Warehouse security and the pandemic

Issue 7 2020 Logistics (Industry)

In the logistics industry, transport security often receives all the attention because of the dramatic and traumatic nature of hijackings and other criminal activity. The warehousing discipline is usually associated with storing products safely and is not viewed in the same light when it comes to security.

This approach is misinformed because companies offering warehouse services are as under attack as are transportation organisations, threatened by criminals using fraud and insider shenanigans, as well as with teams of armed intruders intent on committing their crimes with no regard to human life. If you don’t believe this, simply ask any warehouse security manager how he or she is sleeping.

Massimo Carelle, MD of Bradian Risk and Security Solutions admits that in the first three weeks of lockdown, starting in March this year, there was a slowdown in criminal activity in the logistics world. That was short lived, unfortunately, as criminal activity spiked shortly thereafter and is still climbing. There seems to be no shortage of people looking for black market cell phones, laptops, personal protective equipment (PPE) and other goods.

Expanded security operations

The result is that Bradian is expanding its security operations to support more intelligent decision making by keeping an eye on its properties as well as the surrounding areas. It also keeps in contact with the police and its crime intelligence division. The company has also changed the way it handles security on site.

Carelle, who has been in the security industry since 1993, notes that a different approach is necessary because he has never seen a surge in crime that matches the current wave. It doesn’t help either that everyone now wears a mask.


Massimo Carelle.

While the usual products are being targeted – such as cell phones, because syndicates need communications, although how they get their devices through RICA procedures is still a challenge – the targets now include other goods, from alcohol to sweets, making the job of security that much harder. Additionally, logistics operations are being hit by a combination of attacks from internal and external people, once again complicating matters.

Carelle adds that given the well-armed teams of criminals that often attack warehouses, the traditional approach to guarding and armed response will also have to change in order to deal with the increased risks presented to logistics companies. Moreover, we may well also see changes to the way alarm activation/deactivation is handled in future.

The ‘new normal’ in the logistics market is a lot more work, and security costs are rising, but there is little alternative that won’t result in the company’s customers losing faith in their capabilities. Unfortunately this means the security team is always on call and a day off is a rarity.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.