The human key

Residential Security Handbook 2022: SMART Living Security Services & Risk Management, Residential Estate (Industry)


Andre Mundell.

In security risk assessment, we talk about a ‘human key’. This is the master key to all your safe areas, cash rooms and anywhere you think is safe. It is my belief that 95% of currently installed security measures will not stop a criminal. A key is used to open doors, and the same applies to a human key. The only difference is that the repercussions of a human key are often detrimental.

A News24 video (located at https://www.youtube.com/watch?v=gnsoxCicq1Y) shows the human key in action. It also shows us that security is more than just hardware.

The criminal incident in the video took place in Limpopo on 15 January 2022. When you watch the footage you will see the double door, presumably with bulletproof glass. The office also has video cameras installed, hence the availability of the video clip. Technically, this is a secure room.

Then you will see a lady forced to open the door for the criminals. Three of them come through the door, while the last man is holding someone, possibly the security guard (or human key) as a hostage.

I believe that these criminals told the ladies in the office that they will shoot the guard if they do not open the door. This is what we mean by a ‘human key’. They used the security guard as a key to get into the area where the money is being kept (supposedly) safe.

The problem is that people do not understand the concept of security risk as they should. Even though a lot of money was spent on installing a secure door, bulletproof glass, a camera system and so on, the risk was not eliminated and thus provided the opportunity for a crime.

This also demonstrated a security system that was installed without a security risk assessment. The same type of risk is present at estates or businesses, in fact any properties where the criminals have access to the security guard.

When a criminal has access to someone, I can assure you that even the most advanced security measures will not suffice.

• The human key is not limited to security guards. In a home environment, the human key can be your children, your wife, your mother or your father.

• It can also be an employee, a financial manager, a CEO and even a cleaner. When it comes to corporate entities, these criminals mostly tend to target the more prolific roleplayers such as the CEO, finance personnel, IT employees and so on. The ‘human key’ can be anyone that a criminal has access to and can manipulate, blackmail, hold hostage or otherwise coerce.

A security risk assessment is an in-depth investigation into your current security structure to identify the risks that provide the opportunity for crime. Security risk is where threat and opportunity overlap. Thus, risk is when your property provides an opportunity for a crime to occur.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.