Preparing for the unexpected

Residential Security Handbook 2021: Secure Living Residential Estate (Industry), Security Services & Risk Management

When I was in primary school, we had something that was constant, it happened as a regularity, but at irregular intervals – we had emergency drills, bomb drills, fire drills and emergency evacuation drills. From a very young age we were prepared for the ‘what if’, the exceptional circumstances that might happen.

How many of these emergency drills have you done in the last year? And how prepared are your workers and family if there is an emergency?

Recently we experienced disaster, chaos and many of us lost our livelihood. Many business premises and malls were burned to the ground or irreparably damaged. Yes, it is something we could not have foreseen (debatable though), but the fact is it is something we could have prepared for – but it was the exception.

What is an exception?

An exception is any deviation or occurrence not envisaged or planned for from the acceptable business process planning/strategy that an organisation has implemented. Exception-based demand management uses a forecasting process that also identifies anomalies in the forecast. You are then able to proactively make corrections before any damage is caused.

So how do we do demand planning when it comes to our facilities security and identify anomalies?

In most cases, security is one of our last agenda/strategy items and thoughts, it gets the short straw of the budget. When we cut costs, we do so by getting something ‘cheaper’, by cutting the security complement but not decreasing their workload – we expect the same level of security with fewer personnel and cheaper equipment.

So how far has our cheaper security brought us today? How much money did we save? How prepared were we for ‘the exception and/or anomaly’ when it comes to security at our premises?

Security operational measures for strategy and budget planning

These five steps are crucial when it comes to planning your security strategy and budget:

1. Identify your sensitive areas. Get a reputable security company to compile a risk analysis. This will be the data you need to focus your resources on, protecting and safeguarding your most valuable assets, facilities, personnel and data.

2. Identify possible threats. A reputable security company will have in-depth knowledge of your industry and location threats. This is an ongoing process of collecting and processing data and intelligence specifically relating to security and safety in your industry and location. While you should be wary of third parties trying to harm your premises, stock or personnel, you should also watch out for insider threats, such as negligent employees and disgruntled workers.

3. Continually analyse security vulnerabilities in correlation with your security service provider, involve a third-party for unbiased observation. Assess your current safeguards and determine any loopholes or existing weaknesses that may be exploited to gain access to your premises, products and employees. The security industry’s equipment and operating procedures change continuously, make sure your security company is up-to-date with the newest technologies and methods and stay informed.

4. Consistently appraise the level of risk associated with each vulnerability at your facility or premises. In correlation with your security service provider, rank your vulnerabilities using factors such as the likelihood of an attack happening (internal and external sources), the extent of damage that you would suffer in event of such an occurrence and the amount of capital, work and time you would need to recover. The more likely and damaging an attack is, the more you should prioritise mitigating the associated risk related to the damage; this is an important measure in planning your security budget, does the threat outweigh the expenditure?

5. Put countermeasures in place. The last step of operational security strategy is to create and implement a plan to eliminate threats and mitigate risks. This could include regular security and safety drills, training employees on sound security practices and company policies. Countermeasures should be straightforward and simple. Employees should be able to understand the implemented measures required on their part with or without additional training.

Preparation and strategy can be learned

The advantage of preparation is that you can manage situations quickly and more efficiently because you will already have the solutions and plans at hand ready to be implemented. The important factor here is obtaining the services of a reputable security company that plays an integral part in your day-to-day operations and has a vested interest in your company’s success and the safety of your premises, goods and personnel.


Being prepared can reduce fear, anxiety and losses that accompany any threat, attack or theft. We can reduce the impact of and sometimes avoid, the possible dangers completely.

Preparation is as important as planning and strategy, maybe even more so. Preparation gets you ready to do the work collectively with all role players and service providers. You could say that operational security strategy and planning is the original step and preparation is the sequel. The truth is, you can plan all you want, but if you do not prepare continuously no one will be ready in the eventuality that your business is attacked either from internal or from external threats.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
A winning combination for modern cybersecurity
Information Security Security Services & Risk Management
Companies are compelled to comply with legislative mandates and, more importantly, implement appropriate security measures for their customers and their most valuable asset – their data.

Read more...