Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/35/d580498962/htdocs/clickandbuilds/WordPress/mcdon/wp-content/plugins/essential-grid/includes/item-skin.class.php on line 1306

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/35/d580498962/htdocs/clickandbuilds/WordPress/mcdon/wp-content/plugins/siteorigin-panels/inc/styles-admin.php on line 392

Warning: Use of undefined constant REQUEST_URI - assumed 'REQUEST_URI' (this will throw an Error in a future version of PHP) in /homepages/35/d580498962/htdocs/clickandbuilds/WordPress/mcdon/wp-content/themes/the-landscaper/functions.php on line 73
NIGERIA Archives – McDon Security Limited
Nigerian's Best Security Company.
No. 18 Bola Street, Anthony Village.
Mon-Sat: 8:00am - 5:00pm
23 Jul 2015

Security Guiding Principles

Operational Areas and Guiding Principle to Consider:

Protection Design
Protective measures must be designed to reveal breach of security as quickly as possible – attempt/intrusion/theft are quickly discovered.


First breach of security occurs when it becomes known that a target of value exists.  The presence of security staff, fence, gates, locks, access procedure, CCTV, indicates that VALUABLE ASSETS exists in the facility being protected.


Security Responsibility
Security like Safety is the personal RESPONSIBILITY of everyone. Department Managers are responsible for security in their various departments – tool of work, personnel, etc.


Cost of protection
Security efficiency & economy requires that protective measures must be commensurate with threat and value of assets to be protected.


Risk Concentration
Vulnerable targets should be concentrated in a small area to ensure easy protection – access control, technology, guards, etc.


The potential for SABOTAGE should never be discounted.
Saboteurs seek to cause maximum damaged with little effort/risk to him/herself


Access Criterion
• Access to vital information on Critical Assets to be ‘‘On Need To Know’’.
• Access to Critical Assets to be on ‘‘Need To Go’’
• Note: The likelihood of security breach is in direct proportion to the number of people who have access to critical assets.


Security Image
• Security must not be perceived as ‘Spy’ body or an instrument of witch-hunt
• All Security PPP (policy/procedure/practice) must be ‘sold’ to employees for their ‘buy-in’
o Factors that may shape Security Image –
o Standard of dress/ Comportment
o Attitude to customers
o Efficiency of operating procedures
o Overall effectiveness of Security department.
Understanding between those in charge of Security & other departments’ HOD.


Protection for Security
All that protects must be protected – People, Procedure, Technology & Physical barriers.


System Approach
One of the Security Mix (People, Procedures, Tech., Barriers) cannot guarantee security but all in varying degrees will.


Maximum Complicity
• Insider, needs 3rd party or many employees to be able to breach security
• Outsider, needs many employees in same location to be able to breach security
• Security systems should have an element of surprise. Frequent but irregular changes of routines are recommended.
• Security is a ‘LIVE’ activity. Flexibility & Proactive approach is essential
Earliest Warning
The most effective security system is one, which gives earliest warning to enable effective response. LAYERS of defence recommended.


Guilt must be Pined
Security losses must be narrowed to a close area/people. High probability of being apprehended will deter most thieves.


Return On Investment
Remember that Security should strive to facilitate the COMMERCIAL INTEREST of the company

We do Security Training and Security Awareness for families, NGOs and Companies. Call us today for a discussion


Head Office: 18 Bola Street, Anthony Village, Lagos.
Tel: 01-2916310, 01–2916311, 01-2952488, 0818 411 1123.
Email: info@mcdonsecurity.com
Twitter: @McDonSecure

22 Jun 2015


Security is the creation of a secure environment in which organizations will ensure so far as practicable, that its employees are safe, its assets and operations are protected from theft, fraud, misappropriation, targeted espionage, willful damage and disruption.

Olisa Don Ogwuadi, CPP, Chapter Chair, ASIS International, Chapter 206 Nigeria while speaking on the topic, Security as a Competitive Edge for Multinational Corporations in Nigeria at the July Breakfast forum sponsored by Protection Plus Services Ltd.

He said that in the past, security was only about barriers, keeping things safe, avoiding unwanted attacks & intrusion but in today’s insecure world, only organizations that see security as a key driver of added value will win the fierce competitive economic battle.

He further added that security can and should be business driven and not compliance driven therefore security is not an option but a right to protect your business against uncertainties.

He disclosed that security covers a wide spectrum like environmental security, scanning, security awareness, personnel security such as certificate verification, physical security of all facilities, security investigations and due diligence.

Competitive Intelligence according to Ogwuadi is segmented into three categories people, process and technology. In the area of people, it has to do with researchers, collectors, and analysts gathering from both internal and external sources.

Process in the parlance of security is based on techniques, tools, methods to guide collection, analysis, use of intelligence and the interaction between competitive intelligence staff and users.

As regards technology, software and hardware is used to support competitive intelligence processes and focuses mainly on storage, retrieval and management of information.

Decision can be made based on intelligence from early signs e.g. News report, targeted intelligence, classified sources are used to know the security situations of several areas in Nigeria.

Certainty increases as more intelligence is learnt. Competitive intelligence is as important as the money held by Chief Financial Officer of organisations.

Opportunity for effective response and quality of response to competitive forces is key to success in business engagements.

He further added that security intelligence teaches employees what they can and they should not talk about, as vital information can get leak into the hands of competitors and it will affect negatively the organization involved.

Therefore he said that staff of various organizations should make sure their organization’s competitive intelligence is protected.

Effects of poor security according to Don are direct losses to organisation. Examples of these are supply chain interruptions, break in business continuity, wilful damage, theft, staff cost and litigations. Indirect losses are brand value erosion, reputation damage, loss of market share, loss of key staff and increased insurance premium, will also occur.

According to him, security guarantees the prevention of leakage of intellectual property between brands and a brand has no value if it cannot be trusted.

The security expert said that supply chain protection is necessary, because companies will fail if key supply chain is disrupted and security helps to enforce corporate governance culture.

On a final note, he gave the following security advice; it investigate local knowledge, know the city, know the culture, people, adopting a low personal profile, good communication to all staff, have a planned response to emergencies and observe good house-keeping.

Foluso Phillips, Chairman of the Nigerian-South African Chamber of Commerce commended Olisa Don Ogwuadi for his resourceful and detailed presentation.