A comprehensive security risk assessment

August 2012 Security Services & Risk Management

Andre Mundell discusses various aspects included in a comprehensive security risk assessment.

Security risk assessment, this is a term that is not really understood by people in the private or corporate sectors. You need to understand this term before you will grasp the full scope of a security risk assessment. The risk assessment is that little bit extra that you do in order to find out what your actual risks are.

A security risk assessment is a realistic, thorough and intelligent approach to security as a preventative measure against crime. It gives a comprehensive mechanism that ultimately gives clients the compass of what they are up against in terms of security risk. A security risk assessment provides total control of your security if done correctly.

Security is not an alarm system or guard at your gate. Security is vital information which answers questions connected to a layered set of objectives. This information is gathered through the following:

Level 1 – Outside neighborhood within 1 km radius

Assessing the greenbelt of the neighborhood or suburb, checking if there is a river, bridge, easy hiding places or squatter camps in the area. This also includes roads, available routes to your property and also possible escape routes from your property. Parks, bus stops, vacant lots and makeshift shelters close to your premises. Assessing the neighborhood also involves research on which criminals have been active in that area!

Level 2 – Property line, fencing, walls and driveway assessment

This level is commonly known as the first line of protection because it is ideally where you want to stop a potential criminal. You don’t want to find him lurking around your driveway or inside your property.

Level 3 – Area between yard, fence or walls, and the buildings – parking, garden, courtyard and backyard

Once a criminal has breached Level 2, your aim is to stop him from entering the building. This level would include the parking and courtyard areas, which are often overlooked by security companies. This level also includes your front garden and back yard. These are also the areas where criminals will sit and scope out the premises to establish how to proceed.

Level 4 – Outer structure of house, buildings and or office structure

This involves the actual building, including stairwells, balconies, patios etc. If a criminal gets this far, something is seriously wrong with the security measures you have in place.

Level 5 – Inner security of house, buildings and or office structure

This involves the actual building, including stairwells, balconies, patios etc. If a criminal gets this far, something is seriously wrong with the security measures you have in place.

Levels 6 and 7 apply to Corporate Environments only.

Level 6 – Assessment of existing appointed security service provider

The security service provider is the security company currently employed by the client. This assessment is split in two parts.

The first part is the alarm and armed response. We look at what alarm they have installed, also what hardware they have onsite. Then we look at how long it takes to respond to an activation, where does the armed response vehicles standoff between signals, are their vehicles in the neighbourhood and various other aspects?

The second and in most cases the most important part is the guards. We take a look at things like the contract the client has with this security company, and we then do an analysis on the guards themselves. We look at aspects like their training, are they registered with PSIRA, is the guard in contact with his control room, what the guards does in case of a robbery/break-in, are the guards informed and held to their set out SOPs (standard operating procedures), and other important factors?

Level 7 – Corporate management, personal risk and security

On this level we look at the corporate management, or the MD’s personal security. We look at aspects like his driving skills, where does he live, what is his home’s security like? In most cases we do personal assessment on the MD’s home as well. We look at the vulnerabilities of himself as well as his family because his family can be used against him by criminals to force him to change his mind in certain situations. We make sure that the MD is safe on all levels and various other aspects.

Level 8 – Security plan

On this level we take all existing information from the assessment into consideration and discuss options with manufacturers and or importers. We also consider the living environment and then produce a security plan, which put you in control of your security.

Level 9 – Ongoing research, as and when needed

We do ongoing research for a company with whom we have a retainer contract. That means that we are basically that company’s security office. So for the remainder of the contract we do continuous assessments of various aspects of their security and hence the ongoing research is done. In this level it is an on-going process.

1. A full security risk assessment (on-going).

2. A security plan (on-going).

3. Ongoing security research (products and threats).

4. Ongoing risk management advice to decision makers at board to accommodate changing scenarios.

5. Monthly meetings with security companies.

6. Security service levels.

7. Security standard operating procedure.

8. Annual or bi-annual security surveys/audits.

9. SAPS communication.

10. Security workshops.

11. Investigations.

12. Request quotations (RFQ) applicable from security service providers on behalf of client.

13. Advice on hiring and appointing of contractors.

14. Monthly security management reports.

For more information contact Alwinco, +27 (0)71 319 4735, [email protected], www.alwinco.co.za

This is the second article in the series from Alwinco discussing the various aspects of a comprehensive risk assessment.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Boost revenue streams for MNOS
News & Events Security Services & Risk Management Financial (Industry)
ReveNet has introduced its new solution, designed to safeguard and potentially boost revenue streams in an increasingly challenging landscape for MNOS. The new platform combines advanced analytics and is built on trust, transparency, and sustainability principles.

Read more...
Risk-IO manages mining security risks
Security Services & Risk Management Mining (Industry)
[Sponsored] A local mining company with three large operations experienced increased security costs. The liability included no standardised risk assessment, poor management of the efforts to mitigate hazards, and unauthorised access with subsequent theft. The reactive approach to security was not only expensive but also wasteful in the sense that the costs were poorly managed, and there were no metrics to show improvement or trends in incidents.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
SA company develops world-first safe K9 training for drug detection
Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...
Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
New data privacy trends increase large cyber claims
Security Services & Risk Management News & Events
Frequency and value of sizeable cyber insurance claims up 14% and 17% year-on-year in the first half of 2024, with a growing trend in the US for litigation against large corporations related to privacy violations.

Read more...
Streamlining and securing enterprise risk management
Security Services & Risk Management
[Sponsored] A new enterprise risk management web app from Zulu Consulting, called Risk-IO, is designed to automate and streamline the enterprise risk management process, ensuring no steps are skipped and everything is securely documented.

Read more...