www.securityfocusafrica.com | Vol 38 No 11 November -2020 No 12 December
The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance
Security industry training around Covid-19
In conversation with Deputy Chief Justice Raymond Zondo | 2020 from a legal perspective
S
SINE
S
O
N FO R
B
U
PE
securityfocusafrica.com Security Focus Africa has been marketing suppliers to buyers in Africa since 1980, and is the official industry journal of the Security Association of South Africa. Our readers form the core of Southern Africa’s buyers and decision-makers in the security products and services industry. Our print and digital platforms have a highly-focused readership of people at the very heart of the security industry. Our news is distributed via print, website, digital magazine, and social media. Our annual Security Focus Africa Buyers Guide is searchable in print and via our online directory, with over 760 businesses and branches throughout Africa. Need to find a service or supplier? We will help you find exactly what you need.
PO Box 414, Kloof 3640, South Africa Tel: +27 31 764 6977 | Fax: 086 762 1867 Email: contact@contactpub.co.za
Security Focus AFRICA w w w. s e c u r i t y f o c u s a f r i c a . c o m
The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance
KEEPING YOU IN THE KNOW | CONNECTING PEOPLE WITH PEOPLE
DIGITAL BUYERS GUIDE
to security services & products Promote your business
Attract customers
Increase your sales
Claim your listing on www.securityfocusafrica.com/buyersguide
2 for 1 offer The print listings now mirror our online directory style with basic and premium listings. In fact, upgrading a basic listing in print to premium will include an upgrade to premium on the website and vice versa. The same information online is printed in the print directory.
Security Focus Africa is known for having the most comprehensive directory of service providers in Africa. We have been a trusted source of information for more than 38 years, and now offer this valuable resource online.
The market is tough out there. What makes your business different from any other? For starters, be more accessible on the internet. Online searches are now the preferred method of finding information and contact details, so the better your online presence, the more business you will get.
BENEFITS OF LISTING YOUR BUSINESS: • By claiming your listing, you can keep your company’s information up to date at your own convenience • Upgrade your listing online at any time to maximise your brand exposure • Improve your SEO and online presence • We provide a targeted audience for your business • See your stats – know how many people are seeing your listing
Security
For as little as R2 400 , you can get the edge over your competitors by providing indispensable information to your customers on our online directory.
Affordable advertising is just a click away.
Focus
AFRICA
BUYERS GUIDE
www.securityfocusafrica.com/buyersguide KEEPING YOU IN THE KNOW | CONNECTING PEOPLE WITH PEOPLE
Security Focus Africa: Serving the South African security industry for 38 years
CONTENTS
VOL 38 NO 11 – 12 NOVEMBER – DECEMBER 2020
18
MAIN FEATURE:
Security Focus quarter page October 2020.pdf 1 2020/10/08 14:24:39
SECURITY INDUSTRY TRAINING IN THE TIME OF THE COVID-19 PANDEMIC
18
It’s been a year since the global outbreak of the Covid-19 pandemic; a year that has had a significant effect on the lives and careers of, among others, security guards, necessitating additional training for those tasked with safeguarding public health as well as their own and that of their families.
JUDGES MATTER: SA’S NEXT CHIEF JUSTICE 8 With the tenure of South Africa’s current Chief Justice
DELIVERING PEACE OF MIND FOR ALL INDUSTRIES Nemtek is a leading global manufacturer and supplier of innovative electric fencing products used by many governments, local authorities and industries to protect their utilities, correctional facilities and defence infrastructures.
Mogoeng Mogoeng ending in 2021, it’s time to find his successor, says Judges Matter, an entity formed to monitor the yearly Judicial Service Commission interviews as well as the judiciary, in the interests of public transparency.
8
Mining sites, solar farms, oil refineries and steel industries often need to be protected from intruders, both from a safety and a security point of view. We deliver peace of mind with our range of fencing solutions, modular designed energizers to enable multiple fence zones, and our monitoring technology which allows for advanced warning of any fence breach or tampering. Contact our Head Office for more information on 011 462 8283 or websales@nemtek.co.za 2 SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020 www.nemtek.com
securityfocusafrica.com
Official Journal of the Security Association of South Africa
Published by Contact Publications (Pty) Ltd (Reg No. 1981/011920/07)
22
Vol 38 No 11 – 12
TEL: (031) 764 6977 FAX: 086 762 1867 MANAGING DIRECTOR:
REGULARS EDITOR’S COMMENT 4 Of super-spreader event stupidity, a second wave of Covid-19 and what lies in store for SA in 2021.
CYBER SECURITY 28 Ensuring your Wi-Fi network 29 30
ASSOCIATION NEWS 6 2020 in a nutshell.
32
NEWS IN BRIEF 10 News snippets from around
33
the world.
NEWS 13 PSiRA Annual Report 2019/2020. 14 How a container village is providing a safe haven for impoverished children. 15 Bullying knows no age, colour or agenda. 16 ATM technology and innovation shine and scoop six awards. 17 Ikhaya Automation Systems receives WHO accreditation for its temperature monitoring solution.
INDUSTRY FOCUS 22 Billions are wasted on failed digital transformation projects.
INDUSTRY OPINION 24 Leveraging the power of location-based intelligence to drive competitive advantage. 25 2020 IT spending: Cybersecurity remains investment priority despite overall IT budget cuts, Kaspersky found.
PERSONALITY PROFILE 26 Deputy Chief Justice Raymond Zondo.
securityfocusafrica.com
34
is ready for the Android 11 QPR1 security update. Being a small business does not mean you are safe from cybercriminals. Get the attacker’s view of your cyber defence. The vital role of threat intelligence in today’s cyber defences. Tips to protect your online identity. Infamous hacker-for-hire group DeathStalker hits the Americas and Europe with new PowerPepper malware.
ON THE MARKET 36 Advances in UV technology
for disinfection. 37 When not just any battery will do. 38 Updated anti-ligature camera for secure facilities from ITS Products. 39 Classic door entry speaker phone gets a new coat of paint – literally! 39 Be informed about your guards’ routes and procedures.
CASE STUDY 40 Vox Telecom delivers
impressive business benefits with the InfiniBox enterprise storage system from Infinidat.
Malcolm King malcolm@contactpub.co.za
EDITOR: Ingrid Olivier ingrid@securityfocusafrica.com
SENIOR GRAPHIC DESIGNER: Vincent Goode vincent@contactpub.co.za
DISTRIBUTION MANAGER: Jackie Goosen jackie@contactpub.co.za
POSTAL ADDRESS: PO Box 414, Kloof 3640, South Africa
PUBLICATION DETAILS: Security Focus Africa has 12 issues a year and is published monthly, with the annual Buyers’ Guide in December. Due to the Covid-19 crisis, we will only be publishing digitally until further notice.
EDITORIAL CONTRIBUTIONS: Editorial contributions are welcome. For details please email editorial@securityfocusafrica.co.za.
ADVERTISING ENQUIRIES: Malcolm King Email: malcolm@contactpub.co.za
Security Focus Africa is a member of
YEAR REVIEW 42 2020– the year. 43 INDEX OF ADVERTISERS 44 DIRECTORY
www.securityfocusafrica.com 3
EDITOR’S COMMENT
2020-
The year that was Of super-spreader event stupidity, a second wave of Covid-19 and what lies in store for SA in 2021.
S
ince my last editorial, former president Jacob Zuma walked out of the Judicial Commission of Inquiry into Allegations of State Capture (more commonly referred to as the Zondo Commission after its presiding judge, Deputy Chief Justice Raymond Zondo) in a huff. A flagrantly disrespectful action, it impelled the Commission to approach the Constitutional Court for an order to be served on Zuma. This would make it illegal for him (with the threat of arrest) to refuse to appear before the Zondo Commission or answer questions when he takes the stand. The Commission has served summons on Zuma, calling for him to testify from 18 – 22 January and then again from 15 – 19 February 2021. Then Zuma heads to court along with French arms company Thales on 23 February 2021 to answer to charges of racketeering, money laundering and corruption.
4
It also looks like ANC secretary general Ace Magashule will have his day, or days, in court next year, answering to corruption and fraud, or alternatively money laundering and theft, and charges around an asbestos project in the Free State when he was the province’s premier. Prior to this, he will have appeared before ANC’s integrity commission, a date set down for 12 December 2020, according to President Cyril Ramaphosa.
Rage Partly as a result of the hosting of some post-matric Rage events around the country in the last few weeks, South Africa has entered its second wave of Covid-19 infections with more 6 709 new infections recorded on Wednesday 9 December 2020 alone, according to Health Minister Zweli Mkhize. These “super-spreader” events were presumably given the go-ahead by the
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
various local health and policing authorities. What were they, as well as the organisers and the parents, thinking? It’s a been a year since the first Covid-19 case was reported, a year that has seen the virus decimate the global economy, infect almost 70 million people and take the lives of 1,57 million – and South Africa’s national state of disaster extended until 15 January 2021. While the organisers swear up and down that they put all the requisite health measures in place, and that the local authorities approved same, the base line of thinking, to my mind is: crowds of young people with alcohol in their hands is a recipe for disaster even without the Covid-19 pandemic. Now our already over-burdened health system is trying to locate the attendees around the country and force them to self-isolate… this in addition to the gatherings that are consistently happening at funerals, parties and other below-the-radar events.
securityfocusafrica.com
EDITOR’S COMMENT
A miracle It’s not only the younger generation to blame for the uptick in the Covid-19 infection rate. As the Christmas carols belt out over shoppers’ heads, people are buying presents and stocking up on booze and food, focusing on their travel plans and looking forward to spending time with loved ones whom they haven’t seen in months. I understand that, I really do. But, when they do gather, masks are going to drop down to their chins or on to the floor, social distancing is going to be forgotten and life for a while is going to be loads of fun for everyone. Until someone from that gathering falls ill, and then someone else, and so it will go – unless a miracle happens and people grow up en masse, immediately. If that doesn’t happen, the country’s infection rate is likely to either remain at dangerously high levels throughout the holiday season as people travel down the road, to the next suburb or cross-province - or infections are going to escalate. And if either of these scenarios occur, we can expect harder lockdowns - certainly in the hotspots which will obviously impact negatively on the national and local economies, driving up unemployment, shutting down businesses and playing havoc with the 2021 education calendar. The harder hit the economy, the more likely we are to be further downgraded by ratings agencies, which are watching South Africa closely for tangible, viable economic reform measures from the government.
Slight economic uptick Some light at the end of what has been a very dark tunnel is that South Africa’s
securityfocusafrica.com
economy has rebounded, albeit slightly. Statistics South Africa (Stats SA), however, warns that the recovery is off a very low base and that “despite the rebound, the economy is still 5,8 percent smaller than it was at the end of 2019”. It goes on to note that the main drivers of growth were the manufacturing, trade and mining sectors in the third quarter following the easing of lockdown restrictions. Interesting to note, “the manufacturing industry rose at an annualised rate of 210,2 per cent, mostly driven by increases in the production of basic metal products, petroleum, vehicles, and food and beverages.”1
Also expected in 2021…. Other events waiting for South Africans in 2021 include the National Road Traffic Amendment Bill, which is proposing new regulations around driving and alcohol consumption (as in zero tolerance), and new licence plates to allow for easier identification of vehicles in accidents or on the run from police, presumably. There is talk of a Covid-19 vaccine becoming available mid-year, too, which is hopeful for those with underlying health problems and the elderly in particular. And then there’s that hardy annual: load shedding is looming again, despite state-owned power utility Eskom’s procurement of renewable energy from private generating sources in the last few months.
Minimum wages If the majority of the representatives of the National Minimum Wage Commission get their way – and that seems to be the
way things are going – there will be a 4.5 per cent increase to R21.68 an hour next year, more than the current inflation rate. The Commission is also discussing including domestic and farm workers in the pool (they are currently excluded). According to GroundUp2, domestic workers presently earn 75 per cent of the minimum wage, while farm workers earn 90 per cent of the minimum wage. The article goes on to say that the majority of the commissioners want the minimum wage for farm workers to be “brought to parity with the national minimum wage in the 2021 adjustment (an effective increase of R350 per month)” and wages for domestic workers to be increased to 88 per cent over the same period “(approximately R19 per hour), and (then) to parity by 2022”. Lastly, expectations by some are that the price of petrol may drop marginally during December – and maybe even the interest rate. I would like to wish you and yours everything of the best over the holiday season, and to thank you for your support during this most challenging of times. We’ll meet back here in January 2021. Stay safe. Please.
Ingrid Olivier, Editor ingridolivier@idotwrite.co.za
1. Read the report here: http://www.statssa.gov. za/?p=13849 2. https://www.groundup.org.za/article/minimumwage-should-go-45-says-national-minimum-wagecommission/
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
5
ASSOCIATION NEWS
SASA UPDATE
in a nutshell Tony Botes, National Administrator for the Security Association of South Africa (SASA), wraps up 2020, “an eventful year for South Africa which has also greatly impacted on the country’s private security”.
C
ovid-19
The Covid-19 pandemic has caused multiple challenges for all industries, with many employment opportunities being declared redundant and very few, if any, new positions being created. The economy has dipped alarmingly, evidenced by long queues of jobseekers outside the offices of security service providers and reduced consumer demand, which has resulted in industries cutting back or even ceasing production. While the situation is gradually improving, the private security industry cannot afford the mass retrenchments that are taking place.
Violence There have been numerous attacks on security officers along with a dramatic increase in attacks on CIT (cash-in-transit) vehicles recently. Although these crimes do tend to increase at this time of the year, the current numbers are unprecedented and the loss of lives unacceptable.
6
National Bargaining Council The National Bargaining Council for the Private Security Sector (NBCPSS) has, at long last, been established after initial discussions started in the mid-1990s. The three-yearly wage negotiations, conducted between organised employers (of which SASA is the largest) and organised labour (some 23 trade unions) were probably the most difficult since 2006, during which the “strike of all strikes” cost in excess of 100 lives, all being non-striking security officers, during the more than three months of violent industrial action. Many of these deaths were caused by throwing security officers off moving trains, whose only “crime” was that they did not want to join the strike, preferring to continue working and supporting their families. Subsequent investigations revealed that these non-strikers had one thing in common: although the majority were not working or commuting in uniform, the majority were still wearing their security footwear, thus making it easier to identify
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
them from among the other commuters on trains. The latest negotiations, the first under the auspices of the NBCPSS, started off with totally unrealistic and excessive demands from Labour: “R7 500 per month or death”, in addition to other massive increases. This would have resulted in more than an 80 percent increase in the cost-to-company figures, which would never have been accepted by consumers. The final collective agreement, concluded on 10 December 2019 but only promulgated on 20 February 2020 and effective from 2 March 2020, resulted in an average 8.75 per cent increase in payroll costs, to which many consumers objected. This led to further job losses and a dramatic, completely unacaceptable increase in non-compliance just to retain clients and jobs. Consumers are going to have to accept that minimum levels of remuneration as well as other employment conditions and benefits are statutory requirements and that pressuring their service providers to “quote below
securityfocusafrica.com
ASSOCIATION NEWS
companies that have also never renewed their company certificates to the new format ones.
SASA membership SASA membership, in all three categories, is growing rapidly and we now have 62 Gold Members, with several applications pending. We estimate that these companies employ more than 140 000 security and support staff, which is a force to be reckoned with. SASA has also, with its Mentorship Programme, assisted more than 20 start-up companies to register with PSiRA, the PSSPF and the NBCPSS, in addition to their statutory membership of COID (Compensation for Occupational Injuries and Diseases) and SARS (South African Revenue Service) thus enabling us to grant them Gold Membership status. We are extremely proud of the fact that we have contributed greatly to the compliance levels in the private security industry, but fear that this is not even a drop in the ocean; only the NBCPSS – once fully operational – will be in a position to bring the industry into line and eradicate the unacceptable levels of non-compliance in the sector. cost” only increases the level of noncompliance and criminal exploitation of security officers. To this end, PSiRA has, in a recent memorandum replicated in the August 2020 issue of Security Focus Africa clearly set out consumer obligations and the penalties to consumers who do not adhere to the basic requirements when appointing a security service provider. The NBCPSS is slowly but surely gaining traction as the levies start rolling in, but the end result will only become a reality when all security service providers are registered with the Council and the Compliance and Dispute Resolution departments become operational.
PSiRA (Private Security Industry Regulatory Authority) PSiRA, last year, published a consultation gazette in respect of their proposed annual fees and, as the “per guard” fee payable by employers only reflected an increase of 10 cents, from R2.70 to R2.80 per security officer per month, SASA saw no need to make any comments. However, when they conducted national consultation meetings, they tabled a R1.00 increase, from R2.70 to R2.80, 37 per cent in the current economy, which was subsequently gazetted.
securityfocusafrica.com
Informal communication with PSiRA was rejected out of hand and SASA and SANSEA (South African National Security Employers’ Association) then decided to take the legal route and had papers drafted to serve on PSiRA. Before such papers were submitted to the High Court, our attorneys sent a courtesy copy to PSiRA and, almost immediately thereafter, were telephonically requested not to lodge the application, as they (PSiRA) had reconsidered the increase, which was later re-gazetted at the originally proposed R2.80. PSiRA is now again commencing with consultation for their 2021 fees, so security service providers should study the documentation carefully and make input to PSiRA, copied to SASA. As at 31 October 2020 there were 10 416 registered and active security companies and 556 251 registered and active security officers on the PSiRA database, which was unexpected during this pandemic period. What is very disconcerting is the fact that there are 61 858 registered and active security officers who have not once renewed their old SOB (Security Officers Board) or PSiRA certificates to the new “fraudproof” certificates AND there are 723 security
Functions Unfortunately, due to Covid-19, the industry’s calendar events namely the Bravery Awards and Securex were cancelled, but we trust that 2021 will restore both to our diaries.
Affiliations In line with our Constitution we are in the process of concluding a Reciprocal Agreement with the Security Association of Namibia and hope to grow this exercise in 2021. `
In closing The SASA National Executive and Regional Committees wish all readers and members of the security industry a safe and joyous Christmas and a bumper 2021.
For more information about what SASA does and how it can help you and your company, please contact: Tony Botes, SASA National Administrator, at: Tel: 0861 100 680 / 083 650 4981 Email: info@sasecurity.co.za Website: www.sasecurity.co.za
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
7
JUDGES MATTER: SA’S NEXT CHIEF JUSTICE INTERNATIONAL NEWS
The Constitutional Court of South Africa in Johannesburg.
Will SA’s next Chief Justice be chosen from among the country’s current judge presidents? With the tenure of South Africa’s current Chief Justice Mogoeng Mogoeng ending in 2021, it’s time to find his successor says Judges Matter, an entity formed to monitor the yearly JSC (Judicial Service Commission) interviews as well as the judiciary in the interests of public transparency.
J
udges Matter shares its thoughts on potential candidates in an article published on its website on 9 November 20201. On the one hand, considering the significant increase in the Chief Justice’s administrative duties, it would make sense to select the country’s next Chief Justice from among the judge presidents who head up the various divisions of the High Court, thanks to their proven experience in running a high court, says Judges Matter. On the other hand, however, this would draw from judges not already on the Constitutional Court.
8
The Judge President candidates include: Judge President Dunstan Mlambo who heads up the Gauteng High Court – “the largest and busiest high court in the country since 2012”. He’s a highly regarded administrator whose court has been praised for functioning with “relatively little disruption” and for running some trials via remote hearings during the Covid-19 lockdown2. However, media reports have also described a “collapse of infrastructure” at the Pretoria High Court, one of the two seats making up the Gauteng High Court3. Whilst this
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
may raise questions for Judge President Mlambo, it should be noted that the report attributes the difficulties to inefficiencies in the Office of the Chief Justice, not to mismanagement of the court. Says Judges Matter: “He is not merely an administrator, however, but an impressive jurist in his own right, and served as a judge of the Supreme Court of Appeal between 2005 – 2010. He has written significant judgments such as President of the Republic of South Africa v Office of the Public Protector, holding former President Zuma personally
securityfocusafrica.com
JUDGES MATTER: SA’S NEXT CHIEF JUSTICE
liable for costs in an abandoned attempt to interdict the Public Protector’s “State Capture” report. This decision has recently been upheld by the Supreme Court of Appeal. In Multichoice (Proprietary) Limited and Others v National Prosecuting Authority and Another, Judge President Mlambo found that the Oscar Pistorius murder trial could be broadcast. “Judge President Mlambo also wrote the judgment of the Labour Appeal Court in South African Police Services v Solidarity on behalf of Barnard, which is probably the most significant South African case on whether affirmative action measures constitute unfair discrimination. Judge President Mlambo found that the impugned decision not to promote Barnard, a white woman, was justifiable. The decision was overturned by the Supreme Court of Appeal but upheld by the Constitutional Court.” He has, however, never acted as a judge of the Constitutional Court, which could be a disadvantage for him. Judge President John Hlophe who holds a PhD from Cambridge University and is the longest serving of the current Judge Presidents. Says Judges Matter: “He has written some weighty judgments, too – in the 1998 decision in De Lille v Speaker of the National Assembly, he found that provisions of the Powers and Privileges of Parliament Act which attempted to exempt parliamentary privilege from judicial scrutiny were unconstitutional. The decision was upheld by the Supreme Court of Appeal. In Malachi v Cape Dance Academy, he found legal provisions which allowed a debtor to be arrested if it was believed they intended to flee the country to avoid paying what they owed, to be unconstitutional. This decision was confirmed by the Constitutional Court. More controversially, Judge President Hlophe’s decision to order the eviction of around 20 000 residents of the Joe Slovo informal settlement to allow for the development of a housing project was overturned by the Constitutional Court in the famous judgment of Residents of Joe Slovo Community, Western Cape v Thubelisha Homes.” But, points out Judges Matter, he “has long been a controversial and divisive figure” who also happens to be “the subject of an ongoing complaint by his Deputy Judge President in the Western Cape High Court, Patricia Goliath, which is currently under consideration by the
securityfocusafrica.com
JSC. Most extraordinarily of all, he has been linked to an alleged plot to assassinate Deputy Judge President Goliath4 – although it must be stressed that those allegations remain unproven. In these circumstances, it is surely impossible for him to be put forward as a candidate.” Deputy Judge President Aubrey Ledwaba of the Pretoria seat of the Gauteng High Court, has acted as a judge of the Constitutional Court, judge of the Supreme Court of Appeal and is also the head of the Magistrates Commission. He “has written jurisprudentially significant judgments such as Democratic Alliance v Acting National Director of Public Prosecutions, which famously set aside the NPA’s decision to discontinue the prosecution of former president Zuma. DJP Ledwaba’s decision was confirmed by the Supreme Court of Appeal. While acting as a judge of the Constitutional Court, he wrote the judgment of the court in Moyo v Minister of Police, which found sections of the Intimidation Act to be unconstitutional. In Patel v National Director of Public Prosecutions, he awarded damages for malicious prosecution to the former KwaZulu-Natal High Court Judge President, Chiman Patel,” notes Judges Matter. Judge President of the Free State High Court, Cagney Musi has served as an acting judge of the Constitutional Court, a judge of the Labour Appeal
Court and chairperson of the Commission for the Remuneration of Public Office Bearers. His judgments include “S v Liesching, which dealt with the circumstances when a petition for leave to appeal may be reconsidered after new evidence comes to light; S v Rabako, which deals with when the crime of rape involves the infliction of bodily harm”, according to Judges Matter, and “he made the news in 2018 when he recused himself from the conduct tribunal which was to enquire into the complaint by judges of the Constitutional Court against Judge President Hlophe.” Having only been Judge President since 2018, however, Judge Matters suggests that he might be seen “as too junior for the position” at this point in his career. The next Chief Justice could also be chosen from the current judges of the Constitutional Court – you may read Judges Matter’s thoughts on these candidates5. 1. https://www.judgesmatter.co.za/opinions/ judge-presidents/ 2. Source: GCBSA https://gcbsa.co.za/ 3. Source: Daily Maverick https://www. dailymaverick.co.za/article/2020-10-09desperate-message-from-senior-judge-showscourt-system-is-breaking-down/ 4. Source: Daily Maverick 5. https://www.judgesmatter.co.za/opinions/ constitutional-court-next-chief-justice
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
9
ASSOCIATION NEWS
News snippets from around the world Human trafficking: biggest arrests in South Africa
owing largely to the Covid-19 pandemic and lockdown regulations in effect over the period. South Africa’s official crime stats are based on incidents and crimes reported to police stations, as well as crimes discovered through police action. The data can only tell us about the crimes that go through official processes and does not necessarily give a reflection of the true crime levels in the country. (Source: www.businesstech.co.za)
unit” at the SA Revenue Service (Sars) was reviewed and set aside by the North Gauteng High Court. Mkhwebane had in July last year released the report, which investigated the alleged violation of the Executive Ethics Code by Public Enterprises Minister Pravin Gordhan as well as allegations of maladministration at Sars under his tenure as commissioner at the tax collector. (Source: www.iol.co.za)
South Africa is classified as a source, transit and destination country for human trafficking, with more than 53% of the population vulnerable to the $150 billion (about R2.3 trillion) industry. This, according to anti-human trafficking non-profit organisation, A21, and the US Trafficking in Persons Reports, not only signifies that victims are trafficked out of the country, but also that foreign victims are brought into South Africa and some moved through the country. South Africa’s Directorate for Priority Crime Investigations (Hawks) have made several arrests in the fight against human trafficking with some particularly notable ones… (Source: www.iol.co.za)
A trillion dollars lost to cybercrime every year
South African Police Service launches new city crime fighting initiative
Crime in South Africa – what the official stats don’t tell you
Statistics South Africa has published its latest Victims of Crime (VoC) survey, showing how thousands of crimes go unreported in the country. The survey gives supplementary perspective to the latest official crime statistics published by the South African Police Service (SAPS) in November, which showed a decrease in criminal activity over the last quarter –
10
Data collated by McAfee and the Centre for Strategic and International Studies highlights the growing impact of cybercrime. The world economy is now losing more than $1tn (approximately £740bn) to cybercrime every year, an increase of more than 50% on figures reported in 2018, and with two-thirds of organisations reporting some kind of cyber security incident in 2019, the average cost to an individual company has now topped $500,000. (Source: www.computerweekly.com)
Dismissal of ‘irrational’ Sars ‘rogue unit’ claims yet another legal blow for Mkhwebane Public Protector Busisiwe Mkhwebane has suffered yet another legal setback after her report into the existence of a “rogue
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
The South African Police Service (SAPS) has launched a new crime fighting initiative to strengthen its efforts in the fight against crime in cities. The Integrated Safer Cities Concept is a first of its kind to be implemented in any city in South Africa. The National Safer City Concept is also being piloted in other identified cities which aims to see law enforcement agencies integrating and maximising on technology to fight crime more effectively. This platform sees the introduction of the first-of-its kind fusion centre. Its purpose is to maintain and establish a platform for information sharing through a collaborative approach among stakeholders through empirical information. (Source: www.businesstech.co.za)
Crime is killing USA’s cities — if we just move away, it will follow us American cities are on the brink. Violent crime is spiking up astronomically, and every day brings grim new statistics. Last week, New York City reported a 95 per cent year-on-year increase in shootings for the first 11 months of the year. Last month, Washington, DC, hit 167
securityfocusafrica.com
NEWS IN BRIEF
watches and law enforcement officers. “Our shooting/gang murder rate has declined sharply year-on-year due to the partnership between the community, my office and law enforcement, with a renewed focus on visible policing. Later this week, we plan to employ 20 community safety ambassadors to help keep Bonteheuwel safe.” (Source: www.iol.co.za) homicides, which means that the federal capital had more killings by November than it did for all of last year. The slay total is the highest in 12 years. And that was all before a 15-month-old was killed last week after unidentified gunmen opened fire on his father’s vehicle. Chicago, Philadelphia, Seattle, Memphis and Minneapolis (the epicentre of the #DefundThePolice movement) are all setting new records. The blood splashed and bullet casings strewn across our streets spell disaster. (Source: www.nypost.com)
securityfocusafrica.com
Hawks arrest printing company worker in investigation into matric maths exam leak
Two police officers seriously injured in cash-in-transit heist
Cape Times: A man who works for a company that is contracted by the Department of Basic Education (DBE) to print 2020 matric exam papers has been arrested in connection with the leaked Maths Paper 2. Themba Shikwambana, 31, was arrested last week following a Hawks serious corruption investigation for alleged theft of the Maths exam paper. (Source: www.iol.co.za)
Cape residents call for an end to ongoing violence and crime as festive season nears
The recent arrests and confiscation of illegal drugs, firearms and ammunition in Cape Town have spurred citizens into calling for an end to ongoing violence and crime. With the festive season around the corner, police and law enforcement anti-crime initiatives are gaining momentum – and more support from residents to rid their streets of crime. Bonteheuwel councillor Angus Mackenzie said residents were setting up a safety plan in partnership with neighbourhood
structure, and to put more boots on the ground. (Source: www.citizen.co.za)
Three nabbed for business email compromise fraud scam of R11.9m worth of laptops Two police officers were shot and injured during an early morning cash-in-transit heist in Rooiwal, near Hammanskraal last week. “Two Hammanskraal detectives were on their way to work when they came across the scene and were shot at by the suspects,” police spokesperson Colonel Brenda Muridili said. The attack, which reportedly occurred at Petroport, occurred before 07:00. “The officers were taken to Jubilee Hospital with serious injuries,” Muridili said. Wayne Alberts, a local resident, said two vehicles – a black Mercedes Benz and a BMW – forced the cash-in-transit vehicle off the road and a firefight ensued. “They blew up the vehicle with explosives, took the money and ran,” he said. (Source: citizen.co.za)
Unions, police reach restructuring deal to see more boots on the ground Unions have given the South African Police Service (SAPS) the green light to embark on its restructuring programme. The initiative is intended to cut costs within the service, address a top-heavy
Three men were arrested on fraud-related charges and possession of suspected stolen property last week. According to Colonel Katlego Mogale, the suspects were arrested following an operation conducted by the Hawks’ Serious Commercial Crime Investigation Unit in Johannesburg in collaboration with US Law Enforcement Agencies. The suspects, aged 31, 34, and 40 were arrested for their alleged involvement in the Business Email Compromise (BEC) fraud-related crime. “During September this year, the suspects allegedly created a fraudulent business email order to purchase 200 laptops worth approximately R4 million from Microsoft in the USA, to be delivered in Pretoria. “On 28 November, the Hawks received information regarding another consignment of 140 laptops worth
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
11
NEWS IN BRIEF
approximately R7.9 million which arrived at OR Tambo International Airport. The investigation team monitored the consignment and pounced on the syndicate members whilst they were off-loading the alleged stolen property at residential premises in Pretoria,” said Mogale. (Source: www.citizen.co.za)
Nasdaq borrows $1.9 billion to buy financial crimefighting platform Verafin
crime-fighting effort called Operation Stolen Promise 2.0. According to a recent press release, agents are now “preparing for surge” in fraudulent Covid-19 vaccines and treatments. (Source: www.clickorlando.com)
Lockdown forced nearly half of small businesses in South Africa to close: study
Nasdaq Inc. isn’t only about herding unicorns to go public on its popular stock-trading platform. The almost-50year-old company also wants to beef up its capabilities as an international financial crime-fighter, with its planned purchase of Canadian anti-fraud and moneylaundering detection platform Verafin for $2.75 billion. (Source: www.marketwatch.com)
Covid-19 vaccine scams at centre of new crime-fighting effort
Scammers base their strategies on the times, and according to the Better Business Bureau (BBB), which tracks scams and bad practices, Covid-19 is no different. The BBB has seen 96 complaints in Florida related to coronavirus, according to their nationwide Scam Tracker. “These scammers are saying to consumers, ‘We have treatments,’ or, ‘We have a vaccine’. They are making themselves seem like they have the answers to those concerns when in fact they don’t,” said Erika Urdaneta, Vice President of Operations for the BBB in Central Florida. Situations like this are part of the reason the Department of Homeland Security has relaunched a
12
practices becoming more widespread, ransomware gangs consolidating, and advanced exploits being used more effectively to target victims. That’s according to key predictions from Kaspersky. Researchers said the drastic Covid-19-related changes to the way people live and work has changed the way financial attackers operate. The implications of these shifts for 2021 are significant. Over the past year, companies became less secure due to hastily deployed remote work solutions, researchers said. That has translated into a lack of employee training, default laptop configurations left unchanged and vulnerable remote access connections. Together these trends have opened up a myriad of new attack vectors, including targeted ransomware campaigns. According to Kasperky, ransomware – above all – will continue to be a main scourge in the year ahead. (Source: www.threatpost.com)
How repeat offenders are pushing SA’s crime rate up
Financial services company Finfind has published a new report showing how Small, Medium and Micro Enterprises (SMMEs) bore the brunt of the country’s coronavirus lockdown. The study, which was published in collaboration with the Department of Small Business Development and a number of business groups, is based on a survey of 1 489 businesses across every major sector. The data shows that in the first five months of lockdown, 76.2% of businesses surveyed experienced a significant decrease in revenue. 35.2% had cash reserves saved, and of these, 62.6% thought their cash reserves would last between one and three months. However, only 29.2% of businesses were confident they could pay expenses the following month. Existing debt, lack of cash reserves, outdated financials, no access to relief funding, and an inability to operate during the lockdown, forced the closure of 42.7% of small businesses. (Source: www.businesstech.co.za)
Pandemic a driving force in 2021 financial crime Financial cybercrime in 2021 is set to evolve, researchers say, with extortion
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
Police recently confirmed that one of the men arrested for the murder of farm manager Brendin Horner, had been arrested 16 times. The reality of South Africa’s crime statistics is that a small number of persistent offenders are responsible for a substantial proportion of all crime. CapeTalk’s Lester Kiewit spoke to Betzi Pierce from the South African National Institute for Crime Prevention and the Reintegration of Offenders who says reoffending is a huge problem in South Africa. (Source: www.capetalk.co.za)
securityfocusafrica.com
NEWS
PSiRA Annual Report 2019/2020
The Private Security Industry Regulatory Authority (PSIRA): some key takeaways from the 2019/2020 Annual Report
C
herry-picking my way through PSiRA’s 168-page Annual Report for 2019/2020, these are some of the points that jumped out at me and which I thought might be of interest to readers:
Registered companies and officers: the numbers The total number of registered security businesses during this period: 10 298 The total number of registered and active security businesses: 9 744 The total number of registered security officers: 2 495 899 The total number of registered and active security officers (employed and independent operators): 548 642 Gender profile of active and registered security officers: The number of males that are active and registered in the private security industry represent 71 per cent of the industry while the number of females represent 29 per cent. There is a slight increase of one per cent of females registered and active in the industry compared to the previous financial year. There has been an eight per cent increase in the employment of female security officers over the last five years. The number of new applications received and captured during the financial year 2019/2020: Applications: 2 048 Approved: 1 979 Pending: 69
Fraud Prevention Policy and Plan PSiRA’s Fraud Prevention Plan includes a number of mechanisms for people to be able to report unethical conduct, fraud
securityfocusafrica.com
and corruption. Among these is PSiRA’s Fraud Hotline: 0860 333 036. According to PSiRA, calls are treated confidentially, and reporting may be done anonymously. The fraud hotline is administered by an independent firm of forensic auditors to safeguard the identities of callers and no one in PSiRA, regardless of seniority, has access to the identities of anyone who reports irregularities or fraud. A reporting hierarchy exists for fraud hotline administrators, which guides them on where to refer cases, including those involving directors and council members. PSiRA says it has adopted a policy of investigating all reports of fraud and corruption – testing, reviewing and analysing them to determine which ones warrant investigation. The appointed investigator submits a written report to the Accounting Authority through the Audit and Risk Committee, detailing circumstances and recommending appropriate remedial action following the investigation. According to statistics from the Forensic and Ethics Unit (FEU) for the period 1 April 2019 to 31 March 2020, 831 complaints were received via the Fraud Hotline and 102 complaints were received via the Helpdesk. Out of 831 complaints, 719 complaints were industry-related and were referred to the Law Enforcement Division for investigation and further processing. Of the complaints submitted to the FEU during this period, 20 were allegations of misconduct against employees of the Authority (six allegations of corruption, eight of fraud, six relating to general misconduct). A further 92 pertained to industry-related fraud. Thirty-seven cases
(one internal, the remaining 36 external) were brought forward from the 2018/2019 financial year; 219 cases were finalised and 11 cases have been carried forward to the 2020/2021 financial year. There were 23 industry-related criminal cases opened and 18 suspects were arrested by the SAPS. Out of the 21 internal cases, 14 were finalised either through resignation (three), disciplinary process (seven) or no evidence of misconduct uncovered during investigations (four), and seven were carried forward to the 2020/2021 financial year.
Police Minister Bheki Cele on improved officer training and SAPS’s commitment to supporting PSiRA In his foreword, Police Minister Bheki Cele emphasised the importance of adequate training for private security officers and saying: “The Office of the Minister was pleased to learn that the Authority has not only increased the accessibility of PSiRA accredited training centres through a 50 per cent increase in the number of newly accredited training centres compared to the previous financial year, but also revised the statutory training curriculum to produce better skilled security officers. There is no doubt that the private security industry contributes to significant employment within our country and I have taken note of the 8 per cent increase in the number of PSiRA registered security businesses and a marginal increase in the number of registered employed security officers compared to the 2018/2019 financial year.” He then added: “I want to congratulate PSiRA for achieving 96 per cent of its Annual Performance Plan targets and this accomplishment will inspire the confidence of other government entities in pursuing their strategic goals. The Authority, led by Mr Chauke, should be assured of our support in its tireless effort to be recognised as one of the best run private security regulators in the world.” Read PSiRA’s full 2019/2020 Annual Report https://www.psira.co.za/dmdocuments/ Annual_Report_2020.pdfn PSiRA website https://www.psira.co.za/
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
13
NEWS
It takes a village
How a container village is providing a safe haven for impoverished children.
Lack of access to basic human rights is wreaking havoc for the children of Parkwood Estate. With the help of Container Intermodal Trading (CIT) and the Jabulani Feeding Scheme, recycled containers are being used to provide these children with a safe haven, food and access to basic education to ultimately break the cycle of poverty.
T
he Jabulani Feeding Scheme, in Parkwood Estate Cape Town, sits in an official Zone of Poverty declared by the Department of Social Development. The centre is built on reclaimed land that used to be a dumpsite, so any structure erected must be removable. Yasmine Abrahams, the founder of the feeding scheme, has made it her life’s mission to feed, protect and be a mother to the children of this community. Her centre provides daily for over 500 impoverished children. In her mission to keep the children safe, containers are essential, and much thought was put into the materials used and layout of the centre. Set in a fort-like fashion and stacked two-levels high, the containers form an enclosed courtyard haven within their boundaries with one easy to monitor small gate for entry and exit. The fortified metal walls of the containers are pivotal, as Parkwood Estate is heavily burdened by gang violence, and the metal containers create a barrier for the children inside and aid in getting them out of the potential crossfire of stray bullets. Yasmine says that the children need to be able to come into the Jabulani centre for many reasons. With feeding, unfortunately, they have found that if the food gets taken home to eat, parents or adult siblings often take the food for themselves. Being able to supervise the children as they eat at the large table, allows the caretakers at Jabulani to ensure the food is going to the child as well as provide them with
14
the sense of dignity that comes from eating together at a table. Over and above their security role, the containers serve as storage for perishable food and equipment, kitchen facilities and as space for children to do their homework after school. The amazing resilience of the human spirit is evident in the effort that has gone into making the containers feel homely. Over the last few years, CIT has donated 40 foot long cube containers, which have played an essential role in enabling Jabulani to set up a sustainable and secure environment. Kashief Schroeder, the owner and co-founder of CIT also offers Jabulani cost price rates and gives his professional advice on purchasing containers on a pro bona basis. Kashief says that he collaborates with the Jabulani Feeding Scheme because of the example his late father set through his longstanding friendship with the scheme’s founder, Yasmine Abrahams. He says that by donating his time and containers, he continues this tradition of friendship, and honours the memory of his late father. “I know my late father is smiling down and is pleased and proud of how we continue to show that when organisations and communities stand together, life-changing things occur.” Poverty can only be broken by education, which is why having a space of their own to provide safe afterschool care and assist children with their homework is absolutely essential to
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
Jabulani’s mission. Jabulani is also planning on starting a home-schooling program for the many children who don’t have birth certificates and cannot enrol in formal government schooling. This will allow the children the opportunity to catch up on schooling or to learn the basics of Grade R, while Jabulani goes through the process of getting them their birth certificates. The Covid-19 pandemic posed new challenges for the program, as many children were left without masks or ways to sanitise and protect themselves against the virus. However, ingenuity always overcomes obstacles and Jabulani is able to provide sanitising stations and masks to those who don’t have. Due to social distancing laws, they were no longer able to have all of the 500 plus children in the same facility at the same time, which exacerbated the need for more space. With the additional containers from CIT, they were able to schedule all children for their meals in groups. South Africa’s high levels of unemployment, gangsterism, and drug and alcohol abuse lead to a myriad of social evils for the children of our society. It is so important for us to remember that we can all make a difference. We should all take a lesson from what is possible when inspirational women, like Yasmine, and companies, like CIT, come together to use their imaginations to find creative solutions to the challenges that the children of South Africa face.
securityfocusafrica.com
NEWS
Bullying knows no age, colour or agenda As South Africa commemorates the annual 16 days of activism campaign which serves as a rallying call to galvanise efforts in the fight against gender-based violence, Fidelity ADT managers have used this opportunity to speak about bullying, and violence and abuse against women.
L
inda Goodenough, Community Development Manager for Fidelity ADT addressed a community gathering recently focusing specifically on adult bullying. “The average thought that comes to mind is bullying is for children, but the reality is bullying doesn’t have an age, a colour or a gender and adult bullying is way more prevalent than one imagines,” says Goodenough. The outcomes of the bullying can be equally as severe for adults as it can for children, including feelings of anxiety, fear, depression and lowered confidence and self-esteem. She says adult bullying often occurs in our personal safe space. “If it is not at home, it is at the work place or amongst friends. It is very often someone you know and in most cases someone who you actually love or who proclaims to love you too or be friends with you. The ripple effect of adult bullying often goes all the way down to children who are not oblivious to what is happening but seldom are able to verbalise their concerns.” Adult bullies may use strategies such as intimidation, exclusion, and harassment, but
securityfocusafrica.com
can also use more subtle techniques which are difficult to expose. “The important thing to remember,” says Goodenough, “is that when dealing with these bullies you need to realise that it is not about you, and that you have done nothing wrong.” She says bullying can include insults, jealousy, sexual harassment, pressure for sex, humiliation and degradation in public, controlling and manipulative behaviour in terms of dress and friend groups and even stalking to monitor your movements. Goodenough says women need to recognise this abuse and bring it out of the dark and into the light. “If it is not reported, it stays in the dark,” she says. She says victims of bullying commonly feel helpless, embarrassed and humiliated, scared, weak and vulnerable. “Now is the time to stop it and stop it quickly. There are a number of church and community support groups and national helplines like Lifeline which can see you through your darkest time. It is never too late to start afresh, to link up with some caring, positive friends and begin your healing,” she concludes.
Linda Goodenough, Community Development Manager for Fidelity ADT Compiled on behalf of Fidelity ADT by Cathy Findley PR. Media queries contact Jacqui Moloi Tel. 011 463 6372 Email: jacqui@findleypr.co.za
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
15
NEWS
ATM technology and innovation shine and scoop six awards
Spark ATM Systems, South Africa’s leading independent ATM deployer, won five awards at the 2020 tt100 Business Innovations Awards held in November. Press release.
T
he tt100 Business Innovation Awards programme was launched in 1991 to create awareness of the role of technology and innovation in South Africa, while the Africa Tech Week Awards celebrates innovators, leaders and game changers who represent the best on the African tech landscape. “We are delighted that the recognition of the tt100 awards reflects the dedication and commitment of our world class team,” says Marc Sternberg, managing director of Spark ATM Systems. “To be recognised for the management of people, systems and technology, as well as sustainability, confirms that we have our finger on every pulse that is required for business success. The greatest honour was receiving the Minister’s Award for Overall Excellence, which reaffirms our values of integrity, passion and excellence.” Spark ATM has walked a long road with the tt100 Business Innovation Awards. In 2009 it was a finalist in four emerging enterprise categories and won in two, namely Excellence in the Management of People and the Director General’s Award for Overall Excellence. In 2011, Spark ATM Systems won the Management of Technology award in the established enterprises category, and in 2012 it brought home the overall Sustainability Award. “It is most gratifying that 10 years after our first awards, we can still impress the tt100 panel,” says Sternberg. “They recognised us early on and we have
16
continued to shine throughout our growth cycle from an emerging enterprise into a large company. tt100 recognition at various stages along this journey supported the goals and objectives we had set ourselves when Spark ATM Systems was established. Spark ATM Systems was founded in 2005, and today owns and manages a network of more than 4 300 independent ATM installations across the country. Its ever-growing network of ATMs can be found in every conceivable type of bank branch, retail, hospitality, leisure and convenience location for one simple reason – consumers expect them wherever they need cash, and merchants recognise their many benefits. The company is owned by Cardtronics, the world’s largest ATM deployer, who brings global expertise and unprecedented financial backing to Spark’s operations in South Africa. Spark ATM Systems, in turn, has grown into the technology development hub for Cardtronics’ operations in North America and Europe. The recognition continued when Spark ATM was awarded the Fintech Company of the Year in the Africa Tech Week 2020 awards presentation. Sales and Marketing Director of Spark ATM, Russel Berman, who received the award on behalf of the company, said, “our data analytics suite of software was under the spotlight and we were able to showcase our excellent home-grown system innovations to an esteemed panel of judges. These groundbreaking innovations have catapulted Spark
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
ATM into a position of market dominance and an industry leader.” Casting an eye to the future, Berman says that within the next five years, Spark ATM Systems will own and operate 30% of all ATMs in South Africa. Supporting this vision is its recently established capability to assemble its own ATMs on home soil. In the next year, Spark ATM Systems will launch the exciting new Touchline ATM. Assembled in South Africa, it has a Linux operating system and touchscreen functionality that is state-of-the-art technology.
About Spark ATM Systems Spark ATM Systems is the premier and leading independent ATM deployer in South Africa, installing and operating industry-leading ATM equipment to service the South African banking and retail ATM market. It has been a wholly owned subsidiary of Cardtronics plc (Nasdaq: CATM), the world’s leading ATM deployer since January 2017. Based in Cape Town, Spark ATM operates a growing network of more than 4,200 ATMs located across South Africa, processing millions of transactions each month. The company has a proven track record of providing innovative solutions for large and small retailers, financial institutions and independent merchants whose customers want quick, convenient, and affordable access to their cash. For more information about Spark, visit www.sparkatm.co.za.
securityfocusafrica.com
NEWS
Ikhaya Automation Systems receives WHO accreditation for its temperature monitoring solution
Eckart Zollner, Sales and Marketing Executive at Ikhaya
Pietermaritzburg-based remote temperature monitoring specialist, Ikhaya Automation Systems (Ikhaya) is pleased to be the first black-owned company in Africa to receive accreditation from the World Health Organization (WHO) for its latest product the VM1000 (vaccine monitor temperature monitoring device).
E
stablished in 2008, Ikhaya provides temperature monitoring solutions to the following sectors: pharmaceuticals, healthcare, cold rooms, fridges, freezers, server rooms, -80 ultra-cold freezers, refrigerated transport and more. “The Ikhaya VM1000 device recently qualified under the WHO Performance, Quality, and Safety (PQS) E006/061,” says Praba Moonsamy, Ikhaya’s Managing Director. “This achievement is testimony to the quality and efficacy of our temperature monitoring device. It is also an important step for us to provide UN agencies, non-profit organisations and various global vaccine providers across the globe the assurance of device stability and reliability in carrying out their various immunisation programs.”
Unlocking global opportunities “This is the global standard we need in order to be an international player and supplier,” notes Eckart Zollner, Sales and Marketing Executive at Ikhaya. “We are the only company with this accreditation that covers the full range of necessary temperature points to fully service the pharmaceutical industry. We provide the products and technology to monitor
securityfocusafrica.com
multiple temperature points remotely, using a web-based solution, to show a continuous, compliant cold chain,” Zollner notes.
Critical in Covid-19 vaccine roll-out With several vaccines due to roll-out soon, some will require ultra-low temperatures to keep the vaccine safe. Such temperatures exceed -80°C and other vaccines in the pipeline will need to be kept at other temperatures such as -20°C or even 2° – 8°C. “The temperature of every vaccine (and indeed all temperaturesensitive pharmaceuticals) must be kept as advised by the manufacturers during transport and storage to preserve the vaccine’s effectiveness and safety once administered,” Zollner continues. “Our audible real time alerts, that are also distributed via SMS and email, provide our customers with the ability to become proactive when it comes to the management of the environmental conditions anywhere along the cold chain from manufacture to distribution. The required interventions on the cooling plant can now be affected before any consequential loss of product occurs” he concludes.
System-generated reports serve as proof for compliance and legal purposes, while the Ikhaya temperature monitoring system offers interactive, linear web graphs in real-time and in high-resolution detail, delivering instant alerts of any temperature deviations via SMS or email.
Local production, global accreditation “In addition to the global certification from the World Health Organisation (WHO), our company is also ISO 9001:2015 accredited,” Moonsamy says. “While our products are benchmarked regularly against local and global competitors, we are a wholly South African developer and manufacturer of real-time temperature and humidity monitoring solutions that are designed to last. Many of our products achieve a lifespan of more than 10 years in the field, backed by service guarantee and stringent service level agreements. Our dynamic, experienced team brings innovative ideas and superior support service while our distributors form an international footprint of sales and installations, ready to service the temperature-sensitive industries on a worldwide scale,” Moonsamy concludes.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
17
SPECIAL FEATURE
18
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
securityfocusafrica.com
SPECIAL FEATURE
Security industry training
in the time of the Covid-19 pandemic It’s been a year since the global outbreak of the Covid-19 pandemic; a year that has had a significant effect on the lives and careers of, among others, security guards, necessitating additional training for those tasked with safeguarding public health as well as their own and that of their families.
“T
he security guard services industry is in a rapid and profound state of turmoil as a result of the crisis,” says Jeff Moyer, National Specialty Programs’ Underwriting Manager for United States-based All Risks Ltd. “Overall, the industry is seeing a significant degree of redeployment; some sectors have been heavily impacted by organisational slowdowns and closings, while others are seeing substantially higher demand for guard services as a critical infrastructure need. “It’s therefore vital that security guards receive thorough training on new procedures and protective measures relating to the pandemic,” he writes in his blog1. Training needs to include the correct use of personal protection equipment (PPE) as well as conflict resolution and de-escalation. “For example,” he points out, “visitor restrictions at healthcare facilities may necessitate family members who attempt to visit patients be turned away. Or grocery stores experiencing stock shortages may be faced with agitated customers and potential conflict. “It’s also important that supervisors are upskilled, where necessary, in order to be able to manage their guarding teams effectively,” he continues, “with emphasis placed on regular checks to ensure that all Covid-19 related procedures are being adhered to, and that relevant information and news alerts are filtered down the ranks.”
Pivoting role Mark Folmer, vice-president of TrackTik
securityfocusafrica.com
Software Inc and a past IFSEC Global Influencer, refers to the “pivoting role” of security guards in his blog, The Changing Role of the Security Guard during the Covid-19 Pandemic in the UK2. Since the onset of the pandemic, the sight of a security guard outside a store has become commonplace, he says, noting how their traditional role of loss prevention has now expanded to include limiting the number of shoppers allowed to enter a shop at one time and also ensuring the wearing of face masks, sanitising and social distancing. “Patrolling, key holding, incident assistance, high-risk product protection to prevent theft, and worker welfare checking are only a few of the roles security guards routinely fill. But with most high streets and retail parks now shuttered, there has also been an increase in the need for mobile patrols in the UK to ensure the security of empty and closed commercial, retail or office premises, CCTV monitoring, and the provision of alarm response centres including mobile units. Additional security patrols are also required to ensure that fire alarms systems are kept in check and to confirm whether alarms are real or false,” he notes further. To this end, one of the tools being utilised by progressive companies is readily available and/or cutting-edge software, says Folmer, which of course, requires companies to train users.
Devastating effects The ‘devastating effects of the Covid-19 pandemic’ have brought about changes in the roles of security guards, agrees
Monica Benoit. In her article3, written on behalf of Optimum Security, she discusses the crucial role of guards in the healthcare and retail sectors, among others. Key to their efficacy is communication, she says. “Previously, officers were primarily focused on preventing the loss of goods from vandalism or shoplifting, as well as general staff security. Now, the role needs a greater level of communication skills and an understanding of healthcare protocols to protect customers. This may involve taking temperature checks, occupancy management, or simply advising on best practice during the pandemic. As Peter French, Managing Director of SSR Personnel noted in a recent interview with IFSEC Global, communication has become even more important than it was previously during the pandemic.” And she adds: “While social distancing has become the ‘norm’ worldwide, there are many individuals who are not abiding by the rules. Security services may therefore be required to monitor areas where social gatherings are taking place, such as public parks, to prevent violation of the rules – particularly in those areas under local lockdown.”
Elevated occupational risk Security guards who interface with the public face an “elevated occupational risk” of contracting Covid-19, says All Risks’ Jeff Moyer, hence the need for employers to provide training on health and safety protocols. “For security services companies, their top priority is keeping their workforce safe, especially those assigned to high-risk areas such as healthcare facilities.”
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
19
SPECIAL FEATURE
To this end, training aimed at reducing guards’ risk of exposure needs to include frequent hand washing, limiting close contact with others by wearing masks and using hand sanitiser regularly. It’s also critical that security companies review and update their staff’s personal protection equipment, which should include safety glasses or goggles, disposable nitrile gloves and surgical masks. Moyer further advocates the use of tape or other visible floor markings to denote appropriate social distancing, glass or acrylic barriers, and touch-free access technology. Further, “since the virus has been proven to last on surfaces for as long as three or more days, depending on the material, it’s important to frequently disinfect common work areas and objects such as phones, radios, scanners and keyboards,” he says. And guards also need to be trained on the importance of washing their work clothing at the end of every day and sanitising their belts and other gear. In an article in This Week in FM4, Mike Bullock, CEO of UK-based Corps Security, lists some of the steps his company has implemented to safeguard their personnel. These include: • Changing the shift patterns and working arrangements of higher risk employees. • Supplying PPE such as masks, gloves, goggles, anti-bac gel and anti-bac wipes for equipment, not only on deployment sites, but also during public transport. • Conducting Covid-19 audits on the premises of all their clients. • Launching a mandatory Covid-19 online training module for security officers. • Holding regular one-on-one check-ins between line managers and security officers to check on physical and emotional wellbeing.
1. https://blog.allrisks.com/nsp-covid-19-andsecurity-services-nine-key-precautions-toprotect-security-guards 2. https://www.tracktik.com/blog/the-changingrole-of-the-security-guard-during-the-covid19-pandemic-in-the-uk/ 3. https://www.ifsecglobal.com/global/ the-role-of-a-security-guard-during-covid-19/ 4. https://www.twinfm.com/article/how-is-thesecurity-industry-protecting-its-workforce 5. https://www.cdc.gov/coronavirus/2019-ncov/ community/guidance-law-enforcement.html
20
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
securityfocusafrica.com
SPECIAL FEATURE
The CDC (Centers for Disease Control and Prevention) also has guidelines for the security sector: “What Law Enforcement Personnel Need to Know about Coronavirus Disease 2019 (COVID-19)5 Some of the CDC’s key points include: • Patients with Covid-19 have had mild to severe respiratory illness. • Data suggests that symptoms may appear in as few as 2 days or as long as 14 days after exposure to the virus which causes Covid-19. • Symptoms may include fever, cough, difficulty breathing and shortness of breath. • The virus causing Covid-19 is called SARS-CoV-2. It is thought to spread mainly from person-to-person via respiratory droplets between people in close proximity. Respiratory droplets are produced when an infected person coughs, sneezes, or talks and these miniscule droplets may enter the mouths or noses, or possibly be inhaled into the lungs, of people who are nearby.
‘Close contact’ may include: • Being within approximately 1,83m (6 feet) of an individual with Covid-19 for a prolonged period of time. • Having direct contact with body fluids (such as blood, phlegm and respiratory droplets) from an individual with Covid-19. • Recent studies indicate that people who are infected but do not have symptoms likely also play a role in the spread of Covid-19.
To protect yourself from exposure: • If possible, maintain a distance of at least 1,83m (6 feet). • Practice proper hand hygiene. Wash your hands with soap and water for at least 20 seconds. If soap and water are not readily available and illicit drugs are NOT suspected to be present, use an alcohol-based hand sanitiser with at least 60% alcohol. • Do not touch your face with unwashed hands. • Have a trained Emergency Medical Service/Emergency Medical Technician (EMS/EMT) assess and transport anyone you think might have Covid-19 to a healthcare facility.
securityfocusafrica.com
• Ensure only trained personnel wearing appropriate personal protective equipment (PPE) have contact with individuals who have or may have Covid-19. • Learn your employer’s plan for exposure control and participate in all-hands training on the use of PPE for respiratory protection, if available.
Recommended Personal Protective Equipment (PPE): Law enforcement personnel who are to make contact with individuals confirmed or suspected to have Covid-19 should follow CDC’s Interim Guidance for EMS. Different styles of PPE may be necessary to perform operational duties. These alternative styles (i.e. coveralls) must provide protection that is at least as great as that provided by the minimum amount of PPE recommended.
The minimum PPE recommended is: • Disposable examination gloves. • Disposable isolation gown or single-use/disposable coveralls. (If unable to wear a disposable gown or coveralls because it limits access to duty belt and gear, ensure duty belt and gear are disinfected after contact with individual). • Facemasks. • Eye protection such as goggles or disposable face shields that fully cover the front and sides of the face.
If close contact occurs during apprehension: • Clean and disinfect duty belt and gear prior to reuse using a household cleaning spray or wipe. • Follow standard operating procedures for the containment and disposal of used PPE. • Follow standard operating procedures for containing and laundering clothes. Avoid shaking the garments.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
21
INDUSTRY FOCUS
Billions are wasted on failed digital transformation projects Digital transformation is no longer an option, it’s a must for every organisation that wants to stay relevant and compete in an ever-changing world. Trillions of dollars are being allocated to strategic programs each year but billions are being wasted on failed digital transformation projects.
S
trategic programs are crucial for business to adapt, but why do 70% of these programs fail to achieve their goals? In short, it’s due to lack of executive buy-in, wrong execution strategy, poor timing and resistance to change. To succeed, strategic programs need to deliver business value on time and within budget. In this environment the speed of execution is critical. When unpacking the data and the methodologies used to execute strategic programs, one soon realises the administrative challenges associated with executing these programs. Many corporates are using Project Portfolio Management (PPM) solutions to track strategic programs. Unfortunately this is insufficient for strategic programs because programs are extremely different to projects.
22
This cookie-cutter approach creates many problems for program teams and that is why they soon find spreadsheets, slide decks, endless meetings and emails as the biggest challenge when trying to keep the program on track. Clarity is key when dealing with complexity. Although useful, PPM solutions are not designed to solve the complexities of program delivery. The side effect is fragmented information and a lot of manual effort to stay on top of all these moving parts.
Admin versus strategic execution Ironically, apps that are supposed to help productivity usually result in huge inefficiencies because valuable time is wasted organising work around tools instead of productivity tools helping to
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
By FlowState CEO Mark Kayser
organise work. Each tool adds more noise and complexity, reducing productivity and efficiency. There are so many violations of common sense in programs today. The amount of time and effort that is spent on producing throw-away reports is ludicrous. Even more concerning, more than 50% of time is spent in meetings, where meeting effectiveness is perceived to be only around 50% effective.
securityfocusafrica.com
INDUSTRY FOCUS
Bringing a team along on the journey is crucial and building the right team culture is core to productive teamwork.
Solving the execution capability If one considers the challenges faced by program teams and their stakeholders, it is clear that a bottom-up solution is the answer. It must solve top-down executive requirements, leveraging information to automate and reduce administration and effort for the program teams. Finally, it should be easy to use and must have a strong ‘what’s in it for me’ value proposition for all involved.
The solution
There is also an endless flow of emails to stay on top of the program and work is all over the place, requiring a superhuman effort from the program team to stay on top of all the moving parts. Program work is interrelated and requires a broader solution that will solve the majority of complexities and requirements for program managers. It must be an all-in-one flexible solution that expands as one progresses on the journey. PPM solutions are inadequate if one considers all the complexities required to deliver these large transformation initiatives. Program managers need to create the right environment for success and the key is clarity, flexibility and alignment. One needs to ensure an iterative approach to de-risk the program versus long delivery cycles.
Meetings
Costly manual reports
The impossible becomes possible with the right team culture, a purpose-driven culture. It’s not easy and each program manager will know exactly what’s right for their team. There are a few principles that can get one off to the right start. Businesses first need to get everyone on the same page with culture, and then focus and drive execution and results. Breaking work down into achievable chunks is an art before it becomes a science for results-driven execution.
More than 40% of time is spent preparing costly manual reports. In most cases visibility is provided through status reports created in slide decks, for each tier of the program to update the next. There is a risk that these update sessions provide the best version of information and not the best version of reality, similar to a résumé for a job interview. The information can be selective in what is escalated and relevant to the next tier.
securityfocusafrica.com
More than 50% of time is spent in ineffective meetings. The cornerstone of collaboration for programs and where resources spend the majority of their time to de-risk, manage issues, provide status updates, what has been achieved, what is next and what should be escalated to the next tier. Collaborate with the many teams, stakeholders and dependencies in the program eco-system. However, a lot of the outcomes from these sessions, the actions and decisions from meetings captured in documents post the session and fragmenting the information makes it difficult to find. The performance and effectiveness of these sessions could be considered a blind spot.
Team culture
Strategic programs require a single source solution over and above wasteful scripted meetings, spreadsheets, admin intensive reporting packs, emailed task trackers and tick-box PPM solutions. So what can be done to improve the probability of success? Let’s first unpack some of the common challenges and frustrations that most program teams face, violations of common sense and blind spots. FlowState (FS80) is an innovative managed service framework that will help companies increase their productivity by targeting 80 percent on-time completion. It is a Productivity-as-a-Service (PaaS) offering that helps program managers achieve an enhanced level of purpose driven productivity. The solution enables teams and individuals to adopt a standardised and optimised approach to tasks by utilising pre-defined processes, playbooks, templates and metrics, underpinned by an easy-to-use, intuitive collaboration system. Regardless of where the task originates, the important metric to track and improve upon is the percentage of tasks completed within the agreed time. These could include actions from meetings, project activities or team activities. The benefits of this to both company and staff are clear to see. Increased accountability, reduced waste and slippage on tasks, reduction in emails and meetings, asynchronous meetings, key metric tracking and management, removal of geographic constraints, and more. FlowState improves visibility, increases accountability and puts more trust in the plan. It provides a more agile performance with reduced emails, the removal of meeting timeslot dependency and offers a centralised audit trail for all delivered work.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
23
INDUSTRY OPINION
Leveraging the power of location-based intelligence to drive competitive advantage
By Gary Allemann, MD of Masterdata Management
As much as digital transformation involves the use of technology, it is not purely about technology. It is about driving improved customer experiences and enhancing operational capabilities.
W
hat this requires, more than anything, is actionable business-driven intelligence, including location-based intelligence to help organisations better understand their customer. Analytics is a fundamental component of this since data without analysis is meaningless. However, if data cannot be operationalised and integrated with core systems, it can add no value. The key to leveraging the power of location intelligence to drive competitive advantage lies in data quality and data integration.
Location data has immense business value Location intelligence is the product of a plethora of location-aware devices, from mobile phones to GPS-enabled vehicles and a variety of IoT devices, combined with big data and Artificial Intelligence (AI) capabilities. These connected devices enable locations to be pinpointed and tracked over time, which presents incredible potential for insight. Adding a location vector to customer analytics could provide more context that may give a better understanding of customers. Armed with this data, a more in-depth customer profile may be created, including information such as where and when they shop, where they work, if they work from an office or home, and more. By identifying patterns and trends that may not have been evident before, insights that improve business decision making, increase efficiency and drive innovation may be derived. This insight may be used
24
to better understand customer behaviour, grow sales, reduce risk and increase responsiveness to external events and trends. Location data is being used by insurance companies to gauge the risk of specific properties more accurately, and by bond originators to better evaluate the value of real estate. Governments are beginning to use this information to better understand which areas of their populations are underserved in terms of access to schooling and healthcare. Location information may also assist mobile operators to deploy 5G and optimise networks more intelligently. The possibilities are practically endless, limited only by organisations’ creative thinking, and importantly the ability to operationalise this data.
Operationalising location data The most important building block for leveraging the value of location intelligence is to have clear and achievable objectives for the data. Having a sound and concrete business case is critical to leveraging measurable benefits. Some examples include inventory planning, product development and marketing initiatives in retail and consumer-focused organisations. Other use cases include enhancing site selection processes and optimising advertising spend. These insights are all driven by location data and have specific and measurable outcomes, which will in turn demonstrate the value of continued investment into location intelligence.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
It is also essential to remember that existing and legacy data still has value, and this may be augmented by location intelligence. The challenge is to merge this data, which may exist in multiple silos, with operational data from the business, and then enhance it with location-based data. Integration tools can be invaluable in streaming legacy systems to other platforms like data lakes and data warehouses, enabling real-time updates between legacy systems and newer platforms.
Focusing on data quality and data integration to drive value and competitive advantage It is essential to prioritise data quality. If data quality is poor, then any insights will be correspondingly poor, and if a business cannot trust data insights then they have no value. Having the right tools and systems in place to ensure data quality is critical with location intelligence as well as AI, machine learning and big data analytics projects. The reality is that without trusted data, analytics is useless to the business. Optimally accessing, integrating and improving the quality of data is key in powering effective business decisions. Only by focusing on data quality and data integration, can data enrichment such as location intelligence be used to unlock new insights and context, with confidence in the accuracy of the results. The integrity of data is central to using location-based intelligence to drive competitive advantage.
securityfocusafrica.com
INDUSTRY OPINION
2020 IT spending: Cybersecurity remains investment priority despite overall IT budget cuts, Kaspersky found According to the new Kaspersky report ‘Investment adjustment: Aligning IT budgets with changing security priorities’, cybersecurity remains a priority for investment among businesses.
I
ts share of IT spending has grown from 23% in 2019 to 26% in 2020 for SMBs, and from 26% to 29% for enterprises. 71% of organisations also expect their cybersecurity budget to grow further in the next three years. This is despite overall IT budgets decreasing in both segments amid the Covid-19 pandemic, and cybersecurity cuts affecting the most economically hit SMBs. External conditions and events may influence IT priorities for businesses. As a result of the Covid-19 lockdown, organisations have had to adjust plans to meet changing business needs – from emergency digitalisation to cost optimisation. The Kaspersky report, based on a survey of more than 5 000 IT and cybersecurity practitioners, observed recent IT security economics trends and how they correlated with this year’s events1. The share of IT budget dedicated to IT security continues to grow year-on-year, even though the overall IT budget has fallen from $1.2m in 2019 to $1.1m in 2020 among SMBs, and from $74.1m to $54.3m for enterprises. This decrease may be due to the consequences of the global coronavirus pandemic, according to Gartner, whose experts also predicted that budgets would decrease earlier this year. As a result, in monetary terms, small and medium businesses allocated $275k to cybersecurity while enterprises invested $14m. The majority of companies are expecting these figures to grow in the next three years by 11% in enterprises and 12% in SMBs, on average. 17% believe it will remain at least the same as this year. However, one-in-ten (10%) organisations said they are going to spend less on IT security. Interestingly, the main reason for this across enterprises is the deliberate decision of top management, who sees no point in investing so much money in cybersecurity in the future (32%).
securityfocusafrica.com
Among SMBs, the reason to reduce spend in this area is primarily dictated by the need to cut overall company expenses and optimise budgets (29%). Small and medium organisations were hit hardest by the lockdown: more than half of small companies globally reported a decline in sales or experienced cash flow constraints. It is clear that those affected have needed to optimise their expenses to survive. But while this impacts cyberprotection, it’s important for businesses to find a way to keep safe from cyber-risks in such a challenging time. “2020 has put many companies in situations where they needed to respond, so they wisely concentrated all their resources and efforts on staying afloat. Even though budgets get revised, it doesn’t mean cybersecurity needs to go down on the priority list. We recommend that businesses, who have to spend less on cybersecurity in the coming years, get smart about it and use every available option to bolster their defenses – by turning to free security solutions available on the market and introducing security awareness programs across the organisation. Those are small steps that can make a difference, especially for SMBs,” commented Alexander Moiseev, Chief Business Officer at Kaspersky. Kaspersky suggests small and medium organisations heed the following advice, to maintain their cybersecurity posture, even with low security investments: Always keep your team aware of IT security risks such as phishing, web threats, banking malware and others that can target employees in their daily working routine. There are dedicated training courses which teach security practices, such as the ones provided in the Kaspersky Automated Security Awareness Platform. Use formats that help employees remember the
cybersecurity rules, such as posters or cards in the workspace. Ensure timely updates of all systems, software and devices. This will help you to avoid situations where malware infiltrates a corporate system through, for example, an unpatched operating system. Establish the practice of using strong passwords to access corporate services. Use multi-factor authentication for access to remote services. Make sure all corporate devices are protected with strong passwords which are changed regularly. Use proven cloud services and platforms when transferring business data. Make sure you protect all your shared files with passwords, for example in Google Docs, or make them available to a limited circle within a working group. Use a free endpoint security tool, such as Kaspersky Anti-Ransomware Tool for Business, which provides protection for both PCs and servers from a wide range of threats including ransomware, cryptominers, adware, pornware, exploits and more. There are also some useful tools that could help ad-hoc cybersecurity needs, such as checking suspicious files, IP addresses, domains and URLs. This can be done for free on the Kaspersky Threat Intelligence Portal. To read the full report ‘Investment adjustment: Aligning IT budgets with changing security priorities’, please visit the Kaspersky IT Security Calculator web page2. 1 The Kaspersky Global Corporate IT Security Risks Survey (ITSRS) interviewed 5,266 respondents across 31 countries. Conducted by B2B International and commissioned by Kaspersky, fieldwork took place in July of 2020. 2. https://calculator.kaspersky.com/app/report
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
25
PERSONALITY XXX PROFILE
Deputy Chief Justice Raymond Zondo In conversation with Raymond Zondo, Deputy Chief Justice of South Africa and presiding judge for South Africa’s Judicial Commission of Inquiry into State Capture. “Without the kindness of strangers and the assistance of bursaries, I would never have gone past primary school.” – Judge Raymond Zondo during his interview for the position of Deputy Chief Justice of South Africa Deputy Chief Justice Raymond Zondo heading the Judicial Commission of Inquiry into Allegations of State Capture (also known as Zondo Commission) on 17 May 2019 which was streamed live on TV. Courtesy of eNCA (eNews Channel Africa), CC BY 3.0, via Wikimedia Commons.
E
arly years
The third of nine children, Raymond Mnyamezeli Mlungisi “Ray” Zondo was born in rural Ixopo, KwaZulu-Natal on 4 May 1960. His family was not financially well off: his father worked as a labourer and his mother as a nurse’s aide before she turned to knitting jerseys for a living. But this didn’t stop the ambitious, resilient and proactive youngster from pursuing a legal career. With hard work, bursaries and the help of someone who believed in him, he not only matriculated from St Mary’s Seminary but went on to attend the Universities of Zululand and Natal, where he completed his LLB and B.Iuris and then his LLM (cum laude) in labour law, LLM with specialisation in commercial law and LLM in patent law through the University of South Africa (UNISA). He began serving his articles of
26
clerkship under anti-apartheid activist Victoria Mxenge in her Durban-based law firm, but when she was murdered1 he moved to Mthembu and Partners and then Chennels Alberton Attorneys. Following his admission as an attorney in 1989, he became a partner in Durbanbased law firm Mathe and Zondo Incorporated. In 1991 and 1992 he served on two committees of the Commission of Inquiry Regarding the Prevention of Public Violence and Intimidation, otherwise known as the Goldstone Commission. In 1994 Zondo was appointed to the Ministerial Task Team assigned to produce a draft Labour Relations Bill for post-apartheid South Africa. Two years later, he became the first chairperson of the Governing Body of the Commission for the Conciliation, Mediation and Arbitration (CCMA).
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
He resigned from this position when he was appointed as acting judge and then permanent judge in the Labour Court in 1997. In 2000 he was elected Judge President of the Labaour Court, and then in 2011 Acting Judge of the Constitutional Court. He was permanently appointed in late 2012, serving on various ad hoc committees as well. On 1 June 2017 Raymond Zondo was appointed Deputy Chief Justice of the Republic of South Africa.
Commission of Inquiry into State Capture Shortly after taking office in 2018, South African President Cyril Ramaphosa approved the establishment of a commission of inquiry into allegations of state corruption, following which he appointed Zondo to the position
securityfocusafrica.com
PERSONALITY PROFILE
of presiding judge of the Commission of Inquiry into State Capture. Initially expected to last for two years, hearings began on 20 August 2018. Zondo has, since then, twice requested and been granted extensions. The final one as per a High Court Ruling on 31 March 2021, according to Sunday World2. Finance Minister Tito Mboweni, in his presentation of the country’s 2020 Medium Term Budget Policy Statement (MTBPS) in Parliament, allocated an additional R63 million to the Commission from the Department of Justice and Constitutional Development “to finalise investigations and produce a close-out report.”
Paying it forward In his interview for the position of Deputy-Chief Justice, as reported by Judges Matter’s website3, Zondo said a local businessman had agreed to support his mother and siblings with groceries while he attended university. The loan was to be paid back once he had obtained his degree. However, when he went back to negotiate the repayment terms after graduating, the man said: “No, don’t worry, just do to others what I have done to you”. I thought that was very important and in my own small way I have tried to do that. Zondo and his wife Thembekile visited his old school in February 2020 where they joined the South African Muslim Charitable Trust (SAMCT) in partnership with the Zondo and Bux Educational Trust and donated R1.5 million towards a borehole and infrastructure, according to an article published on iol.co.za4. The South African Muslim Charitable Trust5 provides more information on the act of kindness that allowed Raymond Zondo to pursue his dream: When the Deputy Chief Justice of the country, Judge Zondo, matriculated, he knew that he was going to obtain a bursary to study law. But he was in a dilemma – if he went on to university, there would be no one to take care of the needs of his mother and siblings. He went to see Mr Suleman Bux, owner of Kwa Moosa Wholesalers, in the town of Ixopo. He explained his situation to him and asked for assistance. Without batting an eyelid, nor setting anything down on paper, Mr Bux gave him a voucher for his mother to collect groceries from his shop on a monthly basis for the three years during which he was going to be at university. When the now Judge Zondo obtained his
securityfocusafrica.com
law degree, he went back to Mr Bux to ask him how he could repay him. Mr Bux told him not to repay him and said, “Just do for others what I have done for you,” or words to that effect. This story went viral after Judge Zondo recounted it at his interview for the post of Deputy Chief Justice of South Africa. In October 2017, the Women’s Cultural Group, in association with Albaraka Bank, hosted a dinner to get the Zondo and Bux families together. At that dinner, it was mooted that a bursary fund be set up to assist historically disadvantaged pupils who might be in the same boat in which Judge Zondo found himself so many years ago. At that dinner over R250 000 was raised and led to the formation of The Zondo and Bux Educational Trust. Through this Trust, Judge Zondo is able to do for others what Mr Bux had done for him. And Mr Bux continues with his philanthropic work. “Without that kindness of strangers and the assistance of bursaries, I would never have gone past primary school,” Zondo says. South Africa’s second most powerful judge deserves a good break before he resumes work in the New Year, which could see former President Jacob Zuma finally appear before the Commission. According to SABC News6, the commission’s legal team has issued two summonses for Zuma to appear between 18 and 22 January 2021 as well as between 15 and 19 February. This follows on the Commission’s urgent application to the Constitutional Court for an order declaring Zuma’s walk-out of proceedings on 19 November as unlawful and to compel him to appear before the Commission. 1. More about Victoria Mxenge here: https://www.sahistory.org.za/people/victorianonyamezelo-mxenge 2. https://sundayworld.co.za/news/zondocommission-given-an-extra-r63-million/ 3. https://www.judgesmatter.co.za/interviews/ april-2017-interviews/jsc-candidates/ judge-raymond-zondo 4. https://www.iol.co.za/sunday-tribune/news/ deputy-chief-justice-raymond-zondodonates-r15m-to-former-school-42450489 5. http://www.samct.co.za/establishment-ofthe-zondo-bux-educational-trust 6. https://www.sabcnews.com/sabcnews/ new-set-of-dates-allocated-for-zumasappearance-before-state-capturecommission
State capture media briefing Midrand, 7 March 2018 Source: www.judiciary.org.za/
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
27
CYBER SECURITY
Ensuring your Wi-Fi network is ready for the
Android 11 QPR1 security update The Android 11 QPR1 security update is a minor one, but will have far-reaching consequences on enterprise Wi-Fi networks when it is implemented during the course of December.
M
ost organisations with 802.1x Wi-Fi networks are still using relatively-ancient legacy EAP methods (such as PEAP and EAP-TTLS) and credentials. The security update is intended to force organisations to update their Android security through a process of eliminating the ‘do not validate’ option when prompted for CA Certificate details in the dropdown menu for network settings. “The last thing that organisations need is to return to business to discover that they can no longer connect to their Wi-Fi network. This could be catastrophic for organisations who do not take proactive action immediately, as wireless
connectivity has become a cornerstone of most organisations,” says Andre Kannemeyer, CTO for Duxbury Networking. Kannemeyer points out that the security update will provide an added layer of protection against hackers who are intent on setting up fake access points with a spoofed SSID that harvests user credentials. “The security update makes provisioning certificates to Android devices mandatory. Managed devices are easy to configure and enrol, but provisioning certificates to Android devices could be a problem without the right tools. It’s not a case of ‘if’ this will
happen, it’s a case of ‘when’ it happens. However, by taking action as quickly as possible, the effects will be negated. Duxbury has an experienced team of technical specialists in place to provide advice and suggest solutions to mitigate the potential consequences. We strongly urge organisations to contact us as soon as possible to discuss remedial options,” says Kannemeyer.
For more information, contact Duxbury Networking Tel: +27 (0) 11 351 9800 Email: info@duxnet.co.za Web: www.duxbury.co.za
ALL-INCLUSIVE INTRUDER DETECTION FOR YOUR BUSINESS
CYBER SECURITY
Being a small business doesn’t mean
you’re safe from cybercriminals
In today’s fast-moving society, cybercrime has advanced to a stage where you can expect to hear reports in the media every week about large corporations experiencing attacks.
A
nd these types of attack are only advancing. It could be very easy, as a small business, to have sympathy for those corporate firms, but ultimately feel thankful that your organisation is small enough not to warrant you being a target for this kind of activity. And that would be a mistake. Yes, for those cybercriminals who are focused on the high risk = high reward dynamic of targeting high scale corporates, you may not be of interest. But this is not the only type of assault a business could face. We’re seeing an increasing number of large-scale, low-risk operations, where the individual “rewards” for the attacker may be fairly small, but when this is spread across a wide net of businesses, the payoff begins to mount up. And this makes it a very easy win for these attackers, but a nightmare for small businesses. We all think it won’t happen to us… until it does. Although there are new scams being invented every day, there are currently two main types of approach in this situation, so it’s worth taking note. The first involves businesses being sent an email or a physical letter from a supplier claiming that they have new bank account details and requesting that the business updates their systems accordingly. The result is that a small organisation follows what it believes to be genuine instructions and ends up paying
securityfocusafrica.com
an attacker any funds due to that supplier. And even worse, the business still remains liable for paying the genuine supplier once it is discovered that the money has gone elsewhere. The second involves an attacker gaining access to a small firm’s systems and changing their invoicing account details to the attacker’s own account details. This means that any customers receiving and then paying those invoices are giving money straight to the cybercriminal, leaving both customer and business out of pocket, and the business liable for the customer’s funds having gone elsewhere. These types of attack are so easy to carry out and hard to trace, but that doesn’t mean there’s nothing you can do to protect yourself. In fact, there’s plenty you can do. The key is not to get complacent but to ensure that you have robust security protocols in place to protect your data. 1) Remember that any device connected to the internet poses a potential risk. Ensure you have multi-factor authentication in place for any part of your business that is connected to data and exchange of information. 2) Make sure you clearly understand your business processes, such as how you’re invoicing, so you can be more aware of where an attack might come from. Also be aware that the more informal your invoicing system is, the easier it is for a cybercriminal to
Quentyn Taylor is the Director of Information Security at Canon for Europe, Middle East and Africa.
access and start changing details. 3) Don’t be afraid to ask thorough questions of anyone requesting you share information with them. Like someone claiming to be from your bank’s fraud department, for example. Double check account details. Call suppliers and customers back using a phone number you know is genuine to check incoming requests. 4) Don’t think it won’t happen to you. Stay vigilant and train your team on the risks. 5) Plan for the worst-case scenario so you know what steps to take if you do suffer a breach.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
29
CYBER SECURITY
Get the attacker’s view on your cyber defence Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, shares his insights on the five core aims of cyber attackers - and the multi-layered defence approach that could stop them targeting your business.
I
’ve been talking to hackers, to get into their mindset so I can work out how best we can help businesses protect their end users and sensitive data. And the first thing that comes out is that, generally, a cyberattack is nothing personal; you’re not being specifically targeted. Most phishing, ransomware or vulnerability scanning attacks out there are widespread sprays, hoping for a pay-out. It’s a numbers game; test the defences of enough organisations and you’ll find one that will let you in. It’s like walking down your main shopping precinct and having a flyer thrust into your hand - you’re a target, but you’re not being specifically targeted. Most people will bin the flyer without reading it, but a few will read and act upon the information, bringing in enough return to make the whole flyer operation profitable.
30
So, if it’s rarely personal, why do hackers attack? What’s in it for them? By understanding the level of investment they’re willing to make and the danger they’re willing to risk, we have a better chance of disrupting their operating model or putting a stop to it altogether.
The five core ‘wants’ of cyber attackers My research unearthed five main elements attackers are looking for. Once you understand them, you have the basis for a robust defence strategy. You can filter an attacker’s wants into the following: #1 Your bandwidth They want to use your networks and IT for targeted attacks against others or as part of their DDoS attack infrastructure. #2 Your money This can take many forms, from mining bitcoin through to extortion or
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
manipulating your stock price. A whaling attack could trigger fraudulent money transfers, or they could steal funds through capturing credit card and banking details. #3 Your data Attackers can monetise your data through extortion, with or without ransomware, either threatening to delete or leak your data. They can also obtain funds by stealing your intellectual property. #4 Your storage They might need somewhere to store something illegal and/or non-attributable on your systems. Think pirate software and illegal images. #5 Your identity Although your identity may well only be worth pennies if harvested and sold on, it might bring in a greater return if used in attacks against your social network or employer. Think whaling.
securityfocusafrica.com
CYBER SECURITY
A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organisation and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.
Layer and combine your defences for maximum effect Understanding the many ways you could be an attractive target can be daunting, but use it to focus your defensive work on making access to your assets as difficult as possible. Multiple, overlapping layers of security are the key to deterring, disrupting and frustrating cyber criminals. For example, taken in isolation, security controls are fallible and can be rendered useless by human error or software vulnerabilities or misconfigurations. I’d go so far as to say that attackers can get around even the best security controls in some situations. But the defensive power of security controls lies in a combination of layers, bringing together deterrents, preventative measures and detective activity. It’s very hard for an attacker to dodge them all at the same time. Think of it like protecting your home. If the locks on the doors and windows and outside lights don’t keep the burglars out, the alarm, CCTV and large, barking dog might do the trick!
Make your business unviable for attack Most cyberattacks are based on sound financial principles. Attackers look to spend as little as possible and only as much as will yield a healthy return. You
securityfocusafrica.com
can best defend your business by strengthening your cyber hygiene factors to the point where you’re not a viable target for an attack. Don’t give yourself away cheaply! Start with a realistic assessment of your hardware and software; obsolete and endof-service-life IT is dangerous. Bite the bullet and replace it before it costs you a lot more from being exploited. Then work methodically through your estate, securing as you go. Include your physical infrastructure and your perimeter, including Wi-Fi, cloud and any partnerships. With that in place, get familiar with your security environment, so that you understand the significance of any flags your security measures raise. There’s little point in having anti-virus, anti-malware, intrusion detection systems, and endpoint detection and response if you don’t react to their alerts. Beware the one-size-fits-all security policy and restrict access to the lowest level of privilege that’s functional. Consider the access needs of departments and user groups on a case-by-case basis and separate out duties and functions. Train your people to default to the lowest level of privilege necessary to perform an action and so minimise times of vulnerability where individuals are logged in with admin rights. Reinforce the rule
that credentials must never be shared. Simply put, there should be a different, strong password for each account a user has, and it should never be one they use outside work. It’ll make auditing and identifying leak points easier. Put ‘honey-accounts’ into your domains. These accounts are never used legitimately and are monitored with a hair-trigger/ rapid-response that could tell you if someone is compromising your organisation. Plus, always apply patches as soon as they’re available. Failure to patch makes it cheaper and easier for the attacker to exploit common vulnerabilities. Push them to the expense of developing or buying a zero-day exploit.
Know your cyber enemy I’m reminded of the Sun Tzu quote: “If you know neither the enemy nor yourself, you will succumb in every battle”. If you want to stay secure, get familiar with the attacker mindset and establish a clear view of your defences. And don’t do this as a one-off. Get obsessive about understanding your vulnerabilities and the latest ways malicious actors are seeking to evade detection. For more information, visit www.bt.com/about
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
31
CYBER SECURITY
The vital role of threat intelligence in today’s cyber defences
Daniel Lawrence, Senior Manager, Intelligence, BT, shares his insights on why the human firewall and exploring the known unknowns are essential to your cyber security.
B
efore joining the threat intelligence and investigations team at BT, I had spent 25 years in law enforcement, leading teams tackling the fight against organised crime. And I can tell you that, in terms of cybercrime, the basic principles never change. Threat actors are still trying to gain access to the most prized possessions of people and businesses, whether that’s cash (or increasingly, cryptocurrency), data, intellectual property or inside knowledge they’ll use for geo-political influence or commercial gain. It’s a cold, hard truth that you won’t win a fight, against those intending you harm, without intelligence. In fact, to draw on a famous quote by former US Secretary of State for Defence, Donald Rumsfeld: “Cyber security is all about the knowns and the unknowns. There are known knowns (the things we know), the known unknowns (where we feel we have a gap in our knowledge) or the unknown knowns (a zero-day vulnerability; the things we have seen and have yet to truly understand). I spend my working life bringing people, processes and technology together to get a helicopter view of all issues to enrich our picture of the most virulent emerging cyber threats and threat actor groups. So, what are we seeing now?
Consistent attack methods demand outstanding cyber hygiene Although the trend for demanding money continues to grow, the tactics used to deliver the payload or network access remain relatively consistent. Phishing, insider threats and exploiting poor network security are the most likely forms of attack
32
you’ll come up against. Your strongest defence is making sure your staff have excellent cyber hygiene - that they understand why it is so important and are vigilant all the time. This will create a human firewall at the very edge of your network. Without an active human firewall, for example, the recent hacking plot that offered a Tesla employee $1 million to plant malware at the company’s Gigafactory may have succeeded. Everyone throughout your organisation needs to be on the alert, but it’s worth calling out that we know threat actors will target certain role holders. Not only the executive positions, as seen in previous whaling attacks, but also a wider community of differing ‘personas’ because the threat actors will attempt to target anyone into performing specific actions that will give access to the business’ crown jewels.
Beware the threat-actor meeting of minds Historically, malicious code was designed and delivered by the same individual or group, but now there’s a much more open market where, for a price, malware is available for others to use. There’s an increasing trend for groups to come together; for threat actors to join forces and use the power of collaboration for mutual benefit. They’re joining together to carry out attacks, but also to provide the infrastructure to obfuscate the true launch site and nature of the attack. We see this at an organised crime level and also at a nation state level. In 2019, for example, we first identified definite links between the Lazarus cybercrime group and a Russian criminal group (TA505) when
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
they worked together to exploit banking networks. Other nations have been widely accused of using cyberattacks to fund their government. For example, the 2016 cyber heist that used the SWIFT network to illegally transfer close to US$100 million from Bangladesh Bank.
A spike in ransom denial-ofservice attacks New tricks and methods emerge every day, showing the importance of understanding the known unknowns and the unknown unknowns. It only takes one small mistake by one person to cause significant harm to the organisation. Something to watch out for are Ransom Denial of Service (RDoS) attacks, where someone threatens to deliver a DDoS attack unless a ransom is paid. It’s the equivalent of blockading the road outside your delivery depot and threatening to stop people passing unless payment is made. The wide availability of easy to use ‘stressor’ tools makes this an option for even the least knowledgeable of threat actors. Simple, but effective, these attacks don’t have to get hold of your data; they can just disrupt your operations. In many cases, no actual attack is carried out. To defend against RDoS attacks, monitor your traffic and events so you can pick up on the early presence of abnormal traffic. You’ll then be able to divert operations around the attack vector, while monitoring the original attack and its sources. In summary, the growing number of cyber threats should never be underestimated – and we all need to remain vigilant if we’re to stay one step ahead of the ‘enemy’. It’s essential to assume nothing, question everything and verify all.
securityfocusafrica.com
CYBER SECURITY
Tips to protect your online identity A recent US survey has found that only 77% of consumers are concerned about online identity theft.
A
nd with 34% of respondents indicating that they had experienced a cyberattack, it seems a matter of when rather than if a person gets hacked. Meanwhile, South Africa has the third most cybercrime victims in the world, losing R2.2 billion a year. All this suggests that our increasing connectedness requires a rethink of how to better keep our digital lives safe. Central to any cybersecurity approach is getting the basics rights. This revolves around applying common sense to help guide us in our activities in the cybersphere, just as it should in the physical world.
Dos and don’ts in our everyday online activities Firstly, you must use a different password for every online account you have. These passwords must be hard-to-guess and never be written down. This is easier said than done given how extensive our digital footprint is. From the laptop (or smartphone) passcode through to email, social networks, online shopping, online banking, messenger apps, and other passwords, it is not difficult to imagine that each of us could easily require 10 or more unique passwords.
securityfocusafrica.com
This is where a password manager becomes critical. Typically, you would need just one login to get into the manager with the solution providing encrypted passwords to get into each of your online accounts. While there is a myriad of freely available tools that are able to do this, it is worth investing in a product from a reputable vendor. Adding to this, you should consider opting in for two-factor authentication if the service allows for it. This means that you rely on more than just a username and password to login to an account. In most instances, this could take the form of an SMS to your phone providing a one-time password (OTP) to confirm it is, in fact, you that is trying to login. So, even if a hacker guesses (or steals) your password, they will still need physical access to your phone (or another device) in order to gain access. Despite the high number of malware and phishing scams out there, many people still click on links they get or download and open attachments they receive via email. Nowadays, this could extend to opening malicious videos on instant messenger apps like WhatsApp or Facebook Messenger. It is therefore critical that you never click on any link that cannot be verified. You can simply contact your friend to confirm the message or by simply deleting it. You must
avoid emails from unfamiliar senders. Looking for grammatical errors and spelling mistakes on messages claiming to be from the bank or insurer are easy ways to spot a fraudster. Another giveaway is links that do not work or that redirect to sites you do not recognise. Hover over a suspicious link with your mouse to see where it is going and avoid if it seems like a strange site. While social media has become the preferred way for many people to keep in touch with friends, family, and loved ones, we must be vigilant in the personal information we post on a social network. Check your privacy settings to ensure only friends can see your posts. This keeps the information limited to a smaller circle of people. Unfortunately, many people (including children and teenagers) share everything about their lives. Not only is this potentially dangerous from a real-world perspective (think kidnapping, human trafficking, and home break-ins), but it can also result in online identity theft. The best cybersecurity technology in the world means little if we do not take responsibility for our own online behaviour. It is about being vigilant about what we do and share in the digital realm and questioning every email and link we do not recognise.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
33
CYBER SECURITY
Infamous hacker-for-hire group DeathStalker hits the Americas and Europe with new PowerPepper malware
Monday, 07 December 2020; DeathStalker is an advanced persistent threat (APT) actor that is believed to offer hacking-for-hire services to steal sensitive business information from companies in the financial and legal sector.
F
irst reported by Kaspersky researchers in August of this year, the mercenaries’ activities have once again been spotted in the wild. This time they’re using a new malware implant and delivery tactic: a backdoor dubbed PowerPepper by Kaspersky, which leverages DNS over HTTPS as a communication channel (to hide communications with the control server in legitimate-looking ones). PowerPepper also uses several evasion techniques, including steganography (a method for disguising data). DeathStalker is a highly unusual APT actor. Active since at least 2012, the group conducts espionage campaigns against small and medium-sized businesses—law firms and those representing the financial sector. Unlike other APT groups, they don’t appear to be politically motivated or seek financial gain from the companies they target. Rather, they act as mercenaries, offering their hacking services for a price. Kaspersky researchers have recently
34
uncovered new malicious campaigns from the group, this time deploying a new backdoor (malware that allows attackers to take control of the victim’s device remotely) known as PowerPepper. Like other malware strains associated with the group, PowerPepper is typically spread via spearphishing emails with the malicious files delivered via the email body or within a malicious link. The group has exploited international events, carbon emission regulations, and even the pandemic to trick their victims into opening the malicious documents. The main malicious payload is disguised using steganography—a process that allows attackers to hide data amid legitimate content. In the case of PowerPepper, the malicious code is embedded in what appears to be regular pictures of ferns or peppers (hence the name) and is then extracted by a loader script. Once that happens, PowerPepper begins to execute remote shell commands sent by DeathStalker operators, which are aimed at stealing sensitive business
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
information. The malware can carry out any shell command on the targeted system, including those for standard data reconnaissance, such as gathering the computer’s user and file information, browsing network file shares, and downloading additional binaries or copy content to remote locations. The commands are obtained from the control server though DNS over HTTPS communications—an effective way to disguise malicious communications behind legitimate server name queries. The use of steganography is just one of several obfuscation and evasion techniques employed by the malware. The loader is disguised as a GlobalSign (a provider of identity services) verification tool, it uses custom obfuscation, and parts of the malicious delivery scripts are hidden in Word-embedded objects. Communications with the implant and servers are encrypted, and, thanks to the use of trusted, signed scripts, antivirus software won’t necessarily recognise the implant as malicious at startup.
securityfocusafrica.com
CYBER SECURITY To protect your organisations from attacks like PowerPepper, Kaspersky experts recommend:
A summary of the encryption techniques deployed by PowerPepper
PowerPepper has been seen in attacks across Europe primarily, but also in the Americas and Asia. In previously described campaigns, DeathStalker mainly targeted law consultancy firms and organisations that provide financial or cryptocurrency services. “PowerPepper once again proves that DeathStalker is a creative threat actor: one capable of consistently developing new implants and toolchains in a short period of time. PowerPepper is already the fourth malware strain affiliated with the actor, and we have discovered a potential fifth strain. Even though they are not particularly sophisticated, DeathStalker’s malware has proven to be quite effective,
securityfocusafrica.com
perhaps because their primary targets are small and medium-sized organisations— organisations that tend to have less robust security programs. We expect DeathStalker to remain active, and we will continue to monitor its campaigns,” comments Pierre Delcher, security expert at Kaspersky. PowerPepper was part of the most recent GReAT Ideas: Powered by Croissant. Baguette Edition. You can watch the recording, as well as other presentations on the latest threat developments by Kaspersky’s top-level experts here1. Read more about PowerPepper and its evasion techniques at Securelist2.
• Provide your SOC team with access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal3 is a single point of access for the company’s TI, providing cyberattack data and insights gathered by Kaspersky over more than twenty years. • To minimise the risk of infection through phishing emails, companies should educate their employees with basic cybersecurity hygiene training4 to be wary of emails from unknown senders. If they receive such letters, they shouldn’t open attachments or click any links in them before making sure the letter is legitimate. • To protect medium-sized businesses from such advanced attacks, it’s better to use endpoint security solutions with EDR functionality. Kaspersky’s Integrated Endpoint Security5 solution detects an attack and provides a wide range of response actions optimised for IT and security teams of mid-sized companies. 1. https://kas.pr/uy1e 2. https://securelist.com/what-did-deathstalkerhide-between-two-ferns/99616/ 3. https://opentip.kaspersky.com/ 4. https://www.kaspersky.co.za/enterprisesecurity/security-awareness 5. https://www.kaspersky.co.za/small-to-mediumbusiness-security/endpoint-security-solution
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
35
ON THE MARKET
Advances in UV technology for disinfection
I
deco Biometrics is setting new standards for disinfecting biometric sensors by using ultraviolet technologies to destroy most known viruses and bacteria. The company has introduced Steri-C, an ultraviolet disinfection device to ensure the safe use of touch-based fingerprint readers. Steri-C is easily mountable on existing fingerprint readers and has no adverse impact on the normal operations or accuracy of the fingerprint reader. It offers fast and effective UV irradiation for optimal destruction of all known microorganisms, including the SARSCoV-2 virus responsible for Covid-19. The use of UV-C (200 - 225 nm) as a disinfectant is supported by decades of scientific research and has been used for disinfection with applications in water treatment, air systems and surfaces. UV light is able to achieve thorough disinfection far quicker than the other traditional methods, it is highly effective in destroying viruses, bacteria and fungal
36
spores. Netcare also recently introduced Xenex Pulsed Xenon UV disinfection robot, a germ-zapping robot to take the war on ‘superbugs’ to a new level. The robot emits UV-C spectrum light, which destroys the DNA of bacteria, viruses and fungi to neutralise them and prevent them from replicating. Ideco CEO Marius Coetzee says Steri-C is ideal to make biometric readers Covid-19 safe and maintain normal biometric operations during high risk periods. “It is the perfect solution for improving hygiene and to limit contamination. Steri-C has been designed for fast and effective operations, ready to be integrated into your existing fingerprint readers.” Steri-C is based on Ultraviolet Germicidal Irradiation (UVGI) recommendation for medical sanitisation practice according to the International Ultraviolet Association (IUVA) and the FDA. The specific UVC used by Steri-C was proven effective
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
against the Coronavirus by Boston University’s National Emerging Infectious Diseases Laboratories. When viruses are exposed to UVC, its effects on their molecular structures destroy the structural bonds in the DNA, with a resultant rendering of the virus harmless and stopping its spread. The device can be retrofitted to most fingerprint readers available on the market. Disinfection is triggered immediately after every use of the fingerprint reader. It boasts built-in intelligence to automatically detect when the biometric terminal has been used. Coetzee says regulations around occupational health and safety requires organisations to keep surfaces clean and safe to use. “Clients don’t have to disable their existing biometric equipment or purchase costly touch-free biometric readers.” “Steri-C can be pre-installed as a standard feature on biometric terminals purchased from Ideco,” he concludes.
securityfocusafrica.com
ON THE MARKET
When not just any battery will do
Greg Pritchard of GSS Group showing current and newly rebranded batteries and the wellknown GSS battery which is steadily being replaced by the company’s new EPS brand
Only high quality batteries from reputable suppliers should be used for security and other mission-critical equipment to avoid potentially costly failures.
T
his is according to the director of one of the country’s fastest growing battery distributors, Greg Pritchard from GSS Group, who adds that intermittent load shedding and other environmental factors can quickly damage batteries that are not specifically designed and manufactured for these important applications. He says that on average an 8 amp hour battery should last approximately five years even with moderate load shedding. However, a flood of inferior quality, cheap batteries sold by retailers and traders, may only last for a couple of months or one deep discharge cycle. Even batteries sold at some security outlets have reduced life cycles due to manufacturers saving on expensive materials.
Heavyweight battery “One of the easiest ways to gauge the quality of a lead acid battery is its weight. Lead is one of the most expensive components of a battery and is usually where manufacturers make their savings. Our commonly sold 8Ah, for example, are very heavy and we have just the right amount of lead required to make this standard battery one of the most durable
securityfocusafrica.com
available. Beneath the skin are other design features that set the batteries apart such as the type of acid used, layout and design. “Unfortunately, for the installer or layman these are difficult to know and it usually falls to trial and error to figure out which batteries are better, last longer and are best able to handle mission-critical applications in any power conditions. That is where our GSS batteries have performed excellently and is the reason for our company’s rapid growth in the four years we have been trading. “Our batteries have been specified, designed and built according to our own requirements, using knowledge that we have gained over thirty years of experience in the industry. We have applied the lessons learned and come up with a number of different types and sizes of batteries specifically for mission-critical applications in South Africa,” says Greg.
Good reputation He says there are a number of reasons why monitoring companies should use quality GSS batteries and why end users should insist on them. In security applications a battery can mean the
difference between life and death, while information technology infrastructure can lead to data and telecommunication interruptions or even the failure of instruments in manufacturing plants etc. Faulty batteries also lead to false alarms and unnecessary call-outs which cost monitoring companies money and excessive false alarms can taint their reputations in the long run. What is more, the homebred GSS batteries are competitively priced and available online from the company’s website, via delivery or direct from the company’s premises in Benoni on the East Rand. Greg has also worked for the country’s leading security product suppliers and interfaced with all the major electronic installation companies, overseas manufacturers, technicians and end users. He is eager to share his knowledge and welcomes customers to work with him and his team to supply quality batteries and power products for their applications.
Growing range GSS batteries are available in a range of sizes and types from 6 Volt 4.5Ah used mainly in emergency lighting, 12 Volt 1.3Ah and 2.4AH for garage automation, 12V 4.5Ah for uninterruptible power supplies (UPS), 12V 7.2AH for gate automation, UPS and alarm control panels, as well as 12V 7.5Ah deep cycle batteries used mainly for solar, UPS and gate automation applications. The following types are available: • AGM technology: 4.5ah 6V, 1.4ah 12V, 2.4ah 12V, 4.5ah 12V, 7.2ah 12V, 9ah 12V • AGM Deep cycle: 7.5ah 12V, 12AH 12V, 18ah 12V, 24ah 12V, 45ah 12V • Gel technology: 8ah 12V, 100ah 12V The company also has a range of Lithium Polymer and Li Phosphate batteries, power supplies and transformers, as well as security communication cable, CCTV, Cat5, Cat6, Control cable (EN0575, IEC60332-1 standards) and security products including detectors, beams and CCTV.
Issued on behalf of GSS Group Greg Pritchard Tel: (010) 140 7137 Email: greg@gssgroup.co.za Web: www.gssgroup.co.za
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
37
ON THE MARKET
Updated anti-ligature camera for secure facilities from ITS Products
ITS Products has released their latest version of an antiligature, non-grip, corner custodial camera. It has been developed for prisons, secure mental hospitals, custody suites, immigration detention centres, juvenile facilities and other estates for challenging and vulnerable occupants.
I
n the wake of high-profile deaths in remand centres and increasing scrutiny of prison regimes as well as the vigilance of officers, the CMD4 has been designed to offer an extremely wide field of view minimising room blind spots. The camera can help staff demonstrate duty-of-care with problematic prisoners. High-resolution recordings ensure appropriate treatment of room occupants while also protecting authorities from spurious lawsuits. The CMD4 delivers megapixel image resolution in full colour while the room is lit and during darkness the near invisible IR illuminators allow comprehensive monitoring of vulnerable inmates. It maintains a safe working environment that minimises unnecessary physical proximity at a time when this is high-risk for everybody. There have always been strong arguments for installing cameras of this kind, but safety of frontline workers in the current climate is now a clincher. The camera is ONVIF-compliant and works with all leading video surveillance recording and management systems. It balances zero ligature or grip potential for a cell occupant intent on self-harm with protection of the unit from attack. Vandal resistance is at a premium for violent inmates or in other demanding environments and the camera meets IK10 in terms of resisting external impact up to 20 joules. Covert energy-efficient IR illuminators produce clear actionable video in low or minimal lighting conditions when this is required during sleeping hours. Discreet
38
observation of cell occupants who may be in a distressed state can continue for their own protection in complete darkness if necessary. Flexing into the corners of a cell or room, the CMD4 factors out gaps, something that is greatly appreciated in mature estates where a true 90-degree corner is a rarity. The camera and integrated corner housing are installed in minutes, and maintenance or inspection requires use of only six screws. In the unlikely event of a need for part replacement, spares are fitted easily. ITS Products has decades of custodial security experience and appreciates that on-site engineering time and use of tools near prisoners or any correctional inmates must be minimised. The CMD4 scores highly in terms of uninterrupted performance and will be suitable for the toughest prison and secure mental health facilities worldwide. Chris Newman, a director of ITS Products, said: “We’re constantly listening to feedback from our users in the international custody market. Our remit is broad and the camera has been devised for the wellbeing of everybody be they inmates, patients, guards,
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
supervisors, health professionals or visitors.” He continued: “Cases of allegedly excessive restraint (notably in youth detention centres) and several deaths have been the subject of review. Any detention facility presents unique demands on security equipment, and cameras designed for more general applications simply don’t achieve the required results. Our new release has optics and structure optimised for this environment.” ITS Products’ design team behind the CMD4 has worked in high-security prisons ranging from Scotland to Sydney. As with all of the company’s offerings, the unit is created from raw materials in the UK from ITS Products’ own manufacturing base. It is available in the UK from ITS Products and through selected overseas distribution partners.
PRODUCT INFORMATION ITS Products Limited T: +44 (0)1865 818900 E: sales@its-products.co.uk W: www.its-products.co.uk
securityfocusafrica.com
ON THE MARKET
Classic door entry speaker phone gets
a new coat of paint – literally! Viking Electronics now offers its classic door entry speaker phone in a white powder painted finish. “Customers kept painting these phones white. And we want to help our customers as much as possible – so now Viking is painting it for them.” – Andrew Joseph, Product Specialist, Viking Electronics, Inc.
T
he E-10-WHA is a telephone line powered speaker phone designed to provide quick and reliable, two-way, handsfree communication. When the “Call” button is pressed, the E-10-WHA will come off-hook and will remain off-hook allowing personnel to identify who is at the speaker phone. For additional security, the E-10-WHA will automatically answer inbound calls for personnel to silently monitor the area. End the call by simply pressing the “Call” button again or hanging up the called phone. Built-in call progress detection prevents the E-10-WHA from remaining off-hook and tying up the phone line or extension. A programable call length timeout, busy signal detection, and silence timeout ensure the E-10-WHA is ready for the next user.
The versatile E-10-WHA may be connected directly to a CO line or analog PABX/KSU station that is programmed as a ringdown circuit or use with a stand alone ringdown circuit such as Viking’s DLE-200B. The E-10-WHA may also be used with a Viking dialer and is compatible with many of Viking’s Door Entry Controllers. The E-10-WHA is designed for indoor use. For outdoor applications, use model E-10-WHA-EWP, which includes Enhanced Weather Protection (EWP). Viking Electronics engineers and manufactures over 500 security and communication products in the USA. Products include Emergency Phones, Entry Systems, Paging Interfaces, Mass Notification Systems, Hotline Phones, Autodialers, Enclosures and more. In addition to their extensive analog line, Viking offers a large selection of IP products that are SIP compliant. Based in Hudson, Wisconsin, Viking’s legacy of reliability and electronic innovation spans 50+ years. Viking builds products that are designed to last and they also offer many
of their products with Enhanced Weather Protection. Offering free lifetime product support they also back their products with a two-year limited warranty. For more information on the E-10-WHA, visit: https://www.vikingelectronics.com/ products/e-10-wha/. For more information, please visit: www.vikingelectronics.com
T guards’ routes and procedures
Be informed about your
ime and attendance of your workforce is an automated process, with the comprehensive SecuTraq workforce tracking and management platform. Features such as geolocation, geofencing, Bluetooth beacons, NFC (Near-field communication), RFID (radio-frequency identification), iButtons and biometrics are used to record when a guard arrives on site or when he leaves. This information effectively improves the management and operations of the guarding service provider - improving productivity and performance of the organisation utilising the SecuTraq platform. For further information please contact Secutel Technologies. Tel: 010 015 1401 Email: sales@secutel.co.za www.secutel.co.za
securityfocusafrica.com
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
39
CASE STUDY
Vox Telecom delivers impressive business benefits with the InfiniBox enterprise storage system from Infinidat
Keith Laaks, Executive Head for Technology, at Vox Telecom.
A
bout Vox Telecom
Vox provides connectivity, communications, security, cloud services, virtual compute capacity, individual virtual machines, data centre solutions and more to the southern African market, with offices in Johannesburg, Pretoria, Durban, Cape Town, Port Elizabeth and Bloemfontein. The company’s offering is aimed at the consumer, small and medium-sized enterprise (SME) and large enterprise market sectors. Vox’s connectivity services are available throughout the country, supported with networking infrastructure, which is operated out of eight data centres. Two of these data centres are used to manage the compute, storage and virtualisation software necessary for delivering Infrastructure as a Service (IaaS) to hundreds of Vox’s customers. The largest consumer of resources on the platform is Vox itself, whereby the company makes use of the infrastructure to host and run hundreds of internal systems and many customer-facing applications, such as
40
email. The reliability and performance of the storage platform is pivotal for these functions and is a critical component of the Storage Area Network (SAN) and virtualisation solutions.
The challenge At the start of 2019, Vox faced two significant difficulties around its existing storage platform. Firstly, the five-year maintenance period was coming to an end, and secondly, the company was running out of capacity much faster than anticipated. Adding to these issues, Vox was unable to utilise the full capacity of its existing storage solution, as some 40TB needed to remain ‘unused’ for the system to function. “We reached the capacity limit of the system faster than anticipated. Coupled with the prohibitively expensive maintenance extension option, we made the decision to perform a technology refresh and replace the platform with a completely new solution,” explained Keith Laaks, Executive Head for Technology, at Vox.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
The solution Vox needed a cost-effective, highperformance storage array for its hosting environment in order to assist the business to meet customer demands and rampant data growth. An agile partner, who would be able to deliver quickly, was also a necessity. After evaluating 12 different storage arrays on criteria such as performance, Inputs/Outputs Per Second (IOPS), storage efficiencies, compression, deduplication and redundancy, Vox selected the InfiniBox solution from Infinidat, supplied by local partner and solutions integrator, Datacentrix. “Datacentrix prides itself on operating within the top three tiers for all its technology partners and provides Tier 1 partner services for Infinidat in the South African market. Our formal customer engagement approach is underpinned by our technical expertise and business advisory services, ensuring best-fit solutions for our clients. As the technical delivery partner throughout the InfiniBox implementation, we delivered all the pre-sales requirements, including
securityfocusafrica.com
CASE STUDY
workshop sessions with Vox and Infinidat representatives as well as ongoing support,” said Schalk Gouws, Account Manager at Datacentrix. Two InfiniBox F4304 arrays were deployed, one at each of Vox’s data centres in Johannesburg within the production and Disaster Recovery (DR) environments respectively. For workloads with low Recovery Point Objective (RPO) and Recovery Time Objective (RTO), Vox makes use of VMware’s vSphere replication feature. “These arrays primarily service our virtual servers, database and voice infrastructure, and also play a key role in our data protection strategy. The solution allows seamless integration with our data protection vendor,” said Selby Maake, Cloud Storage and Virtualisation Engineer at Vox Telecom. “Each array delivers 1.7 Petabytes (PB) of virtual capacity with the actual available capacity variable depending on the compression ratio. This gives us far more storage for an extremely cost-effective rate per terabyte.”
The implementation Implementation of the solution began in September 2019 and took one month to complete. Local Infinidat partner, Datacentrix, worked closely with Vox on the installation, helping Vox take the project from racking, stacking and initialisation, through to switching, provisioning, testing, and finally into the production environment. Infinidat also provided certified administration training through Datacentrix, flying in experts from its head office in Israel to South Africa. This was to ensure the data migration was seamless. “Thanks to excellent relationships, solid teams and effective planning from the outset, the implementation went smoothly and no challenges were experienced. The training and support provided by Infinidat throughout the journey ensured we got it right the first time. The proof of our success came from our customers’ users, who noticed performance improvements without being aware that a storage upgrade had been performed,” said Laaks.
The benefits As a hosting provider, Vox must meet customer demand for capacity. The InfiniBox arrays were ideal due to their flexibility when it comes to scale and ease-of-use for critical workloads. Also,
securityfocusafrica.com
they deliver superior performance with a low total cost of ownership (TCO) without compromising the CX. The InfiniBox ultimately empowered Vox with a data-driven competitive advantage at petabyte scale. “One of the key benefits we have realised results from the low-touch configuration and administration of the InfiniBox arrays. This has allowed us to provision new services and solutions seamlessly and with minimum manual interaction. Our previous solution was laborious to configure, taking up to an hour with multiple steps, increased complexity and room for error. The Infinidat solution takes less than a minute, improving our customer service, whilst freeing up time for our teams to attend to other business needs,” Maake added. Redundancy is another critical feature of Vox’s operations. Previously, the company experienced some issues with failures so a robust solution was required. InfiniBox’s triple redundancy controllers guarantee uptime, ensuring Vox can always deliver uninterrupted service to both internal and external customers. Hayden Sadler, Infinidat Country Manager for South Africa added, “With the InfiniBox arrays, Vox currently experiences below one millisecond latencies across the infrastructure and a minimum cache hit ratio of 95%. Vox now benefits from an array capable of significant IOPS and throughput, whereas the previous solution delivered just 40,000 IOPS between 10 and 20 milliseconds. Both of these aspects are extremely valuable for providing superior performance.” “Aside from our connectivity, broadband access and voice solutions, our cloud offering is a growing element of our
business, with impressive market penetration figures. We needed the right platform to support our growth goals and storage is the key ingredient. The InfiniBox solution supports our requirements by delivering the right blend of cost-effective storage and high performance, coupled with the ability to slot seamlessly into our existing infrastructure,” said Laaks. “Infinidat also provides excellent proactive monitoring and local support through Datacentrix to ensure constant uptime and availability. This is critical to Vox from an operations perspective. Based on our forecasts, we will require additional capacity by the end of 2021. We are extremely happy with the platform and will likely expand our storage with additional InfiniBox arrays, when the time comes,” he concluded.
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
41
NEWS YEAR REVIEW
20 O 2
THE YEAR
2020 has been a year, to date, that has internationally given a number of low points without any meaningful high points (other than the release of vaccines and the demonstrated resilience of communities) to counter the lows. By Peter Bagshawe
H
istorically, the final article of the year would have been a review of the year based on articles written and encapsulating the outgoing year from that perspective. Given the year that has been, this article will focus on three areas that, from my perspective, are of importance, with an overview of their significance. When I referred to low points, this is not limited to the Covid-19 pandemic (which will be referred to later) but encompasses natural disasters, civil and other conflicts and breaks in traditional methods of observing religious and other events. Economic hardships, the breakaway of the United Kingdom from the European Economic Union as well as the introduction of new norms and values into society have all played a role in marking 2020 as an extraordinary year. Internationally, economic decline, job losses and business closures resulting from Covid-19 were, and are the order of the day. Drought, runaway fires in the United States, Europe and
42
Russia, flooding on a wide scale, extraordinary hurricane and tornado seasons in the Americas with widespread destruction point to shifting weather patterns. Conflicts between Armenia and Azerbaijan, Ethiopia in the Tigray region and ongoing internecine conflicts in Afghanistan with increased Taliban activity, Iraq and Somalia show armed conflicts continuing. The US Presidential election was also a conflict on a number of levels. Germany has gone into a Festive Season lockdown, numerous countries are struggling with the second wave of infections and have imposed restrictions, Sweden has appealed for assistance from its Nordic neighbours, while London and other regions of England have gone to tier 3 (the highest level) of restrictions. All of this has taken place more or less contemporaneously with a shift in restrictions in South Africa. On 9 December 2020 it was announced, by Minister of Health Zweli Mkhize, that statistical models confirmed that the
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
second wave of Covid-19 infections had officially hit our country with hotspots identified as Gauteng, the Western Cape, the Eastern Cape and Kwa-Zulu Natal. Statistically the second wave is defined as the point where the total number of infections on a 7-day average exceeds 30% of the peak of the first wave of Covid-19 infections. On 14 December 2020 President Ramaphosa addressed South Africa and laid out a series of restrictions that will apply with effect from 15 December. More specifically, the Nelson Mandela Bay (Eastern Cape), Sarah Baartman District (Eastern Cape) and the Garden Route (Western Cape) were identified as hotspot localities. On the face of it and, using a reality check system, the South African economy, already struggling prior to and from the first lockdown, could not survive a second hard lockdown. The restrictions imposed seem to have been tempered by this reality. However the closure of beaches at the time of peak holiday season will have an impact on these areas. Emphasis
securityfocusafrica.com
YEAR REVIEW NEWS
was placed by President Ramaphosa on mitigation measures (wearing of masks, hand washing and sanitisers), the prohibition of large super spreader events and limitations on social gatherings being essential to control the spread of the virus. The current national curfew has been extended to effectively be between 23h00 and 04h00. In line with the curfew, and to allow for closure and staff/patron travel time, all non-essential establishments, including restaurants and bars, must close at 22h00. Briefly, beaches and parks in the three specific localities mentioned above will be closed from 15 December until 3 January 2021. Parks and beaches in KwaZulu-Natal will be closed on the traditionally busiest days being 16, 26 and 31 December 2020 and 1 and 3 January 2021. The public consumption of alcohol is prohibited on all beaches and at public parks while beaches may only be accessed between 09h00 and 18h00; all festivals and gatherings at beaches are banned. Other than as stated above, access to beaches in the Western Cape and Northern Cape is unrestricted. Given the loss to the fiscus by way of Value Added Tax and Excise Duty from the first hard lockdown prohibition on the sale of alcohol, this is now only permitted between 10h00 and 18h00 from Mondays to Thursdays. The consumption of alcohol is prohibited in all public places. With regard to social events, President Ramaphosa emphasised the risk posed by large gatherings without social distancing and preventive measures. The example of the confirmed infection of some 900 out of 1,300 Gauteng attendees at the Ballito Rage event was given and undoubtedly led, at least in part, to the imposition of strict regulations on social gatherings.
Following on from this, mention was also made of the anomaly that the highest level of infection is, currently, in the 15-19 year old demographic. Public gatherings, including religious gatherings, have been curtailed in terms of the new regulations, with indoor gatherings limited to 50% of the venue capacity but subject to a maximum of 100 persons at an indoor venue and 250 people at an outdoor venue. Health protocols must be observed, with the wearing of masks mandatory and all post-funeral events have been prohibited. In respect of the workplace and public venues, the enforcement of the wearing of masks and social distancing is a requirement. Additionally, employers are required to maintain records of attendance at the workplace. It should be noted that failure to adhere to the new regulations is now subject to criminal sanction by way of a fine and/or imprisonment. Turning to the other topics, the Zondo Commission has proceeded to the Constitutional Court requesting an order from the Court to enforce attendance at Commission hearings by former President Jacob Zuma in compliance with the summons issued by the Commission directing Zuma to appear before the Commission from 18 to 21 January and again between 15 to 19 February 2021. This is an adroit manner of avoiding further appeals and delays on the side of Zuma. In an interesting twist, Zuma failed to file his answering affidavit as to whether he will defend the Application and instead advised, through his attorney, that he would not participate in the Constitutional Court proceedings. This makes it apparent that the Commission is focusing on obtaining answers from
Zuma, subject to his right to avoid self-incrimination, prior to the Commission’s mandate expiring at the end of March 2021. Zuma has, however, lodged papers in the Pretoria Division of the High Court to challenge Chairperson Zondo’s decision not to recuse himself from hearing evidence from Zuma. The Public Protector, Busisiwe Mkhwebane, suffered a further legal setback when the full Bench of the Western Cape High Court dismissed her application for an interim interdict prohibiting the Speaker of the National Assembly from proceeding with the process of considering her removal from office. Again, the judgment was scathing and critical of the legal basis provided by Mkhwebane but the thrust of the matter is that the way is now clear for the Parliamentary Removal Inquiry to proceed. Retired Constitutional Court Judge Bess Nkabinde will chair the panel which includes Senior Counsels Dumisa Ntsebeza and Johan de Waal, who are tasked to assess if sufficient evidence exists of misconduct, incompetence or incapacity to proceed with proceedings against Mkhwebane and examine her competence to hold office. Again, this demonstrates the way forward is open and proceeds to bring a measure of finality to a situation that has dragged on for too long a period. All that remains is to wish readers a blessed, safe and healthy Festive Season. Those who travel, please do so safely. PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.
November – December 2020
INDEX OF ADVERTISERS AND CONTRIBUTORS ADVERTISER
PAGE
WEBSITE
FS-Systems
14
cathrine@fs-systems.co.za
www.fs-systems.co.za
IDIS Global
28
info@idisglobal.com
www.idisglobal.com
Institute of Security Studies
20
jburger@issafrica.org
www.issafrica.org
LD Africa
26
sales@ldafrica.com
www.ldafrica.com
MiRO
29
sales@miro.co.za
www.miro.co.za
Nemtek
3
websales@nemtek.co.za
www.nemtek.com
Security Association of South Africa
IBC
admin@sasecurity.co.za
www.sasecurity.co.za
Secutel Technologies
28
sales@secutel.co.za
www.secutel.co.za
securityfocusafrica.com
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
43
DIRECTORY
SECURITY ASSOCIATION OF SOUTH AFRICA (SASA) ADMINISTRATION Suite 4, Blake Bester Building, 18 Mimosa Street (cnr CR Swart Road), Wilro Park, Roodepoort Suite 147, Postnet X 2, Helderkruin 1733 National Administrator: Tony Botes t: 0861 100 680 | e: tony@sasecurity.co.za c: 083 272 1373 | f: 0866 709 209 Membership, accounts & enquiries: Sharrin Naidoo t: 0861 100 680 | e: admin@sasecurity.co.za c: 083 650 4981
SASA OFFICE BEARERS
REGIONAL OFFICE BEARERS
National President: Chris Laubscher c: 082 441 4092 e: laubscherc@proteacoin.co.za
Gauteng: Gary Tintinger c: 084 429 4245 e: gary.tintinger@cwexcellerate.com
National Chairperson: Marchél Coetzee c: 084 440 0087 | e: marchelcoetzee@omegasol.com
KwaZulu-Natal: Clint Phipps c: 082 498 4749 e: clint.phipps@cwexcellerate.com
National Deputy Chairperson: Yagan Nair c: 082 561 3529 e: yagannair@national.co.za
Western Cape: Koos van Rooyen c: 082 891 2351 | e: koos@wolfgroup.co.za
SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS PSIRA (Private Security Industry Regulatory Authority) Eco Park, Centurion t: +27 (0)12 003 0500/1 | Independent hotline: 0800 220 918 | e: info@psira. co.za | Director: Manabela Chauke | Chairperson: T Bopela | Vice chairperson: Z Holtzman | Council members: Advocate A Wiid | Commissioner A Dramat APPISA (Association for Professional Private Investigators SA) Bertie Meyer Crescent, Minnebron, Brakpan | e: info@appelcryn.co.za | www.appelcryn. co.za | c: +27 (0)73 371 7854 / +27 (0)72 367 8207 | Chairperson: Ken Appelcryn ASIS International Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060 | t: +27 (0)11 652 2569 | www.asis155jhb.webs. com | President/chairperson: Johan Hurter | Secretary: Chris Cray ASIS International (Chapter 203: Cape Town – South African Security Professionals) President/chairperson: Yann A Mouret, CPP Secretary: Eva Nolle t: +27 (0)21 785 7093 f: +27 (0)21 785 5089 | e: info@aepn.co.za | www.asis203.org.za BAC (Business Against Crime) Box 784061, Sandton 2146 | t: +27 (0)11 883 0717 | f: +27 (0)11 883 1679 | e: info@bac.org.za CAMPROSA (Campus Protection Society of Southern Africa) President: Des Ayob | e: 27149706@nwu.ac.za Executive Secretary: Derek Huebsch | e: huebsch. derek@gmail.com | www.camprosa.co.za CISA (Cape Insurance Surveyors Association) Shahid Sonday t: +27 (0)21 402 8196 | f: +27 (0)21 419 1844 | e: shahid.sonday@saeagle.co.za | Mike Genard t: +27 (0)21 557 8414 | e: mikeg@yebo.co.za DRA (Disaster Recovery Association of Southern Africa) Box 405, Saxonwold 2132 | Chairperson: Grahame Wright | t: +27 (0)11 486 0677 | f: (011) 646 5587 | Secretary/treasurer: Charles Lourens t: +27 (0)11 639 2346 | f: +27 (0)11 834 6881 EFCMA (Electric Fencing and Components Manufacturers Association) Box 411164, Craighall 2024 | t: +27 (0)11 326 4157 | f: +27 (0)11 493 6835 | Chairperson: Cliff Cawood c: +27 (0)83 744 2159 | Deputy chairperson: John Mostert c: +27 (0)82 444 9759 | Secretary: Andre Botha c: +27 (0)83 680 8574 ESDA (Electronic Security Distributors Association) Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: +27 (0)11 845 4850 | Chairperson: Leonie Mangold | Vice chairperson: David Shapiro | www.esda.org.za ESIA (Electronic Security Industry Alliance) Box 62436, Marshalltown 2107 | t: +27 (0)11 498 7468 | f: 086 570 8837 | c: 082 773 9308 | e: info@esia. co.za | www.esia.co.za FDIA (Fire Detection Installers Association) Postnet Suite 86, Private Bag X10020, Edenvale, 1610 | t: +27 (0)72 580 7318 | f: 086 518 4376 | e: fdia@fdia. co.za | www.fdia.co.za | President/chairperson: Clive Foord | Secretary: Jolene van der Westhuizen
FFETA The Fire Fighting Equipment Traders Association) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | Chairperson: Belinda van der Merwe Administration manager: Rosemary Cowan | t: +27 (0)11 455 3157 | e: rosemary@saqccfire.co.za | www.ffeta.co.za FPASA (Fire Protection Association of Southern Africa) Box 15467, Impala Park 1472 | t: +27 (0)11 397 1618 | f: +27 (0)11 397 1160 | e: library@fpasa.co.za | www.fpasa.co.za | General manager: David Poxon GFA (Gate & Fence Association) Box 1338, Johannesburg 2000 | t: +27 (0)11 298 9400 | f: +27 (0)11 838 1522 | Administrator: Theresa Botha HSA (Helderberg Security Association) Box 12857, N1 City Parow 7463 | t: +27 (0)21 511 5109 | f: +27 (0)21 511 5277 | e: info@command.co.za | www.command.co.za | Chairperson: Stephen van Diggele IFE (Institution of Fire Engineers (SA) Treasurer: Andrew Greig | President: Mike Webber | Administrator: Jennifer Maritz | PO Box 1033, Houghton 2041 | t: +27 (0)11 788 4329 | f: +27 (0)11 880 6286 | e: adminstaff@ife.org.za | www.ife.org.za ISA (Insurance Surveyors Association) Box 405, Saxonwold 2132 | Chairperson: Graham Wright | t: +27 (0)11 486 0677 | Vice chairperson: Alan Ventress | Secretary: Alex dos Santos LASA (Locksmiths Association of South Africa) Box 4007, Randburg 2125 | t: +27 (0)11 782 1404 | f: +27 (0)11 782 3699 | e: lasa@global.co.za | www.lasa.co.za | President/chairperson: Alan Jurrius | Secretary: Dora Ryan NaFETI (National Firearms Education and Training Institute) Box 181067, Dalbridge 4014 | Chairperson: MS Mitten | Vice chairperson: Ken Rightford | t: +27 (0)33 345 1669 | c: +27 (0)84 659 1142 NaFTA (National Firearms Training Association of SA) Box 8723, Edenglen 1613 | National chairperson: Peter Bagshawe | t: +27 (0)11 979 1200 | f: +27 (0)11 979 1816 | e: nafta@lantic.net POLSA (Policing Association of Southern Africa) t: +27 (0)12 429 6003 | f: +27 (0)12 429 6609 | Chairperson: Anusha Govender c: +27 (0)82 655 8759 PSSPF (Private Security Sector Provident Fund) Jackson Simon c: +27 (0)72 356 6358 | e: jackson@ psspfund.co.za | www.psspfund.co.za SAESI (Southern African Emergency Services Institute) Box 613, Krugersdorp 1740 | t: +27 (0)11 660 5672 | f: +27 (0)11 660 1887 | President: DN Naidoo | Secretary: SG Moolman | e:info@saesi.com SAIA (South African Insurance Association) Box 30619, Braamfontein 2017 | Chief executive officer: Viviene Pearson | Chairperson:
Lizé Lambrechts t: +27 (0)11 726 5381 | f: +27 (0)11 726 5351 | e: info@saia.co.za SAIDSA (South African Intruder Detection Services Association) | Association House, PO Box 17103, Benoni West 1503 | t: +27 (0)11 845 4870 f: +27 (0)11 845 4850 | e: saidsa@mweb.co.za www.saidsa.co.za | Chairperson: Johan Booysen Secretary: Cheryl Ogle SAIS (South African Institute of Security) Postnet Suite 86, Private Bag X10020, Edenvale, 1610 Chairperson: Dave Dodge | Administration manager: John Baker | t: +27 (0)63 782 7642 | e: info@instituteofsecurity.co.za | www.instituteofsecurity.co.za SAN (Security Association of Namibia) Box 1926, Windhoek, Namibia | Administrator: André van Zyl | t: +264 81 304 5623 | e: adminsan@iway.na SANSEA (South African National Security Employers’ Association) Box 62436, Marshalltown 2107 | Administrators: SIA t: +27 (0)11 498 7468 | f: 086 570 8837 | e: galen@sansea.co.za SAPFED (Southern African Polygraph Federation) President: Flip Vorster | c: +27 (0)82 455 1459 | e: info@sapfed.org | Secretary: Anrich Gouws | e: admin@sapfed.org | www.sapfed.org SAQCC FIRE (South African Qualification Certification Committee) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: +27 (0)11 455 3157 | www.saqccfire. co.za Executive Committee: Chairperson: Duncan Boyes Vice chairperson: Tom Dreyer 1475 Committee: Chairperson: Lizl Davel Vice chairperson: John Caird D&GS Committee: Chairperson: Nichola Allan; Vice chairperson: Clive Foord General Manager: Rosemary Cowan | e: rosemary@saqccfire.co.za – Address, phone and website all remain as is. SARPA (South African Revenue Protection Association) Box 868, Ferndale 2160 | t: +27 (0)11 789 1384 | f: +27 (0)11 789 1385 | President: Naas du Preez | Secretariat: Mr J. Venter, Van der Walt & Co SIA (Security Industry Alliance) Box 62436, Marshalltown 2107 | t: +27 (0)11 498 7468 | Chief executive officer: Steve Conradie | www.securityalliance.co.za SKZNSA (Southern KwaZulu-Natal Security Association) t: +27 (0)39 315 7448 | f: +27 (0)39 315 7324 | Chairperson: Anton Verster c: +27 (0)82 371 0820 VESA (The Motor Vehicle Security Association of South Africa) Box 1468, Halfway House 1685 | t: (011) 315 3588/3655 | f: +27 (0)11 315 3617 | General manager: Adri Smit VIPPASA (VIP Protection Association of SA) Box 41669, Craighall 2024 | t: +27 (0)82 749 0063 | f: 086 625 1192 | e: info@vippasa.co.za | www.vippasa.co.za | Enquiries: Chris Rootman c: +27 (0)82 749 0063 | e: vippasa@protectour.co.za
* Every attempt has been made to keep this information up to date. If you would like to amend your organisation’s details, please email jackie @contactpub.co.za 44
SECURITY FOCUS AFRICA NOVEMBER – DECEMBER 2020
securityfocusafrica.com
DRIVING COMPLIANCE in South Africa’s Private Security Industry
With a five decade legacy, SASA is the greatest advocate of industry compliance, serving as resource for its members, an educational platform for consumers of security services, and an essential link between the private security industry and government. The Security Association of South Africa (SASA) is nationally recognised by the Government, South African Police Service and all Municipalities as having members with a proven track record within the industry and a Code of Ethics by which members must abide. SASA Gold Membership promotes compliance not only to the industry role-players, but to the end-users of security services as well. Join SASA today and find out more about how we can fight the scourge of non-compliance, promoting SASA Gold Membership as an essential requirement for all security service providers, ensuring industry excellence for the private security industry.
For more information, contact the SASA Administrator on admin@sasecurity.co.za Postal Address: Suite 147, Postnet X2 Helderkruin, 1733. Tel: 0861 100 680 Fax: 086 670 9209
www.sasecurity.co.za
DIGITAL BUYERS GUIDE
to security services & products Promote your business
Attract customers
Increase your sales
Claim your listing on www.securityfocusafrica.com/buyersguide
2 for 1 offer The print listings now mirror our online directory style with basic and premium listings. In fact, upgrading a basic listing in print to premium will include an upgrade to premium on the website and vice versa. The same information online is printed in the print directory.
Security Focus Africa is known for having the most comprehensive directory of service providers in Africa. We have been a trusted source of information for more than 38 years, and now offer this valuable resource online.
The market is tough out there. What makes your business different from any other? For starters, be more accessible on the internet. Online searches are now the preferred method of finding information and contact details, so the better your online presence, the more business you will get.
BENEFITS OF LISTING YOUR BUSINESS:
• By claiming your listing, you can keep your company’s information up to date at your own convenience • Upgrade your listing online at any time to maximise your brand exposure • Improve your SEO and online presence • We provide a targeted audience for your business • See your stats – know how many people are seeing your listing • Increase traffic to your website with a link from the directory
Security
For as little as R2 400, you can get the edge over your competitors by providing indispensable information to your customers on our online directory.
Affordable advertising is just a click away.
Focus
AFRICA
BUYERS GUIDE
www.securityfocusafrica.com/buyersguide KEEPING YOU IN THE KNOW | CONNECTING PEOPLE WITH PEOPLE