A real security solution

January 2013 Security Services & Risk Management

I want to tell you a story about why an independent security risk assessment is different from a risk assessment done by a security provider.

Andre Mundell
Andre Mundell

A few years back a new client phoned us with a recurring problem. Criminals had captured one of the guards on the premises and used his radio to establish the whereabouts of the rest of the security team. After capturing the entire security staff, they had been able to rob the company of assets worth thousands.

The client had switched security providers only to have this scenario repeated another four times. Each of these security providers had ostensibly performed a security risk assessment on the property, but they had all recommended solutions which matched the services and products that they offered rather than tailoring solutions to their client’s needs.

We were then asked to do a security risk assessment on the premises in question.

After identifying all the relevant issues the client finally understood how and where the criminals were gaining access to the property and came to the following conclusions:

* The previous security companies had not considered effective lighting options.

* They had not considered thermal products while the neighbourhood and premises itself were very dark, and some of these security providers did not even know the basics of how thermal products work.

Because of the size and layout of the premises, we suggested the following:

* That their security service provider (Company A) be retained and allowed inside the premises.

* Because of the fact that criminals always managed to overpower and take these guards captive, we recommended that another security service provider (Company B), be placed on the outside of the premises in plain clothes.

After a few months, the same criminals attacked the client’s premises again. Company A had not been made aware of Company B, and there was no radio link between the two. This meant that the criminals also had no knowledge of Company B. Company B saw the guards from Company A being overpowered, reacted accordingly by informing the SAPS and their own armed reaction vehicles and in the end, the criminals were apprehended.

The above is a classic example of why security service providers cannot do security risk assessments, and also why they cannot tell you when they find risks that cannot be handled by one of their services or products. Hence the fact that it is imperative that companies employ the services of independent security risk assessors who will suggest real solutions to eliminate the client’s security risks as identified and explained in the final assessment. This in turn will allow the client to ensure that those risks are properly addressed as per the solutions suggested in the security plan.

No security company will advise a client to hire their competition to protect one area while they themselves protect another. Being independent and unaffiliated we were able to see the real risks involved and made solution based suggestions based on the client’s individual and working environment security needs.

It is better that a security risk assessment is done by an independent security risk assessor. Assessors cannot do an objective security risk assessment or ensure relevant and correct solutions if they are affiliated to any security provider or supplier.

Companies requesting security usually assume that their appointed security provider has done a security risk assessment; and most security providers will say that they have done a risk assessment. However, they will have performed a product assessment, not a security risk assessment. Security providers cannot and in most cases will not reveal your true risks to you.

I would like to stress to all corporate MDs, CEOs and small business owners the importance of protecting your company’s assets and employees. Gather all your facts before accepting any proposal for security services or products.

I again want to emphasise the fact that security providers and suppliers are not equipped to do security risk assessments. The fact that they are mandated to perform any and all assessments to reflect their service or product as the best option for you restricts them from being able to do effective and objective security risk assessments.

For more information contact Alwinco, +27 (0)71 319 4735, [email protected], www.alwinco.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Key timelines to ensure compliance
Security Services & Risk Management
Regulations to the Occupational Health and Safety Act that apply to major hazard installations require that certain actions be taken to manage health and safety risks – some with timelines for compliance that must be monitored.

Read more...
Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Read more...
Is AI the game-changer for streamlining anti-money laundering compliance?
Financial (Industry) Security Services & Risk Management
In the aftermath of South Africa's recent grey listing, companies are now confronted with the imperative to address eight identified strategic deficiencies, while simultaneously reducing their financial crime risk through anti-money laundering compliance processes.

Read more...
Five ways to reduce your cyber insurance premiums
Security Services & Risk Management News
With the global costs of cybercrime expected to soar to $13 trillion within the next five years, cyber insurance is booming as organisations try to mitigate the risk of financial losses.

Read more...
Client satisfaction boosted by 85% at Thungela Mine
Thorburn Security Solutions News Security Services & Risk Management Mining (Industry)
Thorburn Security, a division of Tsebo Solutions Group, has announced its recent collaboration with Kwa-Zulu Natal security company, Ithuba Protection Services, as part of its Enterprise Supplier Development (ESD) initiatives across Africa.

Read more...
Migrating to the cloud? Beware the many hurdles
IT infrastructure Security Services & Risk Management
While there are undoubtedly many benefits, there are also numerous hurdles to cloud adoption. Some of the biggest challenges revolve around managing cloud spend, understanding the cost components of cloud infrastructure, and how those costs can scale.

Read more...
Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Read more...
Planning for the worst is key to success
Technews Publishing Security Services & Risk Management
Planning for the worst is key to success when disaster strikes. Amidst frequent load shedding and often unpredictable stages of power outages, many businesses are concerned about the possibility of a total blackout.

Read more...
Protecting South African systems through XDR cybersecurity
Cyber Security Security Services & Risk Management
Carlo Bolzonello, Country Lead for Trellix South Africa, discusses how the country can protect its valuable digital assets through the artificial intelligence-enabled Extended Detection and Response (XDR) cybersecurity approach.

Read more...
[Sponsored] Protecting Against Ransomware Attacks: Lessons from Recent POPIA Fine
Cyber Security Security Services & Risk Management
According to Sophos' most recent ransomware report, an alarming 78% of the South African organisations that Sophos surveyed experienced ransomware attacks in the past year.

Read more...