The same security assessment for different reasons

Issue 7 2020 Editor's Choice

Like everything else in life, a security risk assessment also has two sides: Side A and Side B. Side A is the proactive approach, and Side B is the approach taken ‘after the fact’.

Side A is the approach mostly taken by investors, the owner of a business, or a CEO. These individuals will contact us for an independent security risk assessment in order to understand their security and risks better and to find suitable solutions for the identified risks.

Most of these people will then follow the recommendations in the security risk assessment and implement the solutions to ultimately eliminate the opportunity for crime. In other words, they fix their security before they get caught off guard.

The other approach, Side B, is the approach people take after a crime with devastating effects. This is when they have an axe to grind and want to hold someone accountable for the loss or injury that has occurred.

Essentially, both types of assessments are done in the same way; the focus is to identify the risks and to eliminate these risks with suitable and risk-specific solutions.

In the case of Side B, we just look at the security solutions that should have been implemented to avoid a crime from occurring. The only difference is that the B assessment is requested after a crime-related incident that changed someone’s life for the worse.

It is not the owners of the property or business that request the security risk assessment, but rather the victim’s family or friends. Sometimes these family members will approach an attorney who will then request us to conduct a security risk assessment.

Fixing the unfixable

This type of assessment is mainly focused on finding out what could have been done to prevent a crime from happening. It is aimed at highlighting the things that should have been remedied to eliminate the risk that provided the opportunity for crime. It also focuses on the process that was followed to make security decisions – not only on the hardware.

The goal of highlighting the opportunities for crime is to provide a court with information that somebody is responsible for the security decisions or neglected a security aspect and that this neglect or wrong decision contributed to the occurrence of the crime.

When someone has been attacked at the office or any property has been compromised and someone has been murdered, raped, or kidnapped, and so on, people want to react. They want to know why and how, and they want to know who is responsible.

Think about this for a moment: If a building collapses and people are hurt and killed in the process, who will be blamed? The architect or the engineer. The builders will also be blamed, but remember, they built in accordance with the plan that was given to them. If they prove that they followed the instructions as per the architect, the burden of those lives that have been lost will fall on the architect.

Remember the homework or the research that you did when you wanted to purchase a vehicle? Or when you were looking at purchasing a house? Even purchasing new curtains requires some form of research.

It’s the same with security

What homework or research has been done before you made a security decision? Who has done this homework/research? What information did you use to make your security decisions? That is the type of information that the second type of assessment, approach B, wants to know after a crime has happened.

Eventually, this type of security risk assessment will be handed to the lawyers and will be used in court, or it will be used in some way against the property owner, and/or the decision-makers regarding poor security.

Remember, security hardware alone is not security. Various aspects need to be in place before you can call it security.

While these assessments are predominantly the same , and they will be accompanied by questions such as:

• Where is your risk assessment?

• Who is responsible for security?

• What have you done to eliminate the risks?


Andre Mundell.

The difference comes in at the answering of these questions. The proactive party, Side A, will have the answers to these questions while Side B, the ‘after the fact’ party, will have no answers when a crime has occurred.

The security risk assessment will have all the answers; it will show the processes that were followed, the homework that was done to get to the specific solutions as well as the what, how, and why of security.

In some cases, the reason that the security measures could not be installed at the time will also be provided by the security risk assessment. Remember that people were hurt, and either incurred an injury themselves or lost someone dear to them, and they want to hold someone accountable. They will search far and wide to find the responsible person.

Most of these people ask the questions, but they do not get satisfactory answers, which leads them to us at the end of the day.

Keep in mind that when it comes to certain properties, in accordance with the Health & Safety Act, the business/property owners have a responsibility to do everything in their power to keep the people safe. The homeowner knows who is responsible for security decisions.

‘Should have’, ‘could have’ and ‘would have’ does not undo the crime. Those words cannot change the devastating effects of crime and that is essentially the main difference between a proactive security risk assessment and a security risk assessment that is done after the fact.

Approach A wants a security risk assessment to fix their security in order to be proactive, whereas approach B is to find out who is responsible for bad security decisions.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...