Deceptive Defenses: An Automatic Failure Leading to a False Sense of Security.
Dr. Rolando Jr Cleofas
--Security or Safety Program is not an expense, but an investment that pays for itself
A few days ago, while inside my car entering a commercial establishment through the parking area, I found myself in a long queue, waiting for the security check. As I stood there, I noticed a guard making his rounds with an under-chassis mirror, supposedly inspecting each car. However, something seemed off. The guard wasn’t actually looking at the mirror.
As I cautiously approached the individual, a mix of curiosity and concern gripped me. I couldn't help but wonder about the intentions behind his unsettling quest for "bombs." His blunt admission sent a shiver down my spine, yet I felt compelled to delve deeper into the matter. With a sense of unease lingering in the air, I inquired whether he possessed the knowledge to recognize a bomb or had received any formal training in bomb detection. The revelation that he lacked any form of training in such a critical area was truly disheartening.
The encounter left me contemplating the importance of education and awareness in dealing with potentially dangerous situations. It underscored the need for proper training and vigilance in today's world, where threats can lurk in unexpected places. The brief exchange served as a stark reminder of the responsibility we all share in safeguarding ourselves and others from harm. It also highlighted the significance of being proactive in seeking knowledge and skills that could make a difference in moments of crisis.
Continuing on, I inquired about the subsequent actions in case he discovered anything suspicious. His response was concerning: "he must review the procedures as he is newly deployed."
Upon entering further, I came across an additional security checkpoint: a walk-through metal detector. The line was still long, and I watched as the security measures were carried out. Despite the metal detector making detection sounds, the guards were allowing people to proceed without conducting any further checks. It was evident that the metal detector was failing to fulfill its primary function of detecting metals.
This incident has highlighted a significant flaw in our security systems. The presence of security tools, like under-chassis mirrors and metal detectors, gives an illusion of safety. However, without proper training and protocols, these tools are just deceptive obstacles. They foster a false sense of security, leaving us vulnerable to real threats.
Proper training and equipping of security personnel are crucial for the effective handling of potential dangers. In the absence of these elements, our security systems are only cosmetic and fail to offer true protection. This situation emphasizes that real security goes beyond mere appearances; it requires expertise, preparedness, and a genuine commitment to safety.
An effective security program must be grounded in a thorough understanding of the risks it intends to control. Lacking such knowledge, the program is doomed to fail, whether it deals with physical assets like cash or securities, durable assets such as equipment, tools, and inventory, or non-physical assets like confidential information.
·??????? Accurate Threat Assessment:?Before implementing any security measures, it’s crucial to understand what specific threats the assets face. This involves a thorough risk assessment to identify potential vulnerabilities and the likelihood of different types of attacks or breaches.
·??????? Choosing Countermeasures:?Once the threats are accurately assessed, appropriate countermeasures can be chosen. Without this assessment, selecting security measures would be based on guesswork, which might lead to ineffective or unnecessary precautions.
Example:
·??????? Scenario:?A financial institution is concerned about the security of its customer data.
·??????? Accurate Threat Assessment:?They conduct a risk assessment and find that the primary threats are cyber-attacks aimed at stealing sensitive information.
·??????? Choosing Countermeasures:?Based on this assessment, they implement advanced encryption for data storage, multi-factor authentication for system access, and regular security audits. Without this assessment, they might have invested in physical security measures like additional guards or surveillance cameras, which wouldn’t address the actual cyber threats.
Emphasizing the importance of accurately assessing the real threats to assets before taking any protective actions or countermeasures is crucial. Without a detailed evaluation, even the most trusted and esteemed security measures might be inadequate. Decisions made on speculation can reveal vulnerabilities and heighten the likelihood of security breaches. Thus, performing an exhaustive risk assessment to pinpoint potential threats and weaknesses is vital. Such an assessment will assist organizations in choosing the most suitable and effective security measures, designed to mitigate specific risks and safeguard assets efficiently.
Accurate Threat Assessment:?Before implementing any security measures, it’s crucial to understand what specific threats the assets face. This involves a thorough risk assessment to identify potential vulnerabilities and the likelihood of different types of attacks or breaches.
·Choosing Countermeasures:?Once the threats are accurately assessed, appropriate countermeasures can be chosen. Without this assessment, selecting security measures would be based on guesswork, which might lead to ineffective or unnecessary precautions.
·The worth of a security program is determined by the suitability and relevance of the resources in addition to their quality. The formulation of countermeasures occurs after the problem has been defined. Reversing this decision might result in a security program that is largely non-responsive and unnecessary expenditure.
The efficacy of a security program hinges not only on the quality of resources, such as advanced technology and skilled staff, but also on how well these resources meet the organization's specific security requirements. For instance, top-notch surveillance cameras are of no use if they are not strategically placed or if they fail to mitigate the actual security risks the organization faces.
Prior to implementing security measures, it is vital to identify and understand the security challenges or threats clearly. This process includes determining what requires protection, identifying potential threats, and recognizing vulnerabilities. With a clear definition of these issues, one can then devise suitable countermeasures, including security protocols, technologies, and practices, to tackle them effectively.
Example: Imagine a company invests in state-of-the-art biometric scanners for building access. While these scanners are excellent resources, they might not be appropriate if the main security threat is cyber-attacks rather than unauthorized physical access. In this case, investing in advanced firewalls and cybersecurity training would be more relevant and appropriate.
In summary, the key takeaway is that a successful security program starts with a clear understanding of the specific security problems, followed by the design of relevant and appropriate countermeasures. This approach ensures that resources are used effectively, and the security program is responsive to actual threats. These examples highlight the importance of understanding the specific security needs and threats before investing in and designing security measures.
Remembering the aftermath of the 2017 Resort World Manila Attack
Dr. Jose Rizal, our national hero, once remarked, "In order to foretell the destiny of a nation, it is necessary to open the book that tells of its past," emphasizing the importance of learning from our past mistakes to avoid repeating them in the future.
The Resorts World Manila attack is a somber memory for every Filipino. It occurred at the Resorts World Manila (now Newport World Resorts) complex in Newport City, Pasay, Philippines. On June 2, 2017, around midnight, when a lone gunman set fire to casino tables and slot machine chairs, causing a stampede that resulted in 38 deaths and 70 injuries. The assailant then moved to a storage area to steal casino chips but ultimately took his own life after an encounter with police. The majority of the casualties were due to the stampede and smoke inhalation from the fires.
Moreover, the credentials and educational background of Armeen Gomez, the security chief of Resorts World Manila, were examined by House Majority Leader Rodolfo Fari?as of Ilocos Norte–1st and Representative Romeo Acop of Antipolo–2nd. Gomez professed to have a decade of experience in security. When inquired about his police or military history, he mentioned only having brief training early in his career. He asserted that he was once enrolled in the Philippine Military Academy (PMA) but was discharged for "personal reasons." Acop challenged Gomez's inconsistent accounts of his PMA tenure, revealing that Gomez had not completed his college education. Fari?as questioned Gomez's qualifications, emphasizing the need for well-trained casino personnel. Although Gomez was en route home, he returned to the casino upon learning of the attack. Resorts World Manila attack - Wikipedia
领英推荐
Security has become a major concern, failing to address the very issues it should be safeguarding in commercial establishments. A false sense of security can expose one to numerous significant risks:
1. Increased Vulnerability
When people believe they are safer than they actually are, they may neglect necessary precautions. For example, thinking antivirus software makes a computer invulnerable can lead to risky online behavior, increasing the chance of malware infections.
2. Complacency
A false sense of security can result in complacency, where individuals or organizations fail to maintain or update safety measures. For instance, assuming fire alarms are sufficient without regular maintenance can lead to malfunctioning alarms during an actual fire.
3. Riskier Behavior
Believing in an exaggerated level of safety can encourage riskier behavior. Cyclists wearing helmets might ride more aggressively, assuming they are fully protected, which can lead to more accidents.
4. Financial Losses
In the financial sector, investors might overlook the risks associated with “safe” investments, leading to potential financial losses during market downturns or economic crises.
5. False Confidence
Overconfidence in security measures can lead to a lack of preparedness for emergencies. For example, homeowners relying solely on security cameras might neglect other important security practices, making them more susceptible to burglaries.
6. Neglect of Other Safety Measures
Relying too heavily on one form of security can cause people to ignore other important safety measures. For instance, using childproof caps on medicine bottles might lead parents to be less vigilant about keeping medicines out of children’s reach.
7. Delayed Response to Threats A false sense of security can delay the response to actual threats. If people believe they are fully protected, they might not recognize or react promptly to emerging dangers, exacerbating the impact of those threats.
Just my two cents worth
On the other hand, our Latest Book for Launching soon!
The book "Security Essentials: Your Point of Difference," co-authored with my classmate from the PhD program, CDR Ariel D. Constantino, PN, PhD, is nearing the final stages of review. In a time where security threats are constantly evolving and becoming more complex, the importance of thorough and efficient security practices is paramount. This book aims to serve as an essential resource for professionals conducting security surveys and inspections, security audits, threat and vulnerability assessments, and security risk assessments, especially in adverse conditions.
This book stands out by offering high-value documents that align with corporate security standards. Our goal is to provide you with the tools and knowledge necessary to protect your organization against potential threats. We have meticulously crafted templates and examples that are not only practical but also utilized in the international arena, ensuring that they are easy to comprehend and implement.
Throughout this guide, you will find detailed methodologies and best practices that have been tested and proven effective in real-world scenarios. Whether you are a seasoned security professional or new to the field, this book will equip you with the essential skills and insights needed to conduct thorough security assessments and implement robust security measures.
We delve into the intricacies of security surveys and inspections, providing step-by-step instructions on how to identify and mitigate potential vulnerabilities. Our comprehensive security audit section offers a deep dive into evaluating your current security measures, highlighting areas for improvement and ensuring compliance with industry standards.
The threat and vulnerability assessment chapters are designed to help you understand and prioritize potential risks, enabling you to develop targeted strategies to address them. We also cover security risk assessment in hostile environments, offering practical advice on how to operate safely and effectively in high-risk areas.
To enhance your learning experience, we have included a variety of templates and examples that reflect best practices from around the globe. These resources are designed to be easily adaptable to your specific needs, providing a solid foundation for your security initiatives.
We hope that “Security Essentials: Your Point of Difference” will become an indispensable resource in your professional library, helping you to safeguard your organization and stay ahead of emerging threats. Thank you for the usual support and we are looking forward for you to choosing this guidebook as your trusted companion in the ever-important field of security.
?
Security Manager/Head
6 个月Hi Sir, I'm interested in this book.