Incident Review
The incident occurred at my workplace on a Monday morning with all staff members at their workplace station. I used to work in a state ministry handling tourism and wildlife-related issues. My employees had designated my workstation on the 15th floor, which housed the finance, accounts, human resource, and information technology departments. On this day, five men came from the staircase walk, all groomed in black leather jackets and caps that covered their faces, and one would not recognize their identity. They walked in my direction, ordered me to remain put and silent. The thieves left one gentleman in my cubicle, which was just adjacent to the door leading to the offices. The other three went inside, and I could hear them ordering individuals to sit on the floor and remain silent. Every person on the floor was ordered to submit their phone, and no movement was allowed. They demanded money and would grab any asset that seemed valuable. Laptops, office telephones, kitchenware, and photocopiers were among the items stolen on that day. Everyone was scared; no one made any alarm as this seemed a well-orchestrated robbery as the men knew all the directions and departments on the floor. They tied everyone with dark tapes on the eyes and hands. They left through the lifts and were long gone within minutes. We were rescued by an intern who had come to print and make copies at the human resource department, who called upon staff members from the 16th floor.
Role of Private Security in Relation to Public Security
Being the security manager of the floor, the application of a private security system would have prevented such an incident. According to Lazarus (2020), the growth of insecurity has led to more individuals turning to the private security system to guarantee their safety, including that of their relatives and personal possessions. In this incident, they would have detected the five gentlemen from their entry point since it was later discovered that they had used a car parked in the basement. Private security firms are usually engaged in providing patrol and guard services using security, parking, dogs, and human guards who have undergone special training for advanced security tactics (Moricova, 2017). With the presence of a private security firm guarding the building, events of the unforgettable Monday morning would have been averted.
Delegate your assignment to our experts and they will do the rest.
Additionally, private security agencies would have access and control of the entire building using surveillance cameras. They would have spotted the thieves right before the theft o ccurred. The use of roving patrol techniques, bodyguards, and the dog service unit would help identify the assets carried by the thieves. This is contrary to public security that was in charge of security during that fateful day. The public security system is not always alert due to its application of traditional methods in security measures. The policemen at the gate failed to ask for any identity cards from the gentlemen, nor did they bother to question where the men were going. On exiting the building, the gate police did not also check the thieves' vehicle that they used to get away, an action that would have led to their arrest. Public security mostly ensures citizens' protection against extremists or terror acts, leaving out bare criminal acts such as theft, burglary, and pickpocketing (Choudhury, 2017). Public security remains exposed due to lack of funds to run their security, lack of motivation, and bribery from citizens who end up running away from justice.
Telltale Signs and how to Avoid Theft in the Workplace
During the past few weeks before the workplace incident, I was working on a project that led me to question myself about the authentic nature of the security around our organization. I realized that it was quite hard to notice intruders from the staircase walk. Most guards were designated on the lift's entourages and the gentlemen coming through the staircase walk, which was rarely used to indicate that they knew the organization setting. When I was on my leave days, a colleague had called me and informed me that some individuals had walked on the 15th floor and did not communicate with anyone. The colleague mentioned three suspicious people entered the floor looking lost but walked around as if looking for a certain office. They barely talked to my colleague at the security cubicle, and since they were all in ironed suits, they were allowed to enter. After the thieves had left, I was left wondering if the three suited men were among the five thieves.
A security manager can anticipate security mishaps by carefully evaluating and monitoring suspected individuals' movements on a particular floor or department in an organization. By carefully recording each person's attendance with their personal information on an attendance register would help in averting such incidents. Any person visiting an organization should provide information about who they are, where they are going, and the reason for the visit. Recording personal mobile numbers and identity card numbers would also help track down any person who had access to the building on any day. Organizations that observe such guidelines are likely to avoid cases of theft and burglary.
Measures in Handling Theft in Organizations
They are various measures that can be used to enhance security by use of a private security approach. The use of information technology tactics to augment security in firms is one of the most resourceful methods in tackling crime incidents. Information technology in security helps implement procedures to safeguard corporate information and unauthorized access, disclosure, or modification, whether intentional or accidental (Reuter, 2019). It does not only safeguard documents but also individuals from exploitation by crime offenders. The breach of security in many organizations has caused formidable losses that lead to the decline or collapse of an entire organization. The use of CCTV cameras, passwords on computers, and staff-only access restrictions are some of the information technology tactics that will revolutionize the security industry.
Subsequently, an organization can engage in security consulting, benchmarking, or outsourcing relevant personnel to handle security matters of the firm. Security consultants operate in diverse fields comprising crisis and security management, engineering, and information systems management. Consultancy in security management is essential as it assists in designing security systems, offering specifications for physical and technological security measures, and conducting training to security personnel in the organization. Additionally, the consultants can advise firms on handling polygraphs, psychological stress assessments, and provision of expertise on avoidance of loss and risk control. With the relevant skills and knowledge of effective security management, firms can safeguard their interests and the interest of the employees, stakeholders, and the general public.
Factors to Consider in Security management
Various aspects ought to be considered to achieve effective and efficient security management. The first aspect to consider is the purpose of the security approach. The company's reason to protect itself against any threat and the techniques used are vital in ganging the number of resources required. Prevention of undesirable security incidents is critical in safeguarding individuals and assets found within the organizational setting. Developing a policy that serves as a purpose to the security issues will help create an overall strategy to maintain sufficient security. The policy's purpose is to help set up the rules and regulations that will guide individuals on how to go about their personal and organizational security (Howard, 2019). Creating an efficient security plan and adhering to the set rules helps to offer compliance and mitigating security breaches. Firms should effectively strengthen their security policies through conducting routine updates in response to any changes occurring in the organization, conclusions from previous breaches, new threats, and any other change in the security posture scope.
Organizations should set targets, goals, and objectives of the security measures that should be put in place for the security agents' awareness. For instance, the security system should be confidential in that only the people with authorization should have access to an organization's mainframe. Employees should be the only ones able to have access to alarms and security details. The organization should only permit the employees to know where the surveillance is located to prevent other intruders' access. Staying confidential with the security approach will help in keeping the firm safe from crime offenders. Organizations that expose their security details are at risk of security attacks as all the details can be breached.
Administrative Challenges to a Security Manager
Organizations should always value the security management function in an organization, one tasked with protecting lives and assets from unforeseen theft or damage. However, a security manager suffers from an administrative challenge such as poor communication from the organization's management. Security managers are mistakenly taken to be semi-skilled employees lacking relevant knowledge or expertise. They are mostly ignored in the process of decision-making. The human resource managers are likely to disapprove of any suggestion from the security manager. Making informed decisions on security matters without the security manager's consent culminates in security ineffectiveness and inefficiency. An organization's management should always put the views of the security manager and the staff members. Communication is an essential tool in an organization that determines its success or failure.
Security managers also suffer from inadequate working facilities. The administration does not usually facilitate these managers in many ways. For instance, my working cubicle was too small that only two people would fit. Lack of enough working space makes the security manager lower their self-esteem and lack work morale. Some security managers in various firms are not provided with facilitation that assists them in carrying out various tasks. Lack of security tools such as search and frisk gadgets and computers to keep their records lead to security breaches. The security managers should be considered part of the organization and should not be left to improvise independently. During my working days in the state department of tourism and wildlife, the management did not give us any protective work. We demanded gloves and aprons for dirt protection, but the organization ended up giving nothing. The lack of adequate space and proper gadgets for security maintenance is a significant blow to security managers.
References
Choudhury, T. (2017). The radicalization of citizenship deprivation. Critical Social Policy , 37 (2), 225-244. https://doi.org/10.1177/0261018316684507
Howard, P. D. (2019). The security policy life cycle: Functions and responsibilities. Information Security Management , 297-312. https://doi.org/10.1201/9781351073547-22
Lazarus, L. (2020). Insecurity and human rights. Human Rights and 21st Century Challenges , 129-152. https://doi.org/10.1093/oso/9780198824770.003.0007
Moricova, V. (2017). Optimization of competencies of personnel positions in private security services. 4th International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2017, MODERN SCIENCE . https://doi.org/10.5593/sgemsocial2017/15/s05.090
Reuter, C. (2019). Information technology for peace and security – Introduction and overview. Information Technology for Peace and Security , 3-9. https://doi.org/10.1007/978-3-658-25652-4_1