A real security solution

January 2013 Security Services & Risk Management

I want to tell you a story about why an independent security risk assessment is different from a risk assessment done by a security provider.

Andre Mundell
Andre Mundell

A few years back a new client phoned us with a recurring problem. Criminals had captured one of the guards on the premises and used his radio to establish the whereabouts of the rest of the security team. After capturing the entire security staff, they had been able to rob the company of assets worth thousands.

The client had switched security providers only to have this scenario repeated another four times. Each of these security providers had ostensibly performed a security risk assessment on the property, but they had all recommended solutions which matched the services and products that they offered rather than tailoring solutions to their client’s needs.

We were then asked to do a security risk assessment on the premises in question.

After identifying all the relevant issues the client finally understood how and where the criminals were gaining access to the property and came to the following conclusions:

* The previous security companies had not considered effective lighting options.

* They had not considered thermal products while the neighbourhood and premises itself were very dark, and some of these security providers did not even know the basics of how thermal products work.

Because of the size and layout of the premises, we suggested the following:

* That their security service provider (Company A) be retained and allowed inside the premises.

* Because of the fact that criminals always managed to overpower and take these guards captive, we recommended that another security service provider (Company B), be placed on the outside of the premises in plain clothes.

After a few months, the same criminals attacked the client’s premises again. Company A had not been made aware of Company B, and there was no radio link between the two. This meant that the criminals also had no knowledge of Company B. Company B saw the guards from Company A being overpowered, reacted accordingly by informing the SAPS and their own armed reaction vehicles and in the end, the criminals were apprehended.

The above is a classic example of why security service providers cannot do security risk assessments, and also why they cannot tell you when they find risks that cannot be handled by one of their services or products. Hence the fact that it is imperative that companies employ the services of independent security risk assessors who will suggest real solutions to eliminate the client’s security risks as identified and explained in the final assessment. This in turn will allow the client to ensure that those risks are properly addressed as per the solutions suggested in the security plan.

No security company will advise a client to hire their competition to protect one area while they themselves protect another. Being independent and unaffiliated we were able to see the real risks involved and made solution based suggestions based on the client’s individual and working environment security needs.

It is better that a security risk assessment is done by an independent security risk assessor. Assessors cannot do an objective security risk assessment or ensure relevant and correct solutions if they are affiliated to any security provider or supplier.

Companies requesting security usually assume that their appointed security provider has done a security risk assessment; and most security providers will say that they have done a risk assessment. However, they will have performed a product assessment, not a security risk assessment. Security providers cannot and in most cases will not reveal your true risks to you.

I would like to stress to all corporate MDs, CEOs and small business owners the importance of protecting your company’s assets and employees. Gather all your facts before accepting any proposal for security services or products.

I again want to emphasise the fact that security providers and suppliers are not equipped to do security risk assessments. The fact that they are mandated to perform any and all assessments to reflect their service or product as the best option for you restricts them from being able to do effective and objective security risk assessments.

For more information contact Alwinco, +27 (0)71 319 4735, aviljoen@alwinco.co.za, www.alwinco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
AI augmentation in security software
Security Services & Risk Management AI & Data Analytics
The integration of AI technology into security software has been met with resistance. In this, the second of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...