More secure governing

July 2016 Security Services & Risk Management

Although governmental buildings and offices, particularly those made accessible to the public, have access control, most of these properties do not otherwise have effective overall security. It is very easy once you have come in at the main entrance to go anywhere inside the building. As it often occurs, health & safety and security are confused and thought about as being the same thing. The reality is that they are not. They can be at the opposite ends of the spectrum at times. These buildings have an OHS report. None of them have their security risk assessment documentation in hand.

To my understanding, governmental properties usually make use of the tender process to procure security services, installations, and upgrades. I have no qualms against this method, but would like to suggest an improvement to enrich this process. This will ensure that the correct security action is taken from the very beginning.

I have always wondered how the specs of the tender are derived. A vast majority of governing boards that I have encountered do not always have an individual onboard with the necessary security knowledge or background. This makes it even harder for them to make the correct decisions in choosing the best security solutions. Tender applications usually consist of only a spec sheet and the price. If you are not familiar with the product or security in general; it could be very confusing.

Most of the time, the end-user doesn’t even understand what all the listed specs mean or what the actual functionality of the product is. It is only after money has been spent and the installation has been completed that many people find that their security is inefficient, incorrect or just not enough. A good security system consists of multiple facets that are interconnected and that complement each other.

Improvements for security tenders

There are two ways in which to approach these improvements. The first is for the governing board to contract an independent security risk consultant to assess their properties. All risks in regards to their physical security will be identified and explained. This will give them a definite guideline of what to request in the tender. They will also be able to judge all applicants on the same standard. Security will be based on a strong, solid foundation.

Additionally, the independent assessor will be able to help them by reviewing and explaining the recommendations made by applicants. He will be able to weed out the best solutions from the lot and to advise the board what will work for their unique secur-ity situation. The security risk assessment will also grant better budget planning. Security costs will be stabilised and can be spread out in phases over time. It is also not uncommon for the board to increase the initial security budget. This is because they now understand the risk. They will see why certain measures, upgrades, and installations are needed.

Experience has also shown that the good, professional security companies that you actually need do not always compete in the tender process. More often than not you are sitting with a handful of small companies that are not always able to provide a good service or handle a big contract. The assessor can approach the best companies on behalf of the governing body and invite them to tender for the project. As part of the assessment, the independent consultant would have already conferred with those offering the best solutions. He will thus be able to indicate to the board who the cream of the crop is.

The second method is to ask all tender applicants to hand in their own security risk assessment report with their applications. This will allow the board to see how the solutions were derived and if all the risk will effectively be addressed. It will show that the security company has done its homework and that the recommendations are not just founded on guesswork. This second method may be the better solution.

For more information contact Alwinco, +27 (0)62 341 3419, [email protected], www.alwinco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...