classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


A real security solution
January 2013, Security Services & Risk Management

I want to tell you a story about why an independent security risk assessment is different from a risk assessment done by a security provider.

Andre Mundell
Andre Mundell

A few years back a new client phoned us with a recurring problem. Criminals had captured one of the guards on the premises and used his radio to establish the whereabouts of the rest of the security team. After capturing the entire security staff, they had been able to rob the company of assets worth thousands.

The client had switched security providers only to have this scenario repeated another four times. Each of these security providers had ostensibly performed a security risk assessment on the property, but they had all recommended solutions which matched the services and products that they offered rather than tailoring solutions to their client’s needs.

We were then asked to do a security risk assessment on the premises in question.

After identifying all the relevant issues the client finally understood how and where the criminals were gaining access to the property and came to the following conclusions:

* The previous security companies had not considered effective lighting options.

* They had not considered thermal products while the neighbourhood and premises itself were very dark, and some of these security providers did not even know the basics of how thermal products work.

Because of the size and layout of the premises, we suggested the following:

* That their security service provider (Company A) be retained and allowed inside the premises.

* Because of the fact that criminals always managed to overpower and take these guards captive, we recommended that another security service provider (Company B), be placed on the outside of the premises in plain clothes.

After a few months, the same criminals attacked the client’s premises again. Company A had not been made aware of Company B, and there was no radio link between the two. This meant that the criminals also had no knowledge of Company B. Company B saw the guards from Company A being overpowered, reacted accordingly by informing the SAPS and their own armed reaction vehicles and in the end, the criminals were apprehended.

The above is a classic example of why security service providers cannot do security risk assessments, and also why they cannot tell you when they find risks that cannot be handled by one of their services or products. Hence the fact that it is imperative that companies employ the services of independent security risk assessors who will suggest real solutions to eliminate the client’s security risks as identified and explained in the final assessment. This in turn will allow the client to ensure that those risks are properly addressed as per the solutions suggested in the security plan.

No security company will advise a client to hire their competition to protect one area while they themselves protect another. Being independent and unaffiliated we were able to see the real risks involved and made solution based suggestions based on the client’s individual and working environment security needs.

It is better that a security risk assessment is done by an independent security risk assessor. Assessors cannot do an objective security risk assessment or ensure relevant and correct solutions if they are affiliated to any security provider or supplier.

Companies requesting security usually assume that their appointed security provider has done a security risk assessment; and most security providers will say that they have done a risk assessment. However, they will have performed a product assessment, not a security risk assessment. Security providers cannot and in most cases will not reveal your true risks to you.

I would like to stress to all corporate MDs, CEOs and small business owners the importance of protecting your company’s assets and employees. Gather all your facts before accepting any proposal for security services or products.

I again want to emphasise the fact that security providers and suppliers are not equipped to do security risk assessments. The fact that they are mandated to perform any and all assessments to reflect their service or product as the best option for you restricts them from being able to do effective and objective security risk assessments.

For more information contact Alwinco, +27 (0)71 319 4735, aviljoen@alwinco.co.za, www.alwinco.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • ASIS Security Technology Concepts day
    April 2019, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management
    ASIS SA kicked the tyres of a few technologies at its first Security Technology Concepts day in February.
  • Securing a reliable source of backup power
    April 2019, Drensky Technologies, Mustek Security Technologies, Specialised Battery Systems, Security Services & Risk Management
    Dependence on a reliable and stable source of electrical power is a part of everyday life, whether for an individual or a business.
  • The value of having a maintenance contract or SLA
    April 2019, Johnson Controls, Mustek Security Technologies, Security Services & Risk Management
    A maintenance contract or SLA offers a company peace of mind regarding the functioning of their security installation.
  • Biodegradable security seals for SA
    April 2019, TruSeal, This Week's Editor's Pick, Asset Management, EAS, RFID, News, Security Services & Risk Management
    The new TruSeal product extension is produced from a special biodegradable material sourced from Malaysia.
  • CCTV operators’ duties to response personnel at crime scenes
    April 2019, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Control room operators often have a responsibility to monitor response scenes that go beyond the initial detection and response relationship.
  • Simplified surge protection for PoE cameras
    April 2019, BFR Digital, Security Services & Risk Management
    Traditionally the two most common causes of surge arrestors failing to do their job are sub-standard quality, and incorrect earthing.
  • Better energy savings than BMS
    April 2019, Johnson Controls, Integrated Solutions, Security Services & Risk Management
    Central plant optimisation software provides better energy savings than BMS control alone.
  • Hidden person detection
    April 2019, Flow Systems, Security Services & Risk Management
    The FSC HPD system detects any movement generated by a hidden person or persons in contact with the interior or cargo of a vehicle.
  • Making sure the lights don’t go out
    April 2019, Netshield, Security Services & Risk Management
    Based on the state of our current power grid system, load shedding has become a necessary evil as it reduces the risk of a national blackout that could take the country a week to recover from.
  • Gas to replace Eskom’s vapourware?
    April 2019, Security Services & Risk Management
    With Eskom’s unstable electricity supply and increasing tariffs, a handful of estates in Gauteng offer piped gas as an alternative energy source.
  • Is your data protected when the power fails?
    April 2019, Security Services & Risk Management
    It’s relatively easy to lose data due to a power outage, but it’s just as simple to protect it and ensure losses don’t occur.
  • Load shedding calls for essential genset maintenance
    April 2019, Security Services & Risk Management, Fire & Safety
    It is important that such important equipment is maintained properly and serviced regularly in order to be able to cope with extended electricity outages.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.