provide fact-finding security solutions to clients. e.g., due diligence, routine investigation, background screening and vetting as well as undercover security operations. Technical security (IT based): this involves production, installation & management of surveillance system, software development and franchise, vehicle tracking, drone patrol, system & information security, etc. CCTV Control room operation: provide management, administration & operation at CCTV control room. Security Project Management: this involves executing security projects like physical security installations, calibrations and testing, training, security risk assessment, security content design/development, audit. Marketing & branding: identify and provide market for security solutions. Talk show host: provide security related talk show for public enlightenment and education through radio, tv, YouTube, podcast etc. and security event compere/MC. Security operation and management (practitioners): provide direct security functions to organizations or individuals, e.g., guards, officers, supervisors, coordinators, analysts, managers, directors, vice presidents, etc. Security blogging: provide security information to public through blogging and other journalistic writings, e.g., this article you are reading now. Pipeline protection for oil & gas industry: provide physical security to pipelines, jetties and platforms. Ship/Vessel escort: provide maritime security escort to vessels, boats, fishing trolleys, and others. Community vigilante service (CVS): provide security protection using legal vigilante team in a community. Lease security patrol vehicles: provide security patrol vehicles, motorcycles, bicycles, horses, etc. on lease or hire. Sale of high-profile security gadget: supply security saves, vaults, doors, etc. Exhibition & trade shows: provide/organize security exhibitions and trade shows. Peace & Security NGO: run humanity-based security non-governmental organization focusing on peace and security, e.g., International Peace Bureau. Chaplaincy service (guidance & counseling): provide faith-based support services to security practitioners in the industry. Self-defense academy: provide training on non-lethal self-defense, e.g., taekwondo, karate, aerobics, martial art, etc. Security awareness coach: provide training on basic domestic security to organizations, individuals, families, homes, groups, etc. Write security text books, podcast, DVDs: research and produce security knowledge in soft or hard copy format, e.g., “Access Control” by Azubuike Nwenewo. Defensive driving school: provide defensive driving (driving against adverse condition and/or mistakes from other road users.) service for security protocol drivers. ALSO READ: You Need A Bodyguard

Government Security Agencies In Nigeria

ImgResizer 20240728 2126 05428

Government security agencies are state security institutions established to carry out public security functions. They are charged with responsibility of ensuring public laws and orders, maintain peace and security. To enforce public rules and regulations in the best interest of the public, and to promote human right of the citizenry. This is an all-important responsibility of government. Accordingly, the primary responsibility of any government is the safety and security of her people. The origin of modern state characterized by social contract which emphasized freedom and equality; also, implicitly underscored that civil state must provide safety and security to the populace to guarantee its continued relevance and avoid relapse to state of nature. To meet this demand, government must create, fund, and manage various (as deemed necessary per time) agencies to secure the sovereignty and internal concerns of the state. Nigeria has laudably taken bold steps and created for public law and order, various institutions, agencies and bodies for safety and security of the people. In the land, in the water bodies, in the airspace and other internal concerns relevance to security; the government have them covered. See below, highlight of the agencies and their areas of responsibilities. While some of them are core security agencies, others are quasi-agencies playing complimentary role for public law and order. Some others are playing roles that include collection of revenue for the government. Nigeria Police Force – NPF: is the principal law enforcement agency in the country. Its main responsibilities include preserving law and order, prevention and detection of crime, apprehension of offenders, protection of lives and properties amongst others. Its origin dates back from 1861 to 1930 when it became the national Police Force. Nigerian Army – NA: is the land-based Nigerian Armed Force charged with the responsibilities of preserving the territorial integrity and sovereignty of the country and protect it from all forms external aggression and internal insurrection amongst others. Its origin dates back to 1800s from West African Frontier Force (WAFF). Nigerian Navy – NN: also, a member of the Nigerian Armed Force has security responsibilities which include protecting the country from water front against external aggression and internal insurrection. Its origin dates back to 1956. Nigerian Air Force – NAF: is the air wing of the Nigerian Armed Forces. Its origin was from 1962. Its main duties include to provide air support to ground and sea Nigerian military, and preserve the territorial integrity of the country. Nigerian Customs Service – NCS: was established from 1922. Its duties include collecting and accounting for customs duties and excise, administration of trade and fiscal policies of government, and promoting trade facilitation. Nigerian Immigration Service – NIS: is charged with the responsibility of migration management. it originated from Nigeria Police Force in 1958. Federal Road Safety Corp – FRSC: was founded in 1988. Its duties include preventing accidents on highways, clearing obstruction (unsafe condition) on highways, designing and producing national driver license and vehicle plat numbers. State Security Service – SSS: also, known as Department of State Security (DSS) was part of former National Security Organization which was unbundled in 1986. Its main duties include prevention and detection of crime against the internal security of Nigeria, protection and preservation of all non-military classified matters concerning the internal security of Nigeria. Nigerian Intelligence Agency – NIA: was previously part of former National security Organization, unbundled in 1986. Its responsibilities include general security of Nigeria with focus on outside Nigeria. Defense Intelligence Agency – DIA: had its origin from former National Security Organization which was unbundled in 1986. Its main duties include prevention and detection of crime of military nature against Nigeria, protection and preservation of all military classified matters. Nigerian Correctional Service – NCoS: established in 1872, their functions include to take inmates into lawful custody, produce same in court when it is required, initiate training and reform for inmates, administer prison farms & industry. Nigerian Security & Civil Defense Corp: origin dates back from 1970 to 2003. Their main duties include to assist in maintenance of peace and order, safeguard national infrastructure, respond and rescue civil populace during national emergency, certify, approve and supervise private security guard companies. Nigerian Financial Intelligence Unit – NFIU: was established in 2004 under Central Bank of Nigeria. Its mandate is to work with, and provide credible intelligence to law enforcement and other regulatory agencies in the fight against money laundry and other related crimes. National Drug Law Enforcement Agency – NDLEA: was created in 1989. It is in charge of drug policy and control in Nigeria. Economic and Financial Crime Commission – EFCC: was created in 20024. The main duties include investigation of financial crimes, money laundry, contract scam, advance fee fraud, enforcement of all economic and financial crime laws in Nigeria, and prosecution of offenders. Nigerian Quarantine and Agricultural Service – NAQS: is an agency under the ministry of agriculture and food security. It is responsible for the prevention, entry and establishment and spread of foreign pests and diseases of plants and animals in the country. National Agency for the Prohibition and Trafficking in Person – NAPTIP: was created in 2003. It has mission to protect all persons against human trafficking. Independent Corrupt Practices & Other Related Offences Commission – ICPC: was established in year 2000 to fight corruption, receive complaints about corruption, investigate and prosecute offenders. Note, that all government security agencies described above were duly and lawfully established by Acts of National Assembly. Their powers and authorities were derived from these Acts, as such they operate as legal entity for government law enforcement. ALSO READ: YOUTH UNEMPLOYMENT IN NIGERIA

Cybercrime of identity theft

ImgResizer 20240727 2211 51816

Cybercrime is any criminal activity that takes place through the use of computer devices and the internet. The growing trend of identity theft has been a source of concern to many people, especially business owners who stand to risk losing so much whenever they suffer any attack from cyber criminals. There are many types of cybercrime but this article will focus on and briefly introduce one known as identity theft. And proffer some guidelines on how to avoid being a victim of it. IDENTITY THEFT: this is defined to mean fraudulently using someone’s personal information to obtain benefits in different forms; at the expense of the owner of such information. Some examples are; using another person’s personal information to get attention, and from it collect loans and credits, using another person’s information to have access to the person’s online banking or mobile banking application, then transfer monies belonging to such person to another bank account owned or controlled by the criminal, etc. This phenomenon is increasingly gaining popularity especially in cyber space where many innocent and ignorant people expose themselves. Another reason it is common in our modern society is because many people who reside in urbans and cities own bank accounts, and use more online transactions than physical one. It is also very common now to see people spend more time on computers, especially mobile phones doing different things. While using these computers, they sometimes give out many personal information such as date of birth, national identity number, bank verification number known as BVN, password and codes. Criminals in cyberspace are always hunting for this sort of information. When they have them; the owner’s identity will be stolen; theft and other crimes will be committed against such owners. Every act of fraud (that is, crime) thrives on weak controls which is called opportunity. With this in mind, the dark web guys (the criminals) prowl on cyber space; spying, hunting, exploiting and experimenting with many of the weak links. Oftentimes, they are successful. To avoid being a victim of identity theft see below; a few recommended guidelines. Use 2-factor authentication in all online accounts, including social media. Avoid accessing shared links from strangers + reconfirm shared links from a known sender. Avoid use of public wifi; if you must, do not use personal information while there. Avoid sharing personal information publicly on social media. You may wish to patronize software which provides security protection against identity theft. Do not rush to contribute to “social media solicitations” from your circle seeking help for emergency or other issue – make voice calls to the solicitor for confirmation. Do not share personal information or “sent code/pin” to those who would call on phone and claim to be agents from your bank or financial service provider. Do not disclose or click a shared link/code/pin from strangers who would claim to be “Admin” from a WhatsApp group you belong to. Call the Admins to reconfirm. Do not rush to send money to persons who would call you and claim there is “serious health emergency” involving your friend or family member. Request name and address of the hospital handling such emergency – if given, send some nearby whom you know to go for physical confirmation, otherwise ignore. Maintain situational awareness (that is, alertness) at all times. Identity theft is real. It is very common in cyber space where contemporary presence is more dominant. ALSO READ: Ethical Issues Of Artificial Intelligence In Healthcare