Insider Threat Management And Guide

Insider Threat Management And Guide

Insider threat whether intentional or accidental can significantly harm your organization by causing financial loss, business disruption, reputational damage, and sometimes breach of compliance and associated sanctions and possible fine. This article aims to draw attention to this subject and briefly outline how to preventively manage insider threat. Suffice to say, many businesses tend to underestimate the presence, dangers and capabilities of insider threats. These set of people hide under genuine employees, vendors, contractors and partners; pretend to serve interest of the organization where as in reality, they pose serious threat. What is insider threat? Insider threat is any security risk that come from people within the organization. This maybe anyone who by virtue of their roles have access to sensitive information and other corporate resources capable of being used against the business. There are two types of insider threat. One is intentional threat, the other is accidental threat. The former is oftentimes premeditated and by impulse, the latter is by ignorance or accidental. Insider threat management refers to internal strategies and processes which a business can deploy for prevention, detection and response to potential threats posed by persons within the organization. Element of insider threat management should include; Risk assessment: will indicate the organization’s threat exposures and vulnerable areas to prioritize protection controls. Policy and procedure: will guide persons on standard operating procedures and the expected role behaviors. Training and awareness: will keep people informed about organization’s security culture and the present of insider threat. Surveillance and monitoring: will notified that every activities within the organization is being monitored for accountability. Insider threat response plan: will prepare the organization to promptly respond to risk of insider threat. It may be a stand-alone, or part of a composite plan. Continuous improvement: will activate reviews for improvement. 8-Controls Against Insider Threat: Maintain Consistent Background Check: employee background check is a conscious activity to prove or disprove claims made by applicant seeking job opportunity or already working for the organization. It is a verification exercise to know the veracity of information provided about an individual. Through background check a person with criminal history will likely be detected and denied employment so as to protect the organization from loss and embarrassment. Prioritize Risk Assessment: risk assessment is designed to know the potential threats that can cause harm and frustrate goals and objectives of a business. Risk assessment can identify most vulnerable areas to be exploited by insider threats, and proffer control measures. Conscious Of User Behavior: user behavior analytics otherwise known as UBA is popular in cyber security. It is designed to monitor, track and analyze behaviors of individuals in a setting for specific security purpose. While this concept tightly fits in cyber security, it can also loosely apply to physical security especially for specific individual who are suspected to pose significant security risks to organization. Through user behavior analysis; trends, patterns, early warning and redflag would be identified. Ensure Access Control: access control regulates in and outflow of persons and materials within a location. For better efficiency; organizations should practice role-based access control (RBAC) where by individuals are permitted access to areas, systems and resources that relevant to their functions. Enforce Policy And Control: policy as a statement of intent must be back up by behavior control measures to ensure compliance by stakeholders. Where this is lacking, will become a vulnerable context for insider threat to exploit. Deploy Physical Security: through people, procedures and technology. This measure will provide security and safety protection to physical assets. It serves to warn and caution insider threat actors of apprehension in the event of attempted security breach. Maintain Relevant Training Program: people will know better about organization’s security policy, standard and measures when they are consistently trained. Such trainings can be achieved through structured class, toolbox talk, sensitization and periodic electronics updates and games. Practice Reward And Sanction: honest acts should attract rewards; dishonest acts should attract sanctions. This is because reward pays, and sanction punishes. In conclusion, organizations must recognize existence of insider threat and that it is near impossible to identify and eliminate it entirely. However, solutions can be developed and implemented for prevention, detection and response. By implementing a custom designed strategy; organizations can proactively manage this potential threat and cultivate a culture of strong security. ALSO READ: Security Guides for Hiring Domestic Workers

Small Business; A 5 Step Guide to Start.

Small Business; A 5 Step Guide to Start

Starting up a small business in this modern age involves a lot of process that requires thorough planning, making important decisions, taking steps for growth, and implementing strategies for the success of the business. Whether you are an experienced entrepreneur or you’re new to the business world, if you want to become your own boss, having your idea to sell or product to sell isn’t enough to start a small business. There’s more to starting up than having your ideas or products ready. There is an approach that needs to be followed to ensure the business is a success and that it is well sustained. If this approach is ignored, the business will fail even before starting it. By following this 5 step guide, you will be on a journey of turning your dream business into a successful and thriving one.   Step 1; Create Ideas When you decide to start a small business, you have to create ideas on what product or services you want to sell. This can be gotten from your passion, skills, or hobbies. Whatever idea you choose to go with, make research about the business idea, the type of audience or customer to target, and the benefits your idea will give your customers.   Step 2; Create your Business plan After generating your business idea and making the necessary research about the entire business you want to venture into, a proper business plan needs to be generated. A business plan entails the activities of a business and the strategies set to achieve the set goals of that business. Create a name for your business: generate name that resonates well with your business idea Look out for a suitable location for your business, whether you want to choose a physical store or you want to make it online. This depends on the type of business and the type of customers you want to target. Also, state your business goals, mission and vision in a way that will promote your business. Make plans for marketing strategies that will enhance the success of your business   Step 3; Source for Funds/Capital Most people venture into starting up a business without plans for finance sustainability. The absence of this crucial step wrecks most business immediately they start. Funds is very important in starting up your business. This can be sourced in various ways and this can be through personal funds, investments from friends and families, taking out loans. This will keep the business running.   Step 4; Register your Business Business registration with the appropriate body in your state or country is very important, it helps your customers know that you’re legit. If your business is solely owned or a partnership, it should be registered so it can be recognized.   Step 5; Launch of the Business To launch your business, you need to out up a team that will help you build your business and has the same goal to ensure the success of the business. Plan successful marketing strategies that will help move the business forward. After these things have been put in place, then you can launch your product or services for the public. After launching your business, then you can move on as a proud business owner, selling your product or services to your target audience while making profits for you and your business as well.   In conclusion, starting a business involves proper planning, making key decisions and implementing key strategies to make it thrive and successful. These steps will guide you to creating a successful business. Cheers to being your own boss! ALSO READ; Small Business – 6 Steps to Create a Successful Marketing Plan  

Security Operations Centre – SOC Essentials For Physical Security Operation

Rear view of security system operator looking at CCTV footage at desk in office

Security Operations Centre otherwise known as SOC is a central hub for security operations. The concept was originally applicable to cybersecurity operations. However, it is no more an exclusive field. Futuristic physical security is increasingly optimizing its operation through adaption of this niche functions of surveillance and response. With Artificial Intelligence dominating business world, Security Operations Centre is indeed the future of security value. The reality of future physical security is such that most organizations would go full automation. This disruption will lead to sharp drop on reliance on physical deployment of guardforce personnel. Many routine roles of guardforce that require less decision making will likely be replaced with automation. Given above scenario; most corporate security departments are currently expanding their traditional CCTV control room operation to reflect a classic Security Operations Centre settings. In this configuration, the SOC will be equipped with skilled personnel for complex tasks that would essentially include monitoring, analyzing and responding to security threats. Security Operations Centre will serve unique function, dedicated to using analysis of observed event to direct and guide field security operatives to respond to emerging security incidents within a facility or distant location being monitored remotely. In the age of Artificial Intelligence, the importance of Security Operations Centre cannot be relegated. It would play crucial roles in shaping the future of physical security operations. Field security force who are serving as quick response force – QRF would rely on SOC to activate response to security incident. See below, the summary of security routine security functions to be integrated into Security Operations Centre. Controlling access to premises and assets. Monitoring people, locations and activities. Managing security incidents. Responding to emergencies. Supporting investigations. Enforcing compliance to company rules and regulations. Reporting incidents. The two types of Security Operations Centre – SOC:  Managed SOC – this is an outsourced SOC, to a third-party service provider. It may be located onsite or offsite command centre operated by the vendor. Dedicated SOC – this is a proprietary or inhouse SOC; owned and operated by an organization. It is usually located onsite, however; it maybe tasked to manage various offsite locations that belong to same organization. It is correct to brand such, a command centre SOC. Security Operations Centre technologies and tools: Access Control System – ACS: this tool is deployed for management of access control. It makes use of pre-enrolled card, pin, code, fingerprint, facial or voice recognition, etc. SOC runs the enrollment, privileges, activations, deactivations, data analysis and archiving, etc. for efficient operation. Visual Surveillance System – VSS: this technology provides SOC with cameras, DVRs, cables, videowalls, spot monitors, dedicated software/application, etc. for real-time remote monitoring of people, assets/locations & activities. Intrusion Detection System – IDS: this comprised of alarms, alerts and prompts; it may be visual and/or audio. IDS relies on sensors to collect data, analyzers to process data, and response mechanism to initiate appropriate actions which SOC would act on. Standard Operating Procedures – SOP: this sets step by step guides on required response of SOC per event and the overall functions. It provides framework for uniformity, consistency and standardization in Security Operations Centre. Composition of SOC team: Tier 1 personnel: this is an operator and level 1 analyst. Tier 2 personnel: this is an operator with added functions and authority above tier 1. Tier 3 personnel: this person handles supervisory or coordinator roles; having authority above tier 1 & 2 personnel. SOC Manager: this person should be responsible for overall SOC resource management. Primary functions of SOC include: Monitor – this function requires active surveillance on cameras, alarms, and alerts. Analyze – requires making sense of people, location and event being monitored. Detect – identifies abnormal, odd, out of place, threats and security breach event. Respond – requires taking actions in response to events or incident. Communicate – entails reaching out to other functional personnel about the incident. Collaborate -demands working with the entire team from start to initial and final close of the incident. Record – will require documenting every piece of information about the incident. Investigate – entails fact-finding focused on what-when-where-who, how & possible why. Report – is about providing fact-based account or testimony of the incident. Archive– store and protect data, and exhibits about the incident using chain of custody guide. Security Operation Centre is the future of physical security operations. It is been driven by Artificial Intelligence. Its adoption will disrupt traditional physical security functions. It has potential for huge return on investment. Your organization’s CCTV control room operation can be expanded and transformed to SOC. ALSO READ: A Christian Journey That Started With Theft

7 Benefits To Choosing Corporate Security Trainings And Certifications

7 benefits & guides to choosing corporate security trainings and certifications (1)

Corporate security trainings and certifications are the way to go in order to remain competitive and relevance in the industry. Corporate security industry is currently attracting professionals from various backgrounds. A corporate security professionals may come from the public law enforcement or the private industry. One of the things that unify these professionals on the job is the security trainings they have received and the industry network they affiliate with. There are many institutions, organizations and bodies currently providing topnotch corporate security trainings and certifications. While some have attained local acceptance, others have gone global with widespread acceptance. While most of the trainings have general application to all sectors; others are narrower and more dedicated to clustered sectors. Note, corporate security training may be tailored for either certificate or certification. Certificate has no expiration, as such do not require retraining to have validity. However, certification has expiration period ranging from three or five years; as such it requires retraining through continuous professional education to maintain validity. Experience has shown that the industry places more value on certification than certificate. It is also import to know that certifications are oftentimes more expensive in cash and kind. 7 Benefits of corporate security trainings and certifications include; Knowledge: it gives detailed understanding of the subject. Competence: it gives skill to apply knowledge to problem solving. Confidence: it gives assurance of self-trust and right fit for the job. Authority: it makes the holder a subject matter expert. Validation: it confers recognition and acceptance to the holder. Credibility: it confers reliability and trust to the holder. Network: it provides common link/fold to professionals in the industry. As business world keeps evolving, security and safety as enabler has come to centre stage in the corporate world. it is commanding resources at increasing pace. Corporate organizations have come to appreciate and prioritized the inevitable security risks associated with modern business, as such they are willing and ready to foot the bills for any resource professional who is hands-on to manage these risks and achieve expected results. Having the right corporate security training can make you that professional resource person worthy of those bills. To give leadership and authority to security the industry professional who runs the function must possess requisite competence and skillset to drive the overall corporate objectives. The leadership roles may vary in title, power, and authority; however, they are often tied to managing corporate physical security risks. As a security professional, to qualify for hire to these advance positions first requires you must have integrity and be trustworthy. Other baseline qualification may include academic diploma or degree as the case maybe. Furthermore, reasonable personal sacrifice will be demanded of you in terms of continuous training for up-to-date knowledge through recognized industry certifications. This is because, security as an ever-changing field needs continue professional education to keep up with changes and trends in the risk landscape. To remain relevant and to keep advancing in the job, it is advised you maintain the pace of learning after the initial trainings. This learning can be achieved through relevant advanced courses, workshops, and other specialized trainings. The choice of corporate security trainings can be tough sometimes, especially for those who are new in the industry. The first advice is that training and certification choice should be strategic. It must not be made in haste and on random or herd-mentality basis. These trainings are expensive in terms of funding, commitment and time. 7-Guides to Choosing Corporate Security Training and Certifications: Strategic decision: first guide is that you must be strategic in choosing trainings and program. Connect your past, present and future goals to your choice of trainings. Avoid crowd and certificate mentality.  The ultimate goal should be the knowledge and the potential values therein. Natural ability: know your natural ability. What are you naturally good at in relation to security functions? Is it leading others, managing resources, fact-finding, researching and training, organizing event, driving supply-chain, etc.? Career goals: your decision for training program should be preceded by your personal preferences and career goals. What specialty functions holds more value to you? What can you make of that function in the next five, ten or twenty years or potentially after retirement? Your niche: this is a specialized segment of the market with a unique kind of product or service. security is very wide and wild, creating your niche will stand you out as a brand and for early success. Interest & preference: train as a generalist but go deeper with the program that aligns with your field of interests; examples are banking/finance, aviation, maritime, FMCG, hospitality, real estate, etc. these clustered sectors have dedicated trainings and certifications. Mentorship: it is good to get a genuine mentor who is already ahead. Such will make the journey less challenging. Market demand: what trainings and certifications is the market asking for? Note, some certifications have attained huge acceptance in the industry, while some others are still in the formative stage. Having come this far, here are list of some notable organizations and institutions who are currently running recognized and acceptable corporate security trainings and certifications. American Society for Industrial Security – ASIS CPP: Certified Protection Professional PSP: Physical Security Professional PCI: Professional Certified Investigator Nigerian Institute for Industrial Security – NIIS CSS: Certified Security Specialist CLRM: Certified Lead Risk Manager CLFE: Certified Lead Forensic Examiner International Security Management Institute – ISMI CSMP: Certified Security Management Professional International Foundation for Protection Officers – IFPO  CPO: Certified Protection Officer CPOI: Certified Protection Officer Instructor CSSM: Certified Security Supervision & Management ISO-SEC CSM: Certified Security Manager CPSM: Certified Physical Security Manager CINTA: Certified Intelligence Analyst Corp Security International: CSA: Certified Security Associate CSM: Certified Security Manager CSI: Certified Security Investigator Other narrower and clustered corporate security trainings and certifications currently regulated and known in the industry include; Maritime/Oil & Gas security BOSIET: Basic Offshore Safety Induction & Emergency Training HUET: Helicopter Underwater Escape Training PFSO: Port Facility Security Officer CSO: Company Security Officer SSO: Ship Security Officer Air … Read more

How To Prevent Workplace Theft

Workplace theft what your organization should know and do (1)

Workplace theft is a nightmare to every business owner. This threat refers to a property crime which occur within a work setting with intent to run down the business. It may involve company or personal property. For instance, if a customer’s car was stolen from a company’s car park regardless a cautionary disclaimer; it is a workplace theft. Similarly, if a business keeps experiencing inventory shrinkage at its warehouse, organized stealing is active there. As a business open its doors to different individuals who are perceived to have values that would assist to drive goals of such business, chances are some persons with ulterior motive will likely mix up, if the process is not watertight to detect the attempt. It is said, a thief at workplace will steal as much as the business permits. Workplace theft oftentimes is an organized crime. It requires well thought-out organized strategy. Business owners, insurance managers, corporate security risk managers’/asset protection practitioners, law enforcement agents, statutory courts, etc. have continue to device controls and mechanisms against this threat however, its trend has remained unabated. In most cases, criminal actors who are involved in stealing at workplaces are successful because of many factors which prominently include opportunity, motivation and rationality. Here are some hard beliefs about workplace theft: Thieves steal as much as the business permits. Workplace theft can be curtailed to barest minimum. Workplace theft is a craft, mastered by some persons. Employees and others steal from business for various reasons. 10% of workers may never steal from your company, no matter the condition. 80% of worker might steal from your company, if given the opportunity, or under motivation and rationality. 10% of worker will actively look for ways to steal from your company. There are about 90% chances that stealing would happen at your organization.  What may contribute to workplace theft include: Opportunity to steal Pressure from various sources Perceived chance of detection Workplace security culture Job satisfaction Personal greed Vengeance Rationalization Socialization/subculture Tone from the top -TFT Available markets for stolen items what can be stolen? Physical assets Sensitive information Money Time Peace Potential victims of workplace theft: Business owner Risk manager Employees Management team Your organization can approach this threat through prevention, detection & response. See brief highlight. PREVENTION: Carry out background checks on workers and other stakeholders Make the workplace ethical & friendly Show genuine care for workers Promote job satisfaction and job security Activate functional security controls through people, process & technology DETECTION: Maintain functional security controls Carry out periodic audit RESPONSE: Have a strong policy and standard Workplace theft must never be romanced Be consistent and firm in implementing the policy and standard In concluding this piece: note that thieves will always be amongst the workforce who prowl the labour market to seek hire. If your business grants them the opportunity, they would come in and settle.  These thieves, having settled at the organization can steal only as much as the organization permit through available or created opportunity. The recommended strategies to manage this threat should be built around prevention, detection and response. Opportunity for stealing at business place must be consciously blocked. ALSO READ: Benefits Of Employee Background Check

10 Ways To Prevent Workplace Violence

10 ways to prevent workplace violence in your organization (1)

Workplace violence is a potential safety and security risk that must command committed attention from every organization. Any credible act of bully, harassment, aggression, intimidation, assault, and attack carried out within the confines of a business place can pass this test. Workplace varies in nature and culture; so, does the threats of violence. Some business places may be prone to this threat than some others. For instance, the threat of workplace violence will be high in health and medical facility, hospitality and night club, production or manufacturing organizations. Same phenomenon may score low in corporate settings like financial offices, ports, county/government offices and other corporate arena. However, regardless of environment, threat of  violence against persons holds water across board. Occupational safety which resonates closely with workplace violence was recently prioritized by the state of California in US through passing into law of SB 553 which now makes it mandatory for employers to have in place “an effective workplace violence prevention plan”. Hence, it becomes unlawful and illegal for an organization in California not to have in place a comprehensive and effective prevention plan for potential attacks in business settings. This move underscores the significance of putting the safety of world’s first assets (human resources) first and other resources next. Organizations have obligation to ensure safety of all persons at their work premises, regardless of the purpose of visit. To activate processes and communication towards fulfilling this obligation is the way to go for any business who truly prioritize occupational safety. Workplace violence is a very complex security threat, because it targets human resources which are key drivers to business success. David Burke’s act of extreme aggression on flight 1771 of Pacific Southwest Airlines in December 7, 1987 which led to the plane crash and the death of forty-three persons onboard is a classic example of a determined attacker in act of workplace violence.  Here are five common types of workplace violence: Crime based: this occurs in active crime scene where the victim is not a primary target, however, got caught up in the web. Customer based: this is where a customer transfers aggression of frustration against a worker, a fellow customer or some others. Worker based: this occurs when a disgruntled or unstable worker goes berserk. The act may be against an employer, a fellow workers, or others. David Burke’s flight 1771 case was a good example of worker-based workplace violence. Owner-based: this obtains when the employer is the one attacking persons in the business premise. Such attack could be against a worker, a customer, a vendor, etc. Authority based: this type is done by persons who use their statutory authority to unleash violence on others in a workplace. Example is when on-duty law enforcement personnel carry out aggression against defenseless citizens. Redflags for workplace violence that must be taken seriously. Substance abuse Workplace toxicity Subtle act of bullying Uncontrollable emotion Fascination for violence Direct or indirect threats Obsessive acts of stalking Uncontrollable temperament Subtle violation of simple rules Subtle lack of respect for authority Sense of entitlement to “authority shield”. 10-Ways to prevent and mitigate workplace violence: Carry out risk assessment: this will enable the organization determine its exposure to this threat. Establish workplace violence prevention policy and plan: the policy as a statement of intent will set the tone and the plan will roll out follow-up reactions. Engage the workforce and communicate the policy to them: workers and other stakeholders must be informed of the position of the business about it. Activate security measures and controls: such controls should be embedded in physical and procedural security operation; e.g., surveillance, alarm, and visibility. Create incident reporting and response channel: there must be open channels for victims and observers to speak up about signs or occurrence of attack. Respond promptly: every perceived suspicion or real act of workplace violence must be visited with full wrath of the policy and plan. Provide support system: those who might suffer direct or indirect impact of attacks should receive necessary supports that are legally available as a duty of care. Ensure smart hire through background check: organization must know who they want to hire and the implications or otherwise of such hire. Maintain continuous training: beside onboarding inductions, organizations must continue to keep workers aware of its stance on the subject. Carry out random drug and alcohol test in the premise: such exercise will expose persons who may likely be a threat to the workplace. Threats of attack at business place is a security risk that must receive deserved attention and prioritization. Prevention is the best approach. When its early warning beams, it should not be taken for granted. As complex as it appears, this piece has highlighted some strategic approach to apply. ALSO READ: How Your Organization Should Prepare For Civil Disturbance

How Your Organization Should Prepare For Civil Disturbance

how your organization should prepare for civil disturbance 1 transformed

Civil disturbance is any organized mass mobilization of civil groups for expression of disagreement or dissatisfaction over a course through open and public demonstration. Such course oftentimes includes government actions or policies, civil right concerns, animal right, business concerns, and socio-economic or religious issues. Civil disturbance may occur in form of industrial strike where an interest group may decide to down tool and refuse to work for their organization unless a particular concern is addressed. It may be a protest where some civil groups march on the streets or other locations with placards to show dissatisfaction about a concern. Civil disturbance can come as a demonstration – where the concern groups march in different form within the community to show non-acceptance or disagreement over a course. Other coercive ways civil disturbance may take place include picketing, lockout, riot and stay-at-home. This forms are usually marked by intent for commotion and violence. In the fast-evolving contemporary world characterized by volatility, uncertainty, complexity and ambiguity otherwise known as VUCA it makes sense for organizations to be prepared to respond to civil disturbance with its potential for business disruption in different ways. Many countries of the world are currently faced with challenge of dealing with and addressing civil disturbance. Regardless of the form a civil disturbance takes, it has potential to cause worry. See below, some common concerns during civil disturbance and the strategic ways your organization can approach and mitigate its impacts. Safety and security concerns: civil disturbance is perceived to be a threat to safety and security of people and assets within the community. In reality, especially in cases where it turns to violence it can actually cause injuries, damages, destruction and even fatality. Apprehension: civil disturbance takes away peace and spread fears, anxiety and uneasiness in the community. This is enough to affect productivity in the workplace. Potential business disruption: civil disturbance can alter routine business activity. E.g., it disrupts movement of people and supply chain. Potential revenue loss: civil disturbance can lead to loss of revenues for businesses impacted by it. Example is when customers, clients and service providers are unable to move around to exchange goods and services. Man-hour loss is also a revenue loss. Elevated risk: civil disturbance has potential to increase business risk especially when it persists beyond anticipated period. It creates uncertainties and increases high cost of doing business. How your organization should prepare for civil disturbance:  Set up BCP committee: business continuity planning committee must be in place. This committee should be comprised of functional leads and other critical stakeholders in the organization. The group will be charged with strategic response before, during and after event of civil disturbance and other emergencies.  Have comprehensive BCP: your organization should have a business continuity plan. This document will provide step by step guide for responding to emergencies which have potential to cause business disruption. The plan should be a fit-for-purpose one; that considers peculiarity of your operating environment. It is recommended that SWOT analysis precedes this plan. Maintain strategic communication: the business continuity plan must make explicit declaration about communication during emergencies. This should include, the focal person, what should be communicated? How it will be communicated? And who should carry out such communication? The essence of strategic communication is to manage panic and to comply with regulatory requirements. Reach out to stakeholder: contemporary business world thrives better on shared resources. Reaching out to community and industry stakeholders during civil disturbance is highly recommended. Such group may include regulatory authorities, law enforcement, and industry players. When you reach out, you will know more and take better informed decision. Maintain frequent updates: it pays better to ensure that frequent updates are provide to your employees and relevant others during civil disturbance. Your workforce will have reasonable trust and confidence for updates shared from trusted authority within the organization than being bamboozled by social media updates. Updates from the organization must be credible, apt and direct enough to reflect the real-time situation report and the approved actions. Civil disturbance is a reality of modern VUCA world. It will always occur in different dimensions. To be prepared for it, is the way your organization should go, so as to mitigate its impact on your business. ALSO READ: Electricity Energy Theft Is A Crime

Benefits Of Employee Background Check

employee background check

Employee background check is a key business tool every organization must deploy and optimized as access control. Hiring the right candidate for a position is critical for success of any business. Employee background check is a conscious activity to prove or disprove claims made by applicant seeking job opportunity in an organization. It is a verification exercise to know the veracity of information provided about an individual. Honest, discipline and good candidates abound in the labor market however, in their midst are also dishonest, dirty, criminal and evil-minded candidates who always disguise as good fit seeking job opportunity. The conduct of a criminal minded and unfit employee (s) can put an organization out of business in one fell swoop. In a modern world characterized by shrinking employment opportunities, it is expected that available jobs will attract many applicants, who out of desperation will be willing to give misleading information or withhold material facts about themselves.  Due diligence demands that organizations must consciously screen candidates through different lens before opening their doors. While other skillset remain import for success in the job, integrity stands out as key trait to seek during hire. Employee background check is the tool. Key security concerns include: Resume fraud Workplace violence Workplace fraud & theft Drug & alcoholic abuse Insider threats The sensitivity of job position should determine the scope and the depth of background check. However, such check must include some of these essentials: Residences Criminal profile Education and certificates Present or previous workplace References & guarantors Credit history Medical history Affiliations Benefits of employee background check to your business: Enables KYE: know your employee can only be made possible by background check. Some business may take informed decision and take a chance to hire someone with questionable background. Such employee will be on close watchlist of the organization. Guarantees safety & security:  rigorous background check will provide assurance that a criminal, irrational or dangerous person was not hired. Safety and security of workplace begins with having good and honest people. Compliance to regulation: employee background check in some areas may be a strict requirement by a regulatory authority. To avoid sanctions or business disruption, it must be done. Prevents negligence hiring: in event of negative actions of an on-duty employee which result to legal reaction; proven employee background check may weaken negligent hire argument against the organization. Reduce employee turnover: the rate of employee turnover will likely be low if your organization have sound background check practice. Reason is, more honest and less dangerous people will be employed. This in turn will decrease chances for employment terminations or dismissals. Increases revenue: it cost money to hire and to fire employee. When organization’s personnel turnover is low, revenue will increase because the business budget for hire and fire is not draining. Furthermore, there will be less disruption in routine operation of the business. Promotes informed decision: when an organization decide to employee a candidate with questionable character; perhaps for technical reasons, it is an informed decision. Such action should be backed up with other countermeasures. Promotes healthy workplace: a workplace full of honest and good people will be healthy and less toxic. Such community will be characterized by trust, confidence, peace and mutual growth. Improves reputation: a workplace full of honest and good people will attract trust and confidence from customers/clients. Customers’ trust builds reputation and increases revenue for the business.  Discourages dishonesty and encourages honesty: an organization with sound background check practice will discourage criminals and dangerous persons from applying to their jobs. In the same vein, honest and good persons will be encouraged to apply for the jobs. Society will grow better with more honest people. In conclusion: employee background check has significant benefits for any organization that truly practice it. The return on investment is high. Prominently, it shuts the gate against criminals and dangerous persons and it increases revenues for the business. ALSO READ: Remote work and the future of the workplace 

Security Guides for Hiring Domestic Workers

Security guides for hiring domestic workers

Security guides for hiring domestic staff is worth all efforts in this era of collapsing extended family system and increasing acceptance of nuclear family. Domestic workers have come to close the gap created by absence of assistance from extended family members. Domestic workers refer to persons employed by a home owner to provide home support services. Domestic workers may include nanny, maid, driver, security, cook, fitness instructor, home teacher or coach. The rich and affluence needs domestic workers to keep their homes running to the satisfaction of their desired glamor. The middle-class group, women empowerment and the increasing presence of working-class mothers have also made it almost inevitable for modern urban families to function normal without hired domestic workers to fulfill home services. Domestic workers in all ramification are creating real time value in our contemporary society. Regardless, there are associated potential security risks when domestic workers are hire without proper due diligence. Employing strangers into your private home automatically exposes yourself and your family to some risks. As such, it is essential to conduct some kind of security checks. Note, not every domestic worker is a criminal; however, the rising cases of both simple, heinous and organized crimes committed by some domestic workers has casted some sort of apprehension in the mind of people who inevitably require their services. Hence, this security guide for public enlightenment. See below basic security guides to apply when hiring and after hiring domestic workers. Hire from trusted source: contract employment of domestic workers to a registered and reputable Human Resources organization. A reputable HR company would carry out expected due diligence and maintain duty of care for its clients during the partnership. As much as possible, avoid artisanal or self-hire. Background check report: this should be mandatory. It would provide insight to past and possibly the present background of the applicant you intend to employ. Police character certificate: a mandatory report to have. This is issued by the Police to show criminal records about an applicant. Social media check: in this age of physical or virtual life it is also key to profile an applicant online using acceptable social media platforms such as Instagram, facebook, Twitter or X, etc. before a job is offered. Have a personnel file: maintain a periodically updated personnel file for domestic workers. Such file should contain relevant data which must include curriculum vitae, updated copy of guarantor forms, copy of recent full-glare photograph, updated copy of utility bill for non-residence workers, updated medical fitness report, a copy of standard identity card, Police clearance report and any other documents considered to have safety and security relevance. Having this updated records about a worker would create some security deterrence effect. Ensure to keep all personal information and records strictly confidential, and restricted access should apply. If the applicant is successful and employment is offered, next phase of guide should include: Periodic medical fitness: to ascertain that applicant is fit to continue work. Monitor life their style: to know their associate, character, behavior, and manner. Do not take for granted any cue or clue which suggest that your domestic worker may possess a dangerous personality or may have motive associated with criminality. Install smart home CCTV: this would show surveillance of activities within the home and provide intelligent insight. Install smart panic alarm: this would be activated for assistance during emergency or dangerous situation. Keep valuables out of sight: this would prevent temptation to steal or to connive with others to organize home theft. Practice emotional intelligence: be humble, treat your workers nice, relate with them as a fellow human, not as slaves. Show empathy and care, give extra assistance when it is necessary. In conclusion: it is believed that a reputable worker will be known, only after employment is given. Having domestic workers indeed exposes your home, yourself and family members to real time potential security and safety risks. It is advised to consciously take precautionary steps to know who you want to employ; during the contract, to know who you have employed. In this era of raw criminality, no efforts are too much to invest to have peace. ALSO READ: Cybersecurity Threat Of Social Engineering

Electricity Energy Theft Is A Crime

Electricity energy theft is a crime

Electricity energy theft refers to deliberate and clandestine use of electricity without paying for it. This criminal activity is becoming increasing and a disturbing phenomenon following the 2013 partial privation of power sector in Nigeria. Currently, the power sector is divided into three components viz; Generation companies, Transmission company and Distribution companies. While private sector organizations are running the Generation and the Distribution companies, Federal Government still runs and manages the Transmission company. How the value chain works is that, generation company would source energy, transmission company would transport it, and the distribution companies would sell it to direct end users. The three hubs must interact to make electricity energy available for customers. Electricity theft directly affects distribution companies who interface with end users. However, its adverse effects also indirectly impact generation and transmission subsectors, with overall negative implication for entire Nigerian Electricity Supply Industry – (NESI). The revenue loss incurred by distribution companies due to electricity theft hinders their ability to seamlessly fulfill contractual business obligations to both transmission and generation companies.  About 21 billion naira is estimated as the annual average loss caused by electricity energy theft to the industry. Electricity energy theft is currently witnessing significantly increase. The rising trend is believed to be influenced by service-based tariff (SBT) which was recently introduced and enforced by Nigerian Electricity Regulatory Commission – NERC. The practice categorized electricity customers into five bands with discriminatory service access and tariff. Band A has minimum of 20 hours of power supply and highest tariff Band B has minimum of 16 hours of power supply and high tariff Band C has minimum of 12 hours of power supply and moderate tariff Band D has minimum of 8 hours of power supply and below moderate tariff Band E has minimum of 4 hours of power supply with the least tariff. Investment in energy sector is highly capital intensive. It takes lots of business gut and risk to venture into it. Electricity energy theft is widespread and has become an underground economy where organized criminals unleash their heist to undermine growth in the industry and the overall economy. The Electric Power Sector Reform Act – EPSRA of 2005, through the Nigerian Electricity Regulatory Commission – NERC makes provisions that strongly criminalizes electricity energy theft. The law makes it clear that any person who willfully and unlawfully taps electric connections anywhere, tampers with a meter, damages or destroyed electric apparatus and equipment shall be punished with terms of imprisonment as applicable, between five to seven years. Some states such as Lagos state have also made legislative law that makes electricity theft a criminal offence. The organized criminal agents who carry out electricity energy theft in Nigeria are either aware of these laws but chose to violate them; or they are ignorant about its existence. These agents are suspected to include electricity user customers, staff of the industry, artisanal electrical engineers and others who oftentimes witness and ignore it. What is more? these criminals perceive their malicious acts as “normal”. There is nothing normal in criminality under any guise. The overall negative impacts of electricity energy theft to Nigerian Electricity Supply Industry are wild. It makes the industry economically unviable, as such less attractive to entrepreneurial. It is stunting growth of the industry and the wider national economy as a lot of micro and macro activities depend on power to thrive. It is one of the major contributors to unstable power supply due to inability of the industry to maintain consistent increase in generating target megawatt. Note, Nigeria’s electricity megawatt target was 10000, however, the industry never exceeded 5000 since current inception. Methods of electricity energy theft include: Bypass: run a double connection to bypass normal meter reading, and use electricity direct from the grid. Illegal connection: carry out unapproved connection to undervalue used electricity. Meter tampering: rig meter reading for customer to pay less. Ways to prevent and detect electricity energy theft: Smart metering: adopt installation of smart meters to all electricity users. Smart metering system has capacity to generate user analytics, create patterns, detect and alert control room about attempted and real tampers. Public awareness: create awareness to educate energy users that electricity theft in any manner is a criminal offence and offenders are liable to jail terms of five to seven years. Undercover agent: create undercover and whistleblowing agents who carries out surveillance operation and report credible findings to appropriate authority for necessary and prompt actions. Strict enforcement of extant laws: enforce the laws without bias or compromise where guilt is established. In summary, electricity energy theft is real. It is a criminal activity oftentimes carry out by organized criminal gangs which include customers who use electricity at their homes or businesses. Their activity is largely contributing to instability of the Nigerian Electricity Supply Industry. ALSO READ: Clean Energy: 5 Importance Of Utilizing It