{"id":16278,"date":"2026-01-23T09:47:48","date_gmt":"2026-01-23T02:47:48","guid":{"rendered":"https:\/\/nawakara.com\/id\/?p=16278"},"modified":"2026-01-30T18:44:51","modified_gmt":"2026-01-30T11:44:51","slug":"security-awareness-untuk-karyawan-menjelang-ramadan-hr-dan-procurement-wajib-tahu","status":"publish","type":"post","link":"https:\/\/nawakara.com\/en\/security-awareness-untuk-karyawan-menjelang-ramadan-hr-dan-procurement-wajib-tahu\/","title":{"rendered":"Security Awareness for Employees Ahead of Ramadan: What HR and Procurement Must Know"},"content":{"rendered":"<p data-start=\"90\" data-end=\"135\"><strong>An Essential Guide for HR and Procurement<\/strong><\/p>\n<p data-start=\"137\" data-end=\"444\">Ahead of Ramadan, work rhythms in many companies change. Operating hours are adjusted, procurement activities increase, and the movement of vendors and couriers becomes more intense. Under these conditions, security risks often arise not from major attacks, but from small lapses that are considered normal.<\/p>\n<p data-start=\"446\" data-end=\"679\">The increased volume of activity opens more entry points for risk, while employees\u2019 focus is often divided. This is why security awareness becomes critical\u2014so companies can prevent incidents rather than merely react after they occur.<\/p>\n<p data-start=\"681\" data-end=\"756\"><strong>What Is Security Awareness and Why Do HR &#038; Procurement Play a Key Role?<\/strong><\/p>\n<p data-start=\"758\" data-end=\"933\">Security awareness refers to employees\u2019 understanding and behavior in recognizing risks and carrying out daily security prevention measures, both physically and operationally.<\/p>\n<p data-start=\"935\" data-end=\"991\">HR plays a vital role because it is directly related to:<\/p>\n<ul data-start=\"993\" data-end=\"1170\">\n<li data-start=\"993\" data-end=\"1041\">\n<p data-start=\"995\" data-end=\"1041\">Internal communication and employee training<\/p>\n<\/li>\n<li data-start=\"1042\" data-end=\"1089\">\n<p data-start=\"1044\" data-end=\"1089\">Compliance with SOPs and workplace policies<\/p>\n<\/li>\n<li data-start=\"1090\" data-end=\"1170\">\n<p data-start=\"1092\" data-end=\"1170\">Access arrangements due to changes in working hours, shifts, or WFH policies<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1172\" data-end=\"1255\">Meanwhile, Procurement serves as the gateway for interaction with external parties:<\/p>\n<ul data-start=\"1257\" data-end=\"1434\">\n<li data-start=\"1257\" data-end=\"1304\">\n<p data-start=\"1259\" data-end=\"1304\">Vendors, contractors, and delivery couriers<\/p>\n<\/li>\n<li data-start=\"1305\" data-end=\"1363\">\n<p data-start=\"1307\" data-end=\"1363\">Management of POs, invoices, and transaction documents<\/p>\n<\/li>\n<li data-start=\"1364\" data-end=\"1434\">\n<p data-start=\"1366\" data-end=\"1434\">Last-minute requests ahead of Ramadan that are vulnerable to fraud<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1436\" data-end=\"1637\">Security ahead of Ramadan is not solely the responsibility of security officers or CCTV systems. Without internal awareness, technology and physical guarding can be undermined by procedural negligence.<\/p>\n<p data-start=\"1639\" data-end=\"1681\"><strong>Common Security Risks Ahead of Ramadan<\/strong><\/p>\n<p data-start=\"1683\" data-end=\"1770\">The following risks often appear \u201cnormal\u201d but can have serious consequences if ignored:<\/p>\n<ul data-start=\"1772\" data-end=\"2609\">\n<li data-start=\"1772\" data-end=\"1938\">\n<p data-start=\"1774\" data-end=\"1938\"><strong data-start=\"1774\" data-end=\"1797\">Social Engineering:<\/strong> Perpetrators exploit politeness and busy situations by posing as vendors or internal staff, requesting access without proper verification.<\/p>\n<\/li>\n<li data-start=\"1939\" data-end=\"2091\">\n<p data-start=\"1941\" data-end=\"2091\"><strong data-start=\"1941\" data-end=\"1973\">Tailgating and Piggybacking:<\/strong> Unauthorized individuals follow others into restricted areas, especially in lobbies, warehouses, and office spaces.<\/p>\n<\/li>\n<li data-start=\"2092\" data-end=\"2215\">\n<p data-start=\"2094\" data-end=\"2215\"><strong data-start=\"2094\" data-end=\"2128\">Surge in Vendors and Couriers:<\/strong> Deliveries of food, hampers, and event needs can loosen visitor management controls.<\/p>\n<\/li>\n<li data-start=\"2216\" data-end=\"2346\">\n<p data-start=\"2218\" data-end=\"2346\"><strong data-start=\"2218\" data-end=\"2240\">Procurement Fraud:<\/strong> Common schemes include fake invoices, changes to payment account details, and urgent approval requests.<\/p>\n<\/li>\n<li data-start=\"2347\" data-end=\"2472\">\n<p data-start=\"2349\" data-end=\"2472\"><strong data-start=\"2349\" data-end=\"2366\">Data Leakage:<\/strong> Procurement documents and employee data are shared through fast channels without proper access control.<\/p>\n<\/li>\n<li data-start=\"2473\" data-end=\"2609\">\n<p data-start=\"2475\" data-end=\"2609\"><strong data-start=\"2475\" data-end=\"2525\">Unoccupied Areas Due to Changed Working Hours:<\/strong> Less-monitored areas become opportunities for asset theft or unauthorized access.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2611\" data-end=\"2660\"><strong>Security Awareness Checklist Ahead of Ramadan<\/strong><\/p>\n<p data-start=\"2662\" data-end=\"2745\">To make it easy to implement, here is a practical checklist for HR and Procurement.<\/p>\n<p data-start=\"2747\" data-end=\"2763\"><strong data-start=\"2747\" data-end=\"2763\">HR Checklist<\/strong><\/p>\n<ul data-start=\"2764\" data-end=\"2997\">\n<li data-start=\"2764\" data-end=\"2826\">\n<p data-start=\"2766\" data-end=\"2826\">Send security awareness reminders 7\u201314 days before Ramadan<\/p>\n<\/li>\n<li data-start=\"2827\" data-end=\"2880\">\n<p data-start=\"2829\" data-end=\"2880\">Update guest, vendor, and courier access policies<\/p>\n<\/li>\n<li data-start=\"2881\" data-end=\"2950\">\n<p data-start=\"2883\" data-end=\"2950\">Conduct short briefings on anti-tailgating and social engineering<\/p>\n<\/li>\n<li data-start=\"2951\" data-end=\"2997\">\n<p data-start=\"2953\" data-end=\"2997\">Assign a PIC per area for quick escalation<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2999\" data-end=\"3024\"><strong data-start=\"2999\" data-end=\"3024\">Procurement Checklist<\/strong><\/p>\n<ul data-start=\"3025\" data-end=\"3268\">\n<li data-start=\"3025\" data-end=\"3079\">\n<p data-start=\"3027\" data-end=\"3079\">Ensure vendors are verified and have official PICs<\/p>\n<\/li>\n<li data-start=\"3080\" data-end=\"3140\">\n<p data-start=\"3082\" data-end=\"3140\">Implement two-step verification for bank account changes<\/p>\n<\/li>\n<li data-start=\"3141\" data-end=\"3213\">\n<p data-start=\"3143\" data-end=\"3213\">Regulate urgent approval processes with complete supporting evidence<\/p>\n<\/li>\n<li data-start=\"3214\" data-end=\"3268\">\n<p data-start=\"3216\" data-end=\"3268\">Define delivery drop points and goods receipt logs<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3270\" data-end=\"3301\"><strong data-start=\"3270\" data-end=\"3301\">Joint Operational Checklist<\/strong><\/p>\n<ul data-start=\"3302\" data-end=\"3502\">\n<li data-start=\"3302\" data-end=\"3345\">\n<p data-start=\"3304\" data-end=\"3345\">Adjust door access hours during Ramadan<\/p>\n<\/li>\n<li data-start=\"3346\" data-end=\"3405\">\n<p data-start=\"3348\" data-end=\"3405\">Audit access cards for contract and temporary employees<\/p>\n<\/li>\n<li data-start=\"3406\" data-end=\"3450\">\n<p data-start=\"3408\" data-end=\"3450\">Strengthen monitoring of high-risk areas<\/p>\n<\/li>\n<li data-start=\"3451\" data-end=\"3502\">\n<p data-start=\"3453\" data-end=\"3502\">Provide fast reporting channels with clear SLAs<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3504\" data-end=\"3548\"><strong>Short SOP: Verify Before Granting Access<\/strong><\/p>\n<p data-start=\"3550\" data-end=\"3597\">Use simple rules to make them easy to remember:<\/p>\n<ul data-start=\"3599\" data-end=\"3724\">\n<li data-start=\"3599\" data-end=\"3631\">\n<p data-start=\"3601\" data-end=\"3631\">Ask for identity and purpose<\/p>\n<\/li>\n<li data-start=\"3632\" data-end=\"3675\">\n<p data-start=\"3634\" data-end=\"3675\">Check supporting evidence and documents<\/p>\n<\/li>\n<li data-start=\"3676\" data-end=\"3724\">\n<p data-start=\"3678\" data-end=\"3724\">Confirm with the internal PIC or Procurement<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3726\" data-end=\"3810\">If any step is not fulfilled, access should be delayed until validation is complete.<\/p>\n<p data-start=\"3812\" data-end=\"3871\"><strong>The Role of Technology in Supporting Security Awareness<\/strong><\/p>\n<p data-start=\"3873\" data-end=\"3936\">Technology does not replace employees\u2014it strengthens vigilance:<\/p>\n<ul data-start=\"3938\" data-end=\"4115\">\n<li data-start=\"3938\" data-end=\"4008\">\n<p data-start=\"3940\" data-end=\"4008\">CCTV and AI analytics to detect tailgating and abnormal activities<\/p>\n<\/li>\n<li data-start=\"4009\" data-end=\"4058\">\n<p data-start=\"4011\" data-end=\"4058\">Access control and visitor management systems<\/p>\n<\/li>\n<li data-start=\"4059\" data-end=\"4115\">\n<p data-start=\"4061\" data-end=\"4115\">Incident dashboards for escalation and documentation<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4117\" data-end=\"4203\">The key principle remains the same: technology provides alerts, humans verify and act.<\/p>\n<p data-start=\"4205\" data-end=\"4245\"><strong>Simple KPIs to Measure Effectiveness<\/strong><\/p>\n<p data-start=\"4247\" data-end=\"4331\">To ensure the program is more than just an internal campaign, companies can measure:<\/p>\n<ul data-start=\"4333\" data-end=\"4515\">\n<li data-start=\"4333\" data-end=\"4378\">\n<p data-start=\"4335\" data-end=\"4378\">Employee participation rates in briefings<\/p>\n<\/li>\n<li data-start=\"4379\" data-end=\"4410\">\n<p data-start=\"4381\" data-end=\"4410\">Number of near-miss reports<\/p>\n<\/li>\n<li data-start=\"4411\" data-end=\"4448\">\n<p data-start=\"4413\" data-end=\"4448\">Reduction in tailgating incidents<\/p>\n<\/li>\n<li data-start=\"4449\" data-end=\"4480\">\n<p data-start=\"4451\" data-end=\"4480\">Vendor compliance with SOPs<\/p>\n<\/li>\n<li data-start=\"4481\" data-end=\"4515\">\n<p data-start=\"4483\" data-end=\"4515\">Security report response times<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4517\" data-end=\"4531\"><strong>Conclusion<\/strong><\/p>\n<p data-start=\"4533\" data-end=\"4794\">Ahead of Ramadan, security risks often emerge from activities that seem routine: quick access, increased vendor traffic, and urgent transactions. With security awareness that actively involves HR and Procurement, companies can close gaps before incidents occur.<\/p>\n<p data-start=\"4796\" data-end=\"4964\" data-is-last-node=\"\" data-is-only-node=\"\">Nawakara is ready to support the development of a measurable security awareness program\u2014from risk assessment and SOP development to data-driven monitoring enhancements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An Essential Guide for HR and Procurement Ahead of Ramadan, work rhythms in many companies change. Operating hours are adjusted, procurement activities increase, and the movement of vendors and couriers becomes more intense. Under these conditions, security risks often arise not from major attacks, but from small lapses that are considered normal. The increased volume [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-16278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/16278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/comments?post=16278"}],"version-history":[{"count":3,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/16278\/revisions"}],"predecessor-version":[{"id":16284,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/16278\/revisions\/16284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media\/16354"}],"wp:attachment":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media?parent=16278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/categories?post=16278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/tags?post=16278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}