Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Thursday, March 30, 2017

Security Verification



The young Assistant Manager was eager to acquire the knowledge and skills required to make him an efficient bank manager and leader. His first posting as an officer was in a big metropolitan branch. He was one among the nearly hundred staff members in the branch as computerization was not heard in those days. He did not have any opportunity to work in loans department. His promotion as assistant manager and posting to a medium sized rural branch was personally inconvenient to him. But he was encouraged by the chances coming his way to learn many new things. He proceeded to the new place of posting with lot of hope and expectations.

The young man was welcome by his branch manager and given charge of the loans department. The well experienced branch manager started grooming the assistant in right earnest, to shoulder his responsibilities. He was first initiated into processing of loan applications, scrutinize information provided by the applicants, assess loan eligibility and sanction process. Analyzing and accepting securities offered by the prospective borrowers followed soon. Obtaining documents for sanctioned loans and method of disbursing the loan amounts was the next step. The young assistant manager was now confident of handling small and medium sized loan requests on his own and place the cases before branch manager with his recommendations.

The branch's annual inspection was due any day now and the branch manager was preparing the young assistant to face his first inspection confidently. All aspects of a branch's working were checked and verified by these inspectors and the process went on for two to three weeks. Inspection days were difficult for branch functionaries as they had to manage attending to inspectors in addition to the regular bank work. Attitude and working methods of the inspectors was also a cause of concern for branch managers. Some inspectors were indeed difficult to work with, while some others were more understanding and co-operative. 

Inspectors were deputed by the bank's Inspection Division at Head Office to various branches for annual inspections. Their programing was a secret affair and known only to Inspection Division and the concerned inspectors. This was required to keep the surprise element intact during audit and inspections. Inspectors usually arrived at the branch on a day of their choosing, an hour before opening of the branches in the morning. The branch would be opened under their supervision and all physical securities starting from cash would be checked first to prevent any manipulations. The inspectors would then proceed to verify the other areas of branch functioning. One of the important components of such inspection was visiting the borrower's place for physical verification as well as checking the records of the party. The places comprised shop, factory, godown, house or any such business place or location where securities charged to the bank were kept. Branch Manager or a representative of the branch would usually accompany the inspector on such visits. Inspection was a time bound activity and was expected to be completed in a specified number of days linked to the size and business level of the branches.

An inspector arrived at this branch one morning and started his work. After introducing the assistant manager to the inspector and exchange of pleasantries, branch manager called the assistant manager aside and advised him to assist the inspector during the inspection period. "This inspector and I are from the same batch and we have worked together earlier. It is no secret that we do not like each other. But he is a professional and does not mix personal things with official work. Same is the case with me. I will have limited interaction with him. You will be my representative during inspection. Remember that he is an expert inspector and highly respected for his skills. You can learn a lot from him in the next two three weeks", said the branch manager. The assistant manager did not understand this background initially, but slowly learnt the truth in those words with each passing day of inspection work.

Field visits and verification of securities started in the third week. As the branch had many villages surrounding its location, many agriculture and allied advances were to be inspected. The inspector and the assistant manager proceeded to one of the villages one morning. They went to a borrower's place (Borrower A) a little before noon for checking sheep and goats given as security for bank loan. There were no sheep or goat in the yard. Inspector noted his observation on his rough sheets. After checking some pump set and tractor loan accounts, they went to another borrower's place (Borrower B) around 3 PM for checking sheep and goats. The number of sheep and goats available in the yard were matching the number given in the records. Inspector made some noting again in his note sheets.

An inspector was required to give his observations to the branch manager for rectification of deficiencies or give his comments each day, before incorporating them in his final report. On the next day of the visit to above villages, inspector gave the list of observations on the findings of the previous day's visits. When the assistant manager saw the report he was surprised to find that inspector had erred in his noting. He had recorded that security was intact in Borrower A's place whereas it was noted as missing in Borrower B's place!  He immediately ran to the inspector and pointed out the discrepancy. 

The inspector smiled at the young assistant manager. "We went to the two borrowers on either side of noon. Where do you expect the sheep and goats to be at that time?" The assistant manager could not give a definite answer. The inspector explained further. "At the time of day when we visited the two places, sheep and goat are not expected to be at home. They have to be out on the hill side grazing and return only by sunset time.  In borrower A's place there were no sheep or goat, but there was enough evidence to show that the animals were kept there overnight. The wetness of the yard where the animals were kept and the pungent smell of sheep and goat in the yard clearly showed that he has the animals with him. In borrower B's place there was no such evidence. The land was dry and the air was fresh. Having realized that inspectors have come to the village, he managed to bring the animals from some other farmer's place and show it to us. I have also made enquiries locally from other farmers during the visit, when you were away checking directions to the next village. My observation as recorded in the sheets is correct", he said.
*****

When the assistant manager shared this with the branch manager, he got further insight into various aspects of security verification. "You have to be watchful during field visits. One should not be carried away by what he sees during the visit. What is seen is to be linked to the type of business, local practices, details in the records and above all commonsense. Conclusions drawn based merely on what is visible at the time of the visit may often be erroneous. But that does not mean that you have to ignore what you see physically. Each of these should get due consideration and one should come to a proper judgement after careful analysis of the circumstances obtaining at the time of the visit", concluded the branch manager.

The young man had never thought of all these things. There is a lot more in security verification than a mere visit to a place, he learnt that day.

Sunday, June 19, 2016

4D - Security concept

Security has become a major concern for every organisation nowadays. Ensuring safety of the various assets and resources, preventing unauthorised usage or pilferage has been engaging continuous attention by top managements. Safety and security of people working in the organisation, physical assets, technology platforms and enormous data at their centres have been becoming more and more challenging each day. Leakage of sensitive data, entry of unauthorised persons into place of work and pilferage of valuable items and tools causes many operational risk issues as well as threat to life and liberty of people working for organisations. Lot of money is being spent by entities to tighten security measures, both physical security as well as technology based security tools. These concerns are equally applicable to households and small establishments.

During a visit to a pre-school day care centre where toddlers and small children are taken care of when mothers are at work, I was impressed with the security systems employed by them. The entry and exit were restricted and could be made only when smart cards issued by the centre were used at the door. In case the visitor did not have the card, identification was made by speaking through a speaking tube even while the person inside is able to view the visitor through the glass door. Strangers and first time visitors are subject to additional verification to make certain that the visitor is indeed bonafide and genuine. As a further security measure, parents are contacted over phone before the child is handed over to the visitor. It is indeed a big responsibility to run such centres.

A house magazine of an organisation carried an article about the 4-D concept of security in organisations. These concepts can equally be applied in houses and small establishments. What is this 4-D concept? It simply involves four levels of combinations of various steps that can take care of security concerns. Strict observance of these measures ensures a high level of security atmosphere and a intruder would find it difficult to attempt his adventures in these establishments. The 4-D concept deals with the four levels of security measures; Deter, Deny, Delay and Detect.

The first step of "Deter" puts in place systems that ensure intruders are made to desist even from attempting an entry. The measures may include barbed wires on the perimeter walls, CCTV surveillance, posting of watchmen and adequate lighting around the establishment. Even display of boards that claim "This place is under CCTV surveillance" are capable of ensuring that a casual intruder does not proceed on misadventure. Any effort to gain entrance in such places requires serious preparation on the part of the intending intruders. This filters and narrows down the likely attempts at gaining unauthorised entry.

The second step of "Deny" involves keeping the unauthorised persons out by another series of measures. The measures include use of access control through biometric cards, manned entry verification through security guards at entry points, segregation of areas to restrict entry only to a specified area in the establishment, keeping the doors locked, use of X-ray machines to scan bags and packets etc. By use of such measures, gaining entry is made difficult at the first stage. Even after gaining entry, access is restricted to designated area thus ensuring protection of other segregated areas.

The third step of "Delay" ensures slowing down the progress of an intruder even after gaining entry bypassing the first two levels. The measures comprise stop doors, window grills, strong rooms with vault doors for housing servers and areas of sensitive work stations, time locks and embedded cash safes. Some organisations have entire floors of buildings as out of bounds for even their own employees. Additional security features control entry into such highly restricted areas. It is no surprise that many employees do not even know the nature of work or research going on such restricted parts of their own buildings.

It may not always be possible to prevent planned and organized gangs from gaining entry despite the above three levels of measures. The 4th D concept of "Detect" comes into play now. Detect involves monitoring and actively detecting unauthorised entrants by watching CCTV monitor screens, placing anti-burglar alarms, installation of CCTV with night vision facility, auto-dialers with security alarm systems etc. This helps in preventing unauthorised activity even after an intruder gains entry by bypassing the first three levels of security.

The concept of 4-D security can be applied to our households as well. Keeping the doors locked, storing valuables in locked cabinets, proper care of valuables and avoiding easy access to valuables at homes can be effective security measures.  

Employing the 4-D concept keeps entities in readiness to face security threats from outsiders. However, it is important to remember that all these measures are only effective when the people manning these systems and tools are vigilant and careful at all times. A small slip or laxity in following the prescribed procedures even for a small span of time can fail the entire system. "Eternal vigilance is the price of Liberty" is a saying attributed to Thomas Jefferson. It is said that it was used by others earlier to him as well. Eternal vigilance is indeed the 5th, or even the first concept of security!