It is time to change the way we approach security

Issue 6 2021 Security Services & Risk Management

A security risk assessment is much more complex and intricate than people assume. People are so used to doing what they have always done and they forget to approach things from a different perspective, especially when it comes to security.


Andre Mundell.

Whilst most of us are set in our ways, criminals have adapted and evolved to such an extent that we are mostly on the losing end. Keep in mind that criminals are not just those who want to get in, but also those who are already inside your business. We refer to ‘inner’ and ‘outer’ crime.

A criminal looks for the opportunity, a gap in your security that could be used to their advantage.

People seem to stick to the old way of measuring security which is on a scale of one to 10 or from high to low. It does not work like that.

• A risk is a risk, whether it is perceived as a ‘small’ or a ‘big’ risk, it still remains a risk.

• A criminal does not distinguish between various opportunities, why do we?

◦ This approach was borrowed from the Health and Safety approach. Security and risk are nothing like Health and Safety.

• Health and Safety is measured against probability, whereas risk is measured against opportunity.

• A security risk is what provides the criminal with the opportunity to commit a crime. Whether the risk is big or small, high or low, they will take the opportunity with both hands. Maybe not today, perhaps not tomorrow either, but somewhere along the line, it is bound to happen.

An independent security risk assessment is an in-depth study of the security risks on the identified property. It is an investigation to establish the security risks that provide the opportunity for crime. Explaining the concept of risk would take me an immense amount of time as it is such a vast concept and there is an array of variations when it comes to risk.

An example of this is communication risk in security.

• Communication is so much more than just talking or having a monthly meeting, or even sending a few emails about new developments. It is necessary for clear communications between systems and operators of data, cameras, access control, perimeter security, alarm systems and a lot more, to successfully function.

• Where does the communicated information go to? Who attends to it and who acts on instructions or alerts? How fast does this happen?

Further to this, we also look at the body language of the property. Like every human, buildings, offices, properties, estates, shopping centres, homes and so on, all have a body language. This body language tells the criminals how seriously the owners or managers of the property take security measures. This gives them an indication of the ease of getting in and out, whether the risk is worth taking.

Keep in mind that we must see the body language of the business/property from the criminal’s perspective and not the owner or manager’s perspective. The criminal sees the opportunities, whilst the manager or owner might see it from an aesthetic perspective.

When an assessment is conducted, nothing and nobody is above or below being a potential risk. In an assessment, we look at everyone, from the cleaners to the CEO; we look at the different departments, protocols, processes, service providers, hardware installers, the security company, access control and several other aspects.

Access control

• Access control for an estate will be different to access control for a business. The same applies to homes and warehouses.

• The concept of access control remains the same, although the findings and recommendations will be different.

Old information

We do not use old information, we do not work on previous reports that were conducted 10 or even five years ago, simply because that information is outdated and not relevant anymore. You cannot build security based on old and irrelevant information. Everything has changed over the years, technology, the lack of job availability, especially over the last two years taking Covid-19 into account and the negative effect that it has on a lot of people.

It’s good to remember that all the information that is available to us in our fight against crime is also available to the criminals. It is about how the information is used.

This brings us to the reading of documents.

• We look at the way people read documents, as silly as it sounds, the fact that people do not thoroughly read documents has a severe impact on security as understanding comes from reading information pertaining to a specific subject and in this case, it is security.

• People do not read the information, which means that they will not understand it.

• Understanding crime, security and risk is a crucial element when it comes to fighting crime successfully.

• When people do not read the information and just scan through it and they think they know what is written, they start making assumptions. This is so dangerous, especially in the security world.

Security risk assessment vs. selling security

• The term ‘Security Risk Assessment’ is often thrown into every document and description to ‘sell’ or ‘promote’ a service without fully understanding the entire concept.

• Very few people can conduct an actual security risk assessment, especially in South Africa.

• The moment that a product or a service accompanies the security risk assessment, you need to think twice because this means that the assessor is not impartial and is not focused on finding the risks, but rather focused on promoting and selling whatever services or hardware he offers.

• The same applies to an ‘in-house’ assessor. They cannot be unbiased as they are bound by the rules and culture of the business.

Real assessment

• The only true assessment will be done by an independent security risk assessment consultancy. ‘Independent’ is the keyword.

• Being independent means that they are not affiliated with any security service provider of any sort. This means that they are unbiased, truthful and will focus on finding your security risk and will not chase sales.

Confidentiality

Confidentiality is part of our core beliefs as we know that we are dealing with sensitive information and we strongly believe in not disclosing any such information. We understand the massive ramifications it can have when sensitive information such as a security risk is shared, which is why we firmly stand by our non-disclosure agreement.

The sad thing is that even though we clearly state that we will never disclose any of our clients’ information, which includes company or individuals’ names, enquiring companies and clients still ask us for references. Clients ask us to sign a non-disclosure agreement, but on the very same page they ask us to break a current non-disclosure agreement with our established clients and give them a list of our clients. How does this make sense?

A true security risk assessor will not boast about the assessments that he has done, the lack of security at a site, the shocking discoveries, or for which prominent companies he has done an assessment. No matter how many new doors it might open for him.

Security risk template

Some blatantly ask us for a ‘template’ on how to conduct a security risk assessment. It baffles me. There is no template for a security risk assessment, you just need to follow the risk. Each property is unique with unique risks, which is why each report is unique.

In short, a security risk assessment is an in-depth investigation into the status of your security. It is not based on what someone said 10 years ago and it is not based on what professors and other experts say. A security risk assessment is based on the risks present that provide the opportunity for crime; it is looking at your property from a criminal’s perspective and not from a CEO, business owner, property owner, or manager’s perspective.

Remember, it is the criminals that you want to keep out and also to get the criminals inside the property out.

The risks will tell the story and will lead to the solutions. When the risks are identified, the solutions can be researched and implemented to eliminate the risks. Only once these security risks are eliminated can crime be averted.

We have been doing security the same way for the last 50-odd years and just look where that has gotten us. Is it not time to change the way we approach security?


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Risk management and compliance enforcement
Security Services & Risk Management
Having a risk management and compliance programme (RMCP) is not just a procedural formality; it is a legal requirement under Section 42 of the Financial Intelligence Centre Act (FICA).

Read more...
The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it is a gamble.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it’s a gamble.

Read more...
Managing mining physical security risks
Zulu Consulting Security Services & Risk Management Mining (Industry) Facilities & Building Management
[Sponsored] Risk-IO, a web app from Zulu Consulting, is designed to assist risk managers in automating and streamlining enterprise risk management processes, ensuring no steps are skipped and everything is securely documented.

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...