10 Ways To Prevent Workplace Violence

10 ways to prevent workplace violence in your organization (1)

Workplace violence is a potential safety and security risk that must command committed attention from every organization. Any credible act of bully, harassment, aggression, intimidation, assault, and attack carried out within the confines of a business place can pass this test. Workplace varies in nature and culture; so, does the threats of violence. Some business places may be prone to this threat than some others. For instance, the threat of workplace violence will be high in health and medical facility, hospitality and night club, production or manufacturing organizations. Same phenomenon may score low in corporate settings like financial offices, ports, county/government offices and other corporate arena. However, regardless of environment, threat of  violence against persons holds water across board. Occupational safety which resonates closely with workplace violence was recently prioritized by the state of California in US through passing into law of SB 553 which now makes it mandatory for employers to have in place “an effective workplace violence prevention plan”. Hence, it becomes unlawful and illegal for an organization in California not to have in place a comprehensive and effective prevention plan for potential attacks in business settings. This move underscores the significance of putting the safety of world’s first assets (human resources) first and other resources next. Organizations have obligation to ensure safety of all persons at their work premises, regardless of the purpose of visit. To activate processes and communication towards fulfilling this obligation is the way to go for any business who truly prioritize occupational safety. Workplace violence is a very complex security threat, because it targets human resources which are key drivers to business success. David Burke’s act of extreme aggression on flight 1771 of Pacific Southwest Airlines in December 7, 1987 which led to the plane crash and the death of forty-three persons onboard is a classic example of a determined attacker in act of workplace violence.  Here are five common types of workplace violence: Crime based: this occurs in active crime scene where the victim is not a primary target, however, got caught up in the web. Customer based: this is where a customer transfers aggression of frustration against a worker, a fellow customer or some others. Worker based: this occurs when a disgruntled or unstable worker goes berserk. The act may be against an employer, a fellow workers, or others. David Burke’s flight 1771 case was a good example of worker-based workplace violence. Owner-based: this obtains when the employer is the one attacking persons in the business premise. Such attack could be against a worker, a customer, a vendor, etc. Authority based: this type is done by persons who use their statutory authority to unleash violence on others in a workplace. Example is when on-duty law enforcement personnel carry out aggression against defenseless citizens. Redflags for workplace violence that must be taken seriously. Substance abuse Workplace toxicity Subtle act of bullying Uncontrollable emotion Fascination for violence Direct or indirect threats Obsessive acts of stalking Uncontrollable temperament Subtle violation of simple rules Subtle lack of respect for authority Sense of entitlement to “authority shield”. 10-Ways to prevent and mitigate workplace violence: Carry out risk assessment: this will enable the organization determine its exposure to this threat. Establish workplace violence prevention policy and plan: the policy as a statement of intent will set the tone and the plan will roll out follow-up reactions. Engage the workforce and communicate the policy to them: workers and other stakeholders must be informed of the position of the business about it. Activate security measures and controls: such controls should be embedded in physical and procedural security operation; e.g., surveillance, alarm, and visibility. Create incident reporting and response channel: there must be open channels for victims and observers to speak up about signs or occurrence of attack. Respond promptly: every perceived suspicion or real act of workplace violence must be visited with full wrath of the policy and plan. Provide support system: those who might suffer direct or indirect impact of attacks should receive necessary supports that are legally available as a duty of care. Ensure smart hire through background check: organization must know who they want to hire and the implications or otherwise of such hire. Maintain continuous training: beside onboarding inductions, organizations must continue to keep workers aware of its stance on the subject. Carry out random drug and alcohol test in the premise: such exercise will expose persons who may likely be a threat to the workplace. Threats of attack at business place is a security risk that must receive deserved attention and prioritization. Prevention is the best approach. When its early warning beams, it should not be taken for granted. As complex as it appears, this piece has highlighted some strategic approach to apply. ALSO READ: How Your Organization Should Prepare For Civil Disturbance

Benefits Of Employee Background Check

employee background check

Employee background check is a key business tool every organization must deploy and optimized as access control. Hiring the right candidate for a position is critical for success of any business. Employee background check is a conscious activity to prove or disprove claims made by applicant seeking job opportunity in an organization. It is a verification exercise to know the veracity of information provided about an individual. Honest, discipline and good candidates abound in the labor market however, in their midst are also dishonest, dirty, criminal and evil-minded candidates who always disguise as good fit seeking job opportunity. The conduct of a criminal minded and unfit employee (s) can put an organization out of business in one fell swoop. In a modern world characterized by shrinking employment opportunities, it is expected that available jobs will attract many applicants, who out of desperation will be willing to give misleading information or withhold material facts about themselves.  Due diligence demands that organizations must consciously screen candidates through different lens before opening their doors. While other skillset remain import for success in the job, integrity stands out as key trait to seek during hire. Employee background check is the tool. Key security concerns include: Resume fraud Workplace violence Workplace fraud & theft Drug & alcoholic abuse Insider threats The sensitivity of job position should determine the scope and the depth of background check. However, such check must include some of these essentials: Residences Criminal profile Education and certificates Present or previous workplace References & guarantors Credit history Medical history Affiliations Benefits of employee background check to your business: Enables KYE: know your employee can only be made possible by background check. Some business may take informed decision and take a chance to hire someone with questionable background. Such employee will be on close watchlist of the organization. Guarantees safety & security:  rigorous background check will provide assurance that a criminal, irrational or dangerous person was not hired. Safety and security of workplace begins with having good and honest people. Compliance to regulation: employee background check in some areas may be a strict requirement by a regulatory authority. To avoid sanctions or business disruption, it must be done. Prevents negligence hiring: in event of negative actions of an on-duty employee which result to legal reaction; proven employee background check may weaken negligent hire argument against the organization. Reduce employee turnover: the rate of employee turnover will likely be low if your organization have sound background check practice. Reason is, more honest and less dangerous people will be employed. This in turn will decrease chances for employment terminations or dismissals. Increases revenue: it cost money to hire and to fire employee. When organization’s personnel turnover is low, revenue will increase because the business budget for hire and fire is not draining. Furthermore, there will be less disruption in routine operation of the business. Promotes informed decision: when an organization decide to employee a candidate with questionable character; perhaps for technical reasons, it is an informed decision. Such action should be backed up with other countermeasures. Promotes healthy workplace: a workplace full of honest and good people will be healthy and less toxic. Such community will be characterized by trust, confidence, peace and mutual growth. Improves reputation: a workplace full of honest and good people will attract trust and confidence from customers/clients. Customers’ trust builds reputation and increases revenue for the business.  Discourages dishonesty and encourages honesty: an organization with sound background check practice will discourage criminals and dangerous persons from applying to their jobs. In the same vein, honest and good persons will be encouraged to apply for the jobs. Society will grow better with more honest people. In conclusion: employee background check has significant benefits for any organization that truly practice it. The return on investment is high. Prominently, it shuts the gate against criminals and dangerous persons and it increases revenues for the business. ALSO READ: Remote work and the future of the workplace 

Security Guides for Hiring Domestic Workers

Security guides for hiring domestic workers

Security guides for hiring domestic staff is worth all efforts in this era of collapsing extended family system and increasing acceptance of nuclear family. Domestic workers have come to close the gap created by absence of assistance from extended family members. Domestic workers refer to persons employed by a home owner to provide home support services. Domestic workers may include nanny, maid, driver, security, cook, fitness instructor, home teacher or coach. The rich and affluence needs domestic workers to keep their homes running to the satisfaction of their desired glamor. The middle-class group, women empowerment and the increasing presence of working-class mothers have also made it almost inevitable for modern urban families to function normal without hired domestic workers to fulfill home services. Domestic workers in all ramification are creating real time value in our contemporary society. Regardless, there are associated potential security risks when domestic workers are hire without proper due diligence. Employing strangers into your private home automatically exposes yourself and your family to some risks. As such, it is essential to conduct some kind of security checks. Note, not every domestic worker is a criminal; however, the rising cases of both simple, heinous and organized crimes committed by some domestic workers has casted some sort of apprehension in the mind of people who inevitably require their services. Hence, this security guide for public enlightenment. See below basic security guides to apply when hiring and after hiring domestic workers. Hire from trusted source: contract employment of domestic workers to a registered and reputable Human Resources organization. A reputable HR company would carry out expected due diligence and maintain duty of care for its clients during the partnership. As much as possible, avoid artisanal or self-hire. Background check report: this should be mandatory. It would provide insight to past and possibly the present background of the applicant you intend to employ. Police character certificate: a mandatory report to have. This is issued by the Police to show criminal records about an applicant. Social media check: in this age of physical or virtual life it is also key to profile an applicant online using acceptable social media platforms such as Instagram, facebook, Twitter or X, etc. before a job is offered. Have a personnel file: maintain a periodically updated personnel file for domestic workers. Such file should contain relevant data which must include curriculum vitae, updated copy of guarantor forms, copy of recent full-glare photograph, updated copy of utility bill for non-residence workers, updated medical fitness report, a copy of standard identity card, Police clearance report and any other documents considered to have safety and security relevance. Having this updated records about a worker would create some security deterrence effect. Ensure to keep all personal information and records strictly confidential, and restricted access should apply. If the applicant is successful and employment is offered, next phase of guide should include: Periodic medical fitness: to ascertain that applicant is fit to continue work. Monitor life their style: to know their associate, character, behavior, and manner. Do not take for granted any cue or clue which suggest that your domestic worker may possess a dangerous personality or may have motive associated with criminality. Install smart home CCTV: this would show surveillance of activities within the home and provide intelligent insight. Install smart panic alarm: this would be activated for assistance during emergency or dangerous situation. Keep valuables out of sight: this would prevent temptation to steal or to connive with others to organize home theft. Practice emotional intelligence: be humble, treat your workers nice, relate with them as a fellow human, not as slaves. Show empathy and care, give extra assistance when it is necessary. In conclusion: it is believed that a reputable worker will be known, only after employment is given. Having domestic workers indeed exposes your home, yourself and family members to real time potential security and safety risks. It is advised to consciously take precautionary steps to know who you want to employ; during the contract, to know who you have employed. In this era of raw criminality, no efforts are too much to invest to have peace. ALSO READ: Cybersecurity Threat Of Social Engineering

Cybersecurity Threat Of Social Engineering

Cybersecurity threat of social engineering

Cyber security threat is any criminal activity that has potential to take place through the use of computer devices and the internet. There are many types of cybersecurity threats today – they include social engineering, malware attack through viruses and warms, man-in-middle attack, denial of service attack, inject attack and supply chain attacks. This article will focus on and briefly introduce cybersecurity of social engineering. Cyber security threats may come different sources technically known as vectors. Such sources may include state actors, terrorist groups, organized criminal groups, hackers, malicious insiders like; employee, supplier, vendor, competitor, etc. Social engineering happens when a criminal deceives internet users to provide sensitive personal information; the information given is oftentimes used to commit various kinds of crimes against the person or the organization they represent. Social engineering attack makes use of tricks and games to get information from ignorant people and use such information to commit cybercrime. It is a malicious activity. Social engineering is gaining popularity. The trend is also disturbing due to increasing presence of innocent and ignorant computer users who knew next to nothing about it. Social engineering exploit human curiosity, feeling, ignorance, greed, naivety and mistakes to strike. Common types of social engineering attacks include; baiting, phishing, vishing, pretexting, and smishing. See below, brief description of these various methods of social engineering. Baiting: the attacker would lure the user through free gifts and/or others largesse. Phishing: the attacker would send fraudulent email pretending to have come from a trusted source. Vishing:   the attacker would use voice phone call and pretend to come a trusted source. Pretexting: the attacker pretends to represent a trusted authority so as to elicit information from the user. Smishing: the attacker would use fraudulent text message to trick the user. Every act of criminality takes advantage of weak controls or ignorance in some cases. This is technically known as opportunity. With this in mind, the dark web guys (the criminals) prowl on cyber space; spying, hunting, exploiting and experimenting with many of the weak links and the ignorance of users; oftentimes they are successful. To avoid being a victim of social engineering see below; a few recommended guidelines you should practice so as to keep you protected from this menace. Activate 2-factor authentication in all online accounts, including social media. Avoid accessing shared links from strangers, always reconfirm shared links from a known sender. Avoid use of public wifi; if you must use it, do not expose personal information while there. Avoid sharing personal information publicly on social media, it exposes you to criminals. You may wish to patronize software which protects against the threats of social engineering. Do not share personal information or “sent code/pin” to those who would call on phone and claim to be agents from your bank or financial service providers. Visit your bank/others for transactions and confirmations. Do not disclose or click a shared link/code/pin from strangers who would claim to be “Admin” from a WhatsApp group you belong to. Call the Admins to verify and reconfirm before taking decision to accept. Maintain situational awareness (that is, alertness) at all times. Cyber security threat of social engineering is real. It is very common in cyber space where contemporary presence is gaining increasing dominance. Many internet users are not aware of this threat, hence this enlightenment. ALSO READ: CYBERCRIME OF IDENTITY THEFT

Business And Career Opportunities In Private Security Industry

ImgResizer 20240731 0814 08207

Private security industry is growing rapidly globally. It is estimated to worth about 235.37 billion USD in 2023. Contemporary society is faced with myriads of security threats. Virtually every aspect of life has one of security challenges or the other. There are challenges in physical, socio-political, health, economic, cyber, and food security amongst others.  Security challenges have kept abreast with societal development. Of recent, the 9/11 2001 terrorist attack at World Trade Centre in New York USA has completely changed the perception of security and pushed it to front burner of budget proposals. Organizations, being it public or private have obligations to protect their assets including people and information. Those who have the required knowledge, competence and skills to assist in fulfilling these needs are creating values, wealth and confidence and earn from it. Business and career opportunities abound in private security industry and the field is large, it is still expanding. For basic understanding, private security industry refers to all security related functions, services and products outside of public law enforcement and the military. It is driven by private individuals but regulated by government of the state. See below, some business and career opportunities available in private security industry. Contractor to military, police and others: provision of services, supply of kits and various accessories to government security agencies, e.g., Military, Police, etc. Security consultancy: proffer and execute advanced security solutions to meet needs that are peculiar to clients. Training consultancy: develop and sell security related knowledge. Guard force service: provide man-guarding solution to clients. Road or Rail escort: provide road or rail escort to people and cargo. Airport protocols: provide meet, greet, & ease services at airport. Cash-In-Transit escort: provide fortified escort for cash movements to financial institutions. Executive protection: provide intelligence, & physical protection to VIPs and their interests. Bouncer/body guard: provide body-guard protection for personnel and for events. Security kits & accessories: supply security uniform kits and accessories to security companies and others. Canine (K9) dog service provision: provide security dog services to clients. Canine dog training (instructor): breed, train and provide dogs for k9 service companies. Private investigation: provide fact-finding security solutions to clients. e.g., due diligence, routine investigation, background screening and vetting as well as undercover security operations. Technical security (IT based): this involves production, installation & management of surveillance system, software development and franchise, vehicle tracking, drone patrol, system & information security, etc. CCTV Control room operation: provide management, administration & operation at CCTV control room. Security Project Management: this involves executing security projects like physical security installations, calibrations and testing, training, security risk assessment, security content design/development, audit. Marketing & branding: identify and provide market for security solutions. Talk show host: provide security related talk show for public enlightenment and education through radio, tv, YouTube, podcast etc. and security event compere/MC. Security operation and management (practitioners): provide direct security functions to organizations or individuals, e.g., guards, officers, supervisors, coordinators, analysts, managers, directors, vice presidents, etc. Security blogging: provide security information to public through blogging and other journalistic writings, e.g., this article you are reading now. Pipeline protection for oil & gas industry: provide physical security to pipelines, jetties and platforms. Ship/Vessel escort: provide maritime security escort to vessels, boats, fishing trolleys, and others. Community vigilante service (CVS): provide security protection using legal vigilante team in a community. Lease security patrol vehicles: provide security patrol vehicles, motorcycles, bicycles, horses, etc. on lease or hire. Sale of high-profile security gadget: supply security saves, vaults, doors, etc. Exhibition & trade shows: provide/organize security exhibitions and trade shows. Peace & Security NGO: run humanity-based security non-governmental organization focusing on peace and security, e.g., International Peace Bureau. Chaplaincy service (guidance & counseling): provide faith-based support services to security practitioners in the industry. Self-defense academy: provide training on non-lethal self-defense, e.g., taekwondo, karate, aerobics, martial art, etc. Security awareness coach: provide training on basic domestic security to organizations, individuals, families, homes, groups, etc. Write security text books, podcast, DVDs: research and produce security knowledge in soft or hard copy format, e.g., “Access Control” by Azubuike Nwenewo. Defensive driving school: provide defensive driving (driving against adverse condition and/or mistakes from other road users.) service for security protocol drivers. ALSO READ: You Need A Bodyguard

Government Security Agencies In Nigeria

ImgResizer 20240728 2126 05428

Government security agencies are state security institutions established to carry out public security functions. They are charged with responsibility of ensuring public laws and orders, maintain peace and security. To enforce public rules and regulations in the best interest of the public, and to promote human right of the citizenry. This is an all-important responsibility of government. Accordingly, the primary responsibility of any government is the safety and security of her people. The origin of modern state characterized by social contract which emphasized freedom and equality; also, implicitly underscored that civil state must provide safety and security to the populace to guarantee its continued relevance and avoid relapse to state of nature. To meet this demand, government must create, fund, and manage various (as deemed necessary per time) agencies to secure the sovereignty and internal concerns of the state. Nigeria has laudably taken bold steps and created for public law and order, various institutions, agencies and bodies for safety and security of the people. In the land, in the water bodies, in the airspace and other internal concerns relevance to security; the government have them covered. See below, highlight of the agencies and their areas of responsibilities. While some of them are core security agencies, others are quasi-agencies playing complimentary role for public law and order. Some others are playing roles that include collection of revenue for the government. Nigeria Police Force – NPF: is the principal law enforcement agency in the country. Its main responsibilities include preserving law and order, prevention and detection of crime, apprehension of offenders, protection of lives and properties amongst others. Its origin dates back from 1861 to 1930 when it became the national Police Force. Nigerian Army – NA: is the land-based Nigerian Armed Force charged with the responsibilities of preserving the territorial integrity and sovereignty of the country and protect it from all forms external aggression and internal insurrection amongst others. Its origin dates back to 1800s from West African Frontier Force (WAFF). Nigerian Navy – NN: also, a member of the Nigerian Armed Force has security responsibilities which include protecting the country from water front against external aggression and internal insurrection. Its origin dates back to 1956. Nigerian Air Force – NAF: is the air wing of the Nigerian Armed Forces. Its origin was from 1962. Its main duties include to provide air support to ground and sea Nigerian military, and preserve the territorial integrity of the country. Nigerian Customs Service – NCS: was established from 1922. Its duties include collecting and accounting for customs duties and excise, administration of trade and fiscal policies of government, and promoting trade facilitation. Nigerian Immigration Service – NIS: is charged with the responsibility of migration management. it originated from Nigeria Police Force in 1958. Federal Road Safety Corp – FRSC: was founded in 1988. Its duties include preventing accidents on highways, clearing obstruction (unsafe condition) on highways, designing and producing national driver license and vehicle plat numbers. State Security Service – SSS: also, known as Department of State Security (DSS) was part of former National Security Organization which was unbundled in 1986. Its main duties include prevention and detection of crime against the internal security of Nigeria, protection and preservation of all non-military classified matters concerning the internal security of Nigeria. Nigerian Intelligence Agency – NIA: was previously part of former National security Organization, unbundled in 1986. Its responsibilities include general security of Nigeria with focus on outside Nigeria. Defense Intelligence Agency – DIA: had its origin from former National Security Organization which was unbundled in 1986. Its main duties include prevention and detection of crime of military nature against Nigeria, protection and preservation of all military classified matters. Nigerian Correctional Service – NCoS: established in 1872, their functions include to take inmates into lawful custody, produce same in court when it is required, initiate training and reform for inmates, administer prison farms & industry. Nigerian Security & Civil Defense Corp: origin dates back from 1970 to 2003. Their main duties include to assist in maintenance of peace and order, safeguard national infrastructure, respond and rescue civil populace during national emergency, certify, approve and supervise private security guard companies. Nigerian Financial Intelligence Unit – NFIU: was established in 2004 under Central Bank of Nigeria. Its mandate is to work with, and provide credible intelligence to law enforcement and other regulatory agencies in the fight against money laundry and other related crimes. National Drug Law Enforcement Agency – NDLEA: was created in 1989. It is in charge of drug policy and control in Nigeria. Economic and Financial Crime Commission – EFCC: was created in 20024. The main duties include investigation of financial crimes, money laundry, contract scam, advance fee fraud, enforcement of all economic and financial crime laws in Nigeria, and prosecution of offenders. Nigerian Quarantine and Agricultural Service – NAQS: is an agency under the ministry of agriculture and food security. It is responsible for the prevention, entry and establishment and spread of foreign pests and diseases of plants and animals in the country. National Agency for the Prohibition and Trafficking in Person – NAPTIP: was created in 2003. It has mission to protect all persons against human trafficking. Independent Corrupt Practices & Other Related Offences Commission – ICPC: was established in year 2000 to fight corruption, receive complaints about corruption, investigate and prosecute offenders. Note, that all government security agencies described above were duly and lawfully established by Acts of National Assembly. Their powers and authorities were derived from these Acts, as such they operate as legal entity for government law enforcement. ALSO READ: YOUTH UNEMPLOYMENT IN NIGERIA

Cybercrime of identity theft

ImgResizer 20240727 2211 51816

Cybercrime is any criminal activity that takes place through the use of computer devices and the internet. The growing trend of identity theft has been a source of concern to many people, especially business owners who stand to risk losing so much whenever they suffer any attack from cyber criminals. There are many types of cybercrime but this article will focus on and briefly introduce one known as identity theft. And proffer some guidelines on how to avoid being a victim of it. IDENTITY THEFT: this is defined to mean fraudulently using someone’s personal information to obtain benefits in different forms; at the expense of the owner of such information. Some examples are; using another person’s personal information to get attention, and from it collect loans and credits, using another person’s information to have access to the person’s online banking or mobile banking application, then transfer monies belonging to such person to another bank account owned or controlled by the criminal, etc. This phenomenon is increasingly gaining popularity especially in cyber space where many innocent and ignorant people expose themselves. Another reason it is common in our modern society is because many people who reside in urbans and cities own bank accounts, and use more online transactions than physical one. It is also very common now to see people spend more time on computers, especially mobile phones doing different things. While using these computers, they sometimes give out many personal information such as date of birth, national identity number, bank verification number known as BVN, password and codes. Criminals in cyberspace are always hunting for this sort of information. When they have them; the owner’s identity will be stolen; theft and other crimes will be committed against such owners. Every act of fraud (that is, crime) thrives on weak controls which is called opportunity. With this in mind, the dark web guys (the criminals) prowl on cyber space; spying, hunting, exploiting and experimenting with many of the weak links. Oftentimes, they are successful. To avoid being a victim of identity theft see below; a few recommended guidelines. Use 2-factor authentication in all online accounts, including social media. Avoid accessing shared links from strangers + reconfirm shared links from a known sender. Avoid use of public wifi; if you must, do not use personal information while there. Avoid sharing personal information publicly on social media. You may wish to patronize software which provides security protection against identity theft. Do not rush to contribute to “social media solicitations” from your circle seeking help for emergency or other issue – make voice calls to the solicitor for confirmation. Do not share personal information or “sent code/pin” to those who would call on phone and claim to be agents from your bank or financial service provider. Do not disclose or click a shared link/code/pin from strangers who would claim to be “Admin” from a WhatsApp group you belong to. Call the Admins to reconfirm. Do not rush to send money to persons who would call you and claim there is “serious health emergency” involving your friend or family member. Request name and address of the hospital handling such emergency – if given, send some nearby whom you know to go for physical confirmation, otherwise ignore. Maintain situational awareness (that is, alertness) at all times. Identity theft is real. It is very common in cyber space where contemporary presence is more dominant. ALSO READ: Ethical Issues Of Artificial Intelligence In Healthcare

12 Ways To Protect Your Vehicle Against Theft

ImgResizer 20240722 1707 25395

  Protecting vehicle against theft should be a priority to every car owner. Vehicles are locked and porous without conscious efforts for further fortification. From towing & loading, hot wiring electrical manipulation; to manual key picking, on-board diagnostics (OBD) key cloning and relay attack (the latest one) vehicles appear to be tilting towards less security each day. Criminals apparently seem to be ahead of many vehicle security controls. With no sense of indictment, vehicle manufacturers are conscious of this fact. However, there is a need for a more kind of defense-in-depth approach to securing vehicles against theft and saving owners from the trauma of losing these costly assets. Vehicles are pricey assets which in most situations take a lot of planning to acquire. It makes sense to ensure it is protected against theft and other threats. Threats against vehicles are as old as the automobile industry itself. Of all these threats; theft appears to be common and most worrisome. Vehicles are parked at owners’ risk is a popular disclaimer signage (that is, caution) used by facility owners to absolve themselves from direct and vicarious liability over threats against vehicles. Within our local communities, urban cities and trans-border areas tales abound about vehicle theft using various means by criminal elements. The annual value of stolen vehicles across countries and regions varies depending on factors such as vehicle technology, location, type of vehicles, trends in vehicle preference, socio-economic issues, effectiveness of law enforcement efforts and awareness of vehicle owners. Furthermore, the global value of stolen vehicles is estimated to be in billions of dollars annually. In the United States in the year 2020, over 810, 000 vehicles were reported stolen. This is up from above 700, 000 vehicles reported in 2019. The National Insurance Crime Bureau (NICB) reported that the value of value of property losses due to vehicle theft that occurred in 2020 was estimated at over seven billion US dollars. Again, this increased from 2019 which was approximately about six billion, four hundred million US dollars. In the European Union (EU), about five hundred and five thousand vehicles were reported stolen in 2019. It is essential to note that the above stats may fluctuate from year to year due to changes in crime rates, economic conditions, and other factors. Other States with vital crime statistics may be higher, lower or hover around the same figure with the United States of America and the EU. A thieving “industry” valued at above figures in a single year must elicit concern from those impacted by it. Hence, the need for information such as provided in this article. Vehicle Security should start the moment the desire and the resources to purchase it are available. This article is written for both vehicle owners and intended vehicle owners. It provides information on already available tools, ways and means of protecting vehicles against theft and how to consciously plan and secure vehicles against the threat. The excitement of having a vehicle must also extend to securing it. Otherwise, such excitement may suffer upset and become short-lived due to acts of crime from underworld criminals who promote pain and derive joy in the pain of others. Factors that mostly affect vehicle security include manufacturing technology, other advanced technology, law enforcement, and public awareness. This article is written as a knowledge contribution to public awareness. See below; twelve recommended tools and guidelines to further secure your vehicle against theft. 1. Ensure there is baseline security in the environment where the vehicle is parked. 2. Lock vehicle doors, windows and trunk at all times whenever it is stationary. 3. Lock vehicle steering, and/or brake, accelerator, tire whenever it is on stationary. 4. Engrave vehicle identification number (VIN) or vehicle registration number on some parts of the body parts; example, side mirrors, windscreen, etc. 5. Retrieve vehicle particulars from it whenever it is parked in location with fluid security. 6. Get comprehensive insurance cover for the vehicle. 7. Install smart telematic tracker to track vehicle’s location. 8. Install smart remote starter to start and off the vehicle from a near distance. 9. Install smart vehicle alarm to call attention to it whenever it is threatened. 10. Install smart immobilizer to turn off the engine and stop the vehicle from further movement. 11. Install smart kill switch to stop vehicle keys from completing its function and preventing it from starting. 12. Keep vehicle keys in Faraday box or pouch to prevent them from sending signals each time. This is applicable only to keyless starter vehicles. ALSO READ: Gunmen Kill Woman, Abduct Others on Lagos-Ibadan Expressway

Opay Controversy: Safeguarding Trust in the Digital Finance Age

IoT In Agriculture And Its Application

On the 2nd day of October 2023, a video circulated throughout social media showing Opay agents storming the financial institution’s office in Lagos. This was due to large sums being removed from Opay users’ accounts and transferred to unknown accounts. Other activities included purchasing airtime and receiving calls from loan companies, as the account holders’ phone numbers matched their account numbers. The trust level of customers of the Digital Finance company in Nigeria is depleted. The earlier controversy was used to make many fear the financial risk sensed through the enragement of the agents in the video. The customers’ confidence was shattered. This made them indict the Opay company as a scam. The incident was reported by TVC News, whose credibility raised suspicious concern among Opay users. Opay, as a Digital Finance company, had been a lifeline, especially during the strenuous cashless policy of the Central Bank of Nigeria (CBN) under the leadership of the then Governor, Godwin Emefiele. During this period, Nigerians began to trust Opay for transactions. This was because of their no transaction fees, swift, and fast services, as opposed to other commercial Banks which had network failure and were unable to meet customers’ expectations. The period of the cashless period controversy led to the discovery of this Fintech company by businesses, it was a renowned and vast payment method and with this Opay built customer confidence, security of funds due to their fast alerts, and safety from scams. It is in the nature of Nigeria to be paranoid,  that is, at any hurdle, they label a digital finance company as a scam. This is because of their experience with companies like MMM and others, which made many Nigerians go bankrupt. So, to win customers’ confidence in the country is hard. Many Nigerians had to withdraw their funds from Opay to prevent potential bankruptcy immediately the video surfaced, and they advised their friends to do so. Nigerians are not to be blamed; the nature of Nigerians’ present situation has made them a little bit skeptical of Digital Finance companies. Coupled with the fact that their offices cannot be located easily, which makes them a little skeptical of their funds. Opay is a one-stop mobile-based platform for payments, transfers, loans, savings, and other essential services. Opay Digital Service Limited is a company founded by Opera Norway AS Group with emerging markets across Asia, Africa, and Latin America in countries like Mexico, Nigeria, Egypt, and Pakistan. Opay is a digital finance company. A digital finance company, also known as a fintech (financial technology) company, is a business that leverages technology to provide financial services and solutions to individuals, businesses, or other organizations. As a company that operate primarily in the digital space, using online platforms, mobile apps, and advanced software to deliver a wide range of financial services. Opay offers services such as Digital Payments, Online Banking, Investment and Wealth Management, Lending (though through other services), and, Remittances. Other Digital Finance companies in Nigeria include: Interswitch, Paystack, Flutterwave, Carbon (formerly Paylater), Kuda Bank, Cowrywise, Renmoney, Paga, and Opay.  These companies must adhere to regulatory requirements and data security standards to ensure the safety and protection of customer information and transactions The company (Opay) is keen on the security of its customers, they do so by continuously analyzing risks that could affect customers and mitigating them before something wrong could happen. They use risk assessment methodology, which is consistent with PCI-DSS standards. The company went further to build the Continuous Awareness Training Programme, which helps the company’s personnel or staff to gain and test their knowledge against possible security threats like phishing or stealing passwords. The company also got PCI-DSS Compliance Level 1 Certification, which is proof that its product is built and maintained in alignment with all security standards. Notably, Opay is insured by NDIC, which means Nigerian Deposit Insurance Corporation. They are a system the government set up to protect depositors against the loss of their insured deposits placed with member institutions in the event that a member institution is unable to meet its obligations to depositors. NDIC protects the Insurance Fund and saves customers from scams by keeping it with the CBN and investing the Fund in safe but liquid financial instruments such as Treasury Bills, Federal Government Bonds, and instruments of similar nature. Opay is licensed by the central bank to operate as a microfinance and NDIC, which provides sound risk management in the Nigerian banking system. In defense of its integrity, Opay issued a disclaimer over the allegations, assuring customers that the video was old and the allegations were resolved in collaboration with relevant stakeholders. The failure of the Nigerian banking sector made Opay rise to prominence, and the resurfacing of the video might have resulted from rivalry aiming to bring down the company’s reputation. Your favorite Opay bank is secure, and customers’ accounts and funds remain safe.

Ribadu: Mbah has Put an End to Insecurity

Ribadu: Mbah has Put an End to Insecurity

Nuhu Ribadu, the National Security Advisor (NSA), has praised the Governor Peter Mbah administration’s efforts to put an end insecurity in Enugu State, claiming that the administration has brought the state’s level of insecurity to a complete halt. Governor Peter Mbah praised the Economic and Financial Crimes Commission (EFCC) for its accomplishments in combating corruption. He reaffirmed the administration’s commitment to a relentless fight against corruption and insecurity, stating that it is essential to the endeavor of elevating Enugu’s economy from $4.4 billion to $30 billion and eradicating poverty. As the Special Guest of Honor at the EFCC Enugu Zonal Command Complex official commissioning on Tuesday, 19 December 2023, Ribadu reaffirmed the Federal Government’s commitment to fighting corruption and insecurity nationwide, stating that the administration of President Bola Tinubu had no place for dishonest law enforcement and EFCC officials. “We want to thank you so much for the good work you are doing, not just for Enugu State but for our country,” he remarked, addressing the Governor, Your Excellency, the landscape is evolving. Things are getting better around here and we are getting better. Of the very few who have demonstrated that it is feasible, you are one of the very few.  In Enugu State and therefore throughout the South East, security is returning to normal. And you are leading the charge in it. We acknowledge this and appreciate the excellent work you are doing. Things are becoming better for the economy. It is evident. Insecurity is what you’re addressing. We are certain that with leaders such as yourself, the common issues, and human obstacles we have faced in the past will be history. We wish you and everyone else who is working hard to bring order back to Nigeria, our encouragement.  “The Governor came out boldly and bravely when we interacted with him here in June. He promised to try his hardest to bring the peace back. Because we get daily reports of activity, our records and data show that there are many instances, days, weeks, and even months where we have not documented a single act of violence, incidence of terrorism, or even kidnapping.  In Enugu State, and therefore throughout the South East, they are drastically declining. Everything has evolved. “Unfortunately, attacks on police stations and law enforcement personnel occurred before the election of this administration.” “Individuals who are not even in Nigeria will sit in their comfortable homes in other countries and give commands to others telling them not to go to work or seek out their means of subsistence.” others used to obey these kinds of directives. But that’s over; it’s not happening anymore. We appreciate the Federal Government’s involvement and the leaders who have risen in the South East. “We are grateful to the Governor of Enugu State. He performed a fantastic job. Additionally, urged this state’s citizens to back him. He’s performing admirably. We are pleased with the current state of affairs in Enugu State and, by extension, the South East. In the course of bolstering security, he restated the Tinubu administration’s pledge to provide every Nigerian with a feeling of equality, justice, and fairness in all aspects of life. Governor Mbah also spoke, praising security for the excellent work they had done so far in the state and stating that his administration had helped the EFCC rebuild a suitable Zonal Office in Enugu to bolster the fight against corruption and insecurity. To guarantee that Enugu State and Nigeria as a whole may finally put the memories of insecurity in the past, we today enjoin the security services and EFCC to continue their excellent job. “The establishment of this agency serves as another evidence of our country’s continued commitment to battling corruption. Given the numerous, established harms that corruption causes to economic growth, this commitment is well-founded. In light of this, he said, “It is obvious that corruption has to be reduced to the barest minimum within the State, given the administration’s goal to make Enugu one of the top three states in Nigeria in terms of GDP and achieve a zero percent rate in the poverty headcount.” Read Also: Kano Guber: There is no Plan to Compromise Supreme Court Judgement -APC To restore the country’s reputation, EFCC Chairman Ola Olukoyede urged his colleagues to step up and make use of all the resources and facilities available to them in the fight against corruption. “I want to reassure His Excellency, as well as the people of Enugu State and the South East area, that scammers are not welcome anywhere in the zone with this facility. “Much is expected of him to whom much is given. For the South East to experience the full impact of the EFCC on our development, I demand that every employee have a double commitment to the Commission’s duty,” he said.