Five things your security service providers don’t want you to know

February 2015 Security Services & Risk Management

South Africa has one of the largest private security industries in the world, yet there is still an inadequate capacity to effectively combat crime in the country. According to the Private Security Industry Regulatory Authority (PSIRA) Annual Report, 2010/11, there were 8828 private security businesses registered as security service providers (which is an 18.35% increase compared to the number of companies registered for the previous financial year).

It is estimated that of the almost 1.7 million guards registered, only 400 000 are active within the industry. The figures have prompted a review of the regulation of the industry by the Minister of Police to address certain risks and threats identified. But what risks are there for the user of private security services.

1. Criminal infiltration

One indication of the extent of criminal infiltration of the industry can be seen in the results of a voluntary vetting process initiated by some private security business in 2008 where 170 728 guards were vetted through the SAPS Criminal Records Centre, 14 729 were flagged as being linked to possible criminal activities. All these guards allegedly had valid registration certificates as required under the Private Security Industry Regulatory Act, 2001.

Recently, PSIRA’s deputy director for law enforcement, Philani Mthethwa told parliament’s police committee that criminal cases against private security firms where mounting. The number of pending criminal investigations against security companies had risen from 1301 in 2012/2013 to 1740 in 2013/2014. However, not all companies and private security guards register with PSIRA as required by law. Many companies and security guards operate under the radar and unlawfully.

In 2014, a Cape Town-based security company reported that over a two-month period 27 security guards attempted to gain employment with them using falsified documents. The problems are not just related to fraud with ‘Sybrand’ Louis van Schoor, a private security guard and former policeman, being convicted of 22 counts of murder in 1990. More recently four security guards were arrested in Cape Town on charges of burglary and kidnapping and reports of this nature are becoming a weekly event.

2. Oversight

The South African model for quality control falls on the Private Security Industry Regulatory Authority (PSIRA). The primary objective of the authority is to regulate the private security industry and to exercise effective control over the practice of the occupation, not quality. Organisations that promote minimum standards in security like the South African Intruder Detection Services Association (SAIDSA) are still voluntary with no obligation by companies to comply with minimum standards.

According to Natalie Jaynes report on the industry (Flying Below the Radar), PSIRA’s budget is comparable to that of the Independent Police Investigative Directorate (IPID), but actual spending on oversight of the private security sector is limited to a mere 16 inspectors that are employed nationally. There is also a general lack of public knowledge about the legal framework within which private security companies function, in particular the powers of arrest, stop and search, use of force and general legal standing.

According to Jaynes, the use of firearms by security companies also remains an area of concern. Currently, neither PSIRA nor the South African Police Services keep record of cases of death and injury perpetrated with firearms from private security companies specifically. The South African situation remains one of client immunity, whereas emerging good practices internationally are moving towards client-level responsibility. Amendments to the act might change this in the near future.

3. Cost cutting

The large number of service providers means it is easy to generate contract bidding wars. Too often, contracts are focused on cost rather than service quality levels. Some private security companies secure contracts by undercutting competitors by reducing the company’s running costs. One of the main ways of cutting costs is by the underpayment of wages. Guards are employed on a lower grade rate than the client is charged for and operational cost passed down to the guards. Items like uniforms and nametags are billed to both the client and the guards, while leave days and bonuses are included in the contract price but not paid to the security officers. Labour court rulings indicate that the underpayment of guards and other illegal labour practices are not limited to small companies only. Companies that are illegally cutting costs by underpaying their employees often also cut costs in other areas such as training and equipment issued.

High staff turnover has been the norm with some estimating that staff turnover could be as high as 200% a year in the guarding sector. When an incident occurs that involves a security officer, he is simply moved to another location or returned to the pool of guards to be employed by another service provider. Because of the amount of companies and the cutthroat nature of the industry, rival companies don’t share information about employees and incidents even if it means potentially exposing a client to a threat.

All of this has led to bad working conditions within the industry. In 2006, private security personnel went on a countrywide strike that lasted 96 days and cost the industry more than a million working days. The striking workers looted and damaged property, and committed violent crimes. In 2015, the country might experience another strike as the industry sits down to negotiate minimum wages following similar strikes in the mining sector.

4. Lack of security knowledge and management

There has been a steep increase in the demand for private security services from 2005 to 2015 in response to high crime levels in South Africa. In most instances, security services are outsourced due to the specialised nature of the service. Most users of outsourced services do so to complement a lack of internal skills to run this function. However, many also appoint the outsourced security service provider to manage its own contract. This in turn has the effect that many service discrepancies are not reported and in fact hidden from the user. Many users only find out the discrepancies in service after an incident has occurred.

The steep increase in demand means that many business people are in security with few security people being in security. For an industry worth R50 billion and employing almost 400 000 people it is also striking that you can only study security management at one university in South Africa with two that only provide a post graduate option. Few security service providers have an active strategy to combat crime, instead they list a number of services that are merely an alternative to that of their competition.

5. Transparency

Many security service providers fight vigorously against the involvement of a third party or access to certain systems and information. Monthly reports are full of detail on occurrences and post incident investigations but generally ignore the origin of the problem. It can in turn lead to resources being wasted on solutions that are not based on the actual security risks. To top that, security advice is acquired from sales consultants, installers and other 'experts' whose knowledge is usually limited and subjective to their specific field of expertise.

More companies value the need for transparency and compliance when it comes to security and are moving to independent security management options. These include remote viewing of security systems as well as independent onsite and remote security audits. One such company is Cape Town’s Astrosec. Astrosec uses its SAIDSA accredited facility to reveal the truth about the effectiveness of current security strategies while managing service level agreements (SLA) between the user and security ­service provider. This has the duel advantage that a third party can just focus on improving security while ensuring that the user complies with all legislative requirements. When done correctly, it can mean a dramatic increase in the quality of security at no cost to the user.

Ultimately, the responsibility lies with the end user. There needs to be a clear and defined strategy to mitigate all security risks by demonstrating responsiveness, diligence, judgment and a willingness to build on a culture of accountability.

For more information contact Adriaan Bosch, Astrosec, +27 (0)21 007 1034, [email protected], www.astrosec.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...