An offer to assess a property has become a mere “money making tool” for Security Companies, vendors and installers. This sort of assessment is not a full Security Risk Assessment but actually a Product Assessment. Solutions are determined according to the assessor’s inventory as the main purpose is to get the end-user to purchase various security items or to sign up for security services. The assessor is, in this case, simply a salesman justifying why his products need to be purchased to fix your security problems. This is why such an assessment is done free of charge or offered at a very low rate.
The downside here is that often a weakness in your security that cannot be remedied by an item in the salesman’s stock could be ignored and never brought to your attention. The salesman can only fix what he can provide for and therefore his knowledge and role as an advisor is somewhat limited. Many have found themselves in the unfortunate position of spending thousands on their security and systems, only to still fall victim of a crime.
The independent Security Risk Assessor on the other hand will ensure that you are provided with the truth concerning your security status. Consequent recommendations and the individually tailored Security Plan are based only on the outcome of an extensive Security Audit and on functionality of the hardware suggested. The role of this assessor is purely advisory and all fixes to your security problems are generic and unbiased, meaning the final choice lies in your hands. You will be in full control of your security and be able to tell the Security Company exactly what you want instead of sitting back and allowing him to decide for you.
An integral part of the responsibilities of the independent Security Risk Consultant is continuous and in-depth research covering the latest releases, technological advances, crime trends and all other pertinent information regarding the trade of security. Should the assessor find that he may not have the answer to a specific problem as revealed by the initial inspection of the property, he will not hesitate to make use of an expert who can provide specialised and expert advice concerning a specific security field. Furthermore any additional costs incurred in the buying in of a specialist is covered by the advisor with no extra charge to the client. The independent Security Risk Consultant goes to great lengths to ensure that you receive the best possible advice and an honest and professional perspective regarding your security.
Too many businesses have neglected to fully consider security due to the fact that that nothing has happened, yet. Security is seen as an unnecessary expenditure and is usually the first to go when the budget is reviewed. IT security is often viewed as much more important and thousands upon thousands are spend by companies to protect their valuable data and the details of their clientele from hackers or fraudsters. What does this help if your server and all your workstations are stolen due to the fact that your physical security is not up to par or may have been neglected?
By having a Security Risk Assessment commissioned, company management will be provided with the means in which to better plan budget in regards to security. Spending becomes more stabilised and the Security Plan allows for solutions to be implemented in phases over time. Unnecessary costs incurred by ineffective security measures and failures will be eliminated from the get-go. The assessment report further provides the means in which to measure security and makes this concept communicable. In this case the Security Threat Assessment report becomes an invaluable tool to the Security Manager.
The investigation and analysis of the security status does not only involve the actual physical structure of the site, security hardware or procedures that are in place but also considers the ‘human element’ which is often overlooked by other assessors. The attitude and actions of the employees can affect the status of the company’s security greatly. With the correct training in regards to Security Awareness and a conscious mindset of the accepted responsibility of security by the employees the status of security will be all the more stronger and will allow for crime to be proactively and effectively prevented before an incident occurs.
The key to security is not what equipment you may make use of to protect your business or even the Security Officer at the gate, but the actual control thereof. This includes good management and planning. The Security Risk Assessment provides a strong, solid foundation on which to build your security both in the present and into future. Solutions are purely based on the outcome of the investigation and specifically tailored and thoroughly researched to provide your company with a unique and workable security fit.
Recently it came to our attention that the US has begun to make it legislation that the Security Threat Assessment is required before any security installations and upgrades can be sanctioned and put into action. In fact, this is the correct manner and best approach in which security should be addressed as the Security Risk Assessment report will reveal all vulnerabilities and weaknesses within your security status. Once these potential risks and threats have been positively identified and you aware of them and understand them, the necessary steps can be taken to deal with them appropriately and grant elimination. This is the first step in taking control of your security.
In an ideal world, the Security Risk Assessment should actually be conducted in the initial planning phases and development of a raw site or property. Security would be considered in the architectural design of the structure before construction even commences. All too often many issues in regards to security are actually created simply because a building, an entrance, a door or a gate have just been built wrong. Additional costs are then procured in the future in an attempt to remedy the situation.
Often security is only considered after it is too late and an incident or crime has already occurred. Companies and businesses then allocate huge amounts of money to the problem to either alleviate it temporarily or to have it replaced by a new one, which in turn results in even more over expenditure. By having your Security Threat Assessment report in hand, you will be able to stabilise such spending as better budget planning is immediately achievable. The independent assessor will provide you with the best advice that has been extensively researched for your unique security situation. All recommendations are generic and focused on functionality as there is no affiliation to any specific brand, product or installation service. In the event that a solution contains a specific hardware or software item, this is purely due to the fact that our studies have indicated this to be the best and most workable option for you. All benefits and shortcomings will be clearly pointed out and explained to ensure that you have the most knowledge available to you in assist in good decision making regarding your security.
Furthermore the solutions provided in the Security Plan are solely based on the outcome and findings as revealed within the extensive investigation phase of the assessment. Security is definitely not guesswork or even a quick and easy checklist to determine risk. Nothing can be predetermined and the examination of yours security is done in a variety of levels that are analysed individually, in more than one state and then reviewed as a whole. Too many factors affect others which could adversely result in a negative impact of your overall security status. Moreover, this does not only involve the physical aspect of your security such as hardware and structural layout, but extends over other elements that are often overlooked. This is then followed by in-depth, ongoing and active research before the Security Plan may even be formulated.
When we are commissioned to conduct a full Threat & Security Risk Assessment on a property for a client, we ensure that we present them with a full, honest and accurate overview of their security status. All weaknesses and vulnerabilities present that create an opportunity for a crime to occur are positively identified and explained it full. A comprehensive Security Plan is then derived upon these findings and various solutions that are extensively researched to remedy the problem areas are supplied. Due to the fact that the rollout of such projects are usually large and consist of various factors, these solutions are provided in such a manner so that they can occur over a period of time. This in turn also assists in better budget planning for necessary upgrades and relevant installations.
All this information needs to be kept highly classified as divulgence of any part will increase the risk and can be used by organised criminals to plan their attack. Before the commencement of the assessment, we as the assessing party will ensure that these documents are in place and signed as we take the matter of confidentiality very seriously. The identity of our clients and the details of the Security Risk Assessment are never shared or revealed to anyone, even for self promotional purposes.
When conducting research into the best security solutions for each individual Security Risk Assessment, it is often required that we consult 3rd parties or experts within various fields of the security realm for more information and advice. Any additional costs that this may incur are covered fully by us and will not affect the initial pricing structure in the proposal as accepted and agreed upon by our clients. Before any details are provided for such recommendations, these external parties must also sign the necessary nondisclosure documents.
Although we do our utmost to protect this valuable information on behalf of our clients and consequently our reputation, the client must realise that this is actually a shared, joint responsibility. In the past we have found that some corporate entities have published their Security Threat Assessments (in full or in part) online and some have even revealed which solutions have been implemented and which still need to occur. The latter clearly indicates which problem areas have not been rectified and since these details could be considered as public domain once published, it therefore accessable to anyone with access to a computer or a smart device. Through the clever usage of keywords typed into a search engine, this can be obtained by any criminal and used to his / her advantage. Attack points can be planned as the vulnerabilities are clearly evident and have been literally handed to the lawbreaker on a silver platter.
Our approach in regards to crime and security is vastly different from the norm and scores of other companies strongly oppose the manner in which we conduct our Security Risk Assessment, as it directly contradicts their own and is ultimately proven to be very much more accurate in the long run. Although disagreement can be healthy and opens one’s mind to new things if a diverse idea is equally and duly considered, too many individuals are so set in their ways to even give proper thought to change. It can be presumed that this is a South African trait perhaps, as it appears rather very common and widespread. This is actually unfortunate as security and crime prevention needs to evolve due to the fact that the criminals do so with ease and using old technology or out-dated ideas will no longer suffice. An everyday misconception is that criminals are unintelligent but this is very much off the mark and totally unrealistic.
All too often we have found that when we supply a proposal to a corporate or governmental entity, the company policy requires that 3 quotations be requested before any decisions can be made. This practice could be deemed as very fair in any other field, but not that of security consultancy and risk analysis. In this case such a task can be deemed as impossible. At this stage there are simply no other companies who conduct an independent Security Risk Assessment like we do and those that offer such a service, usually at a much cheaper rate or even for free, are actually providing the client with a Product Assessment. The extra quotes received will not provide the same results as an independent. Regretfully this is only realised too late and after various upgrades and installations have been already completed and paid for.
The problem here is that solutions are usually predetermined. Security cannot be based on guesswork either. The Security Plan and recommendations for security answers can only be developed and be founded upon the findings as revealed by an extensive and in-depth investigation of the security system. All threats and vulnerabilities need to be positively identified, explained in detail and fully understood. A lot of research and sometimes the services of a 3rd party who is a highly trained expert in a specific security area are necessary before the problems within your security can be resolved and advised upon accordingly. Should such specialists be required to be consulted with, we cover all additional costs procured and the initial proposal as presented to our clients is in no way affected.
Furthermore, when considering security, the general consensus is this is just hardware such as an alarm or a CCTV system. No, another myth as there are other elements that are nonphysical that need to be thoroughly examined to gain an accurate overview of one’s overall security status. This is applicable to both the home and any type of business. Product assessments or those based on a point system, have proved to be incorrect in our experience as not all these extenuating factors are reflected on or viewed as an entirety along with the physical elements. Most of these elements are actually not even acknowledged at all. A risk remains a risk and cannot be graded. To ensure that your security status is truthfully analysed and that the recommendations provided are unbiased and based on functionality, it is in your favour to strongly consider a professional and independent assessor.
Daily we make use of analogies when explaining security and the Security Risk Assessment as this seems to aid in understanding. One such successful analogy is comparing this to the unique and complex game of 3 Man Chess or Triad chess. Traditionally chess involves a player having to defend his pawns from attack from one singular opponent. If logic and strategy are correctly applied and you are able to predict the moves of the other player, you will win the game. But when playing 3 Man Chess, the chances that a strike will be unexpected are all the greater because there is more than one unknown against you now. The third participant adds a new dimension to this already complicated game as several new unanticipated and open-ended intricacies are now possible.
This can be directly compared to dealing with the criminal who makes a volatile adversary, especially when he is determined and prepared. Furthermore he is actively involved in the crime game and will not be passive in his action. As crime is an unknown territory to us as ‘normal’ citizens, our ability to forecast our opponents’ next move is hindered and rage, mental instability, alcohol or military planning on the behalf of such individuals or groups, but to name a few determining factors, makes it even more likely that our predictions will not be accurate and therefore, our defenses ineffective. Without the correct insight our attempts at crime prevention will prove inane and in the case of the groups that have planned their attacked, all possible defense will be prepared for and counterattacked upon accordingly.
Most security systems fail in their purpose as there are simply not enough contingencies built into the original design to handle all these new variables. The element of surprise and the lack of effective planning by those the criminals intend to target; are used by them to their utmost advantage. This can very often be blamed directly on the Security Risk Assessment that has been conducted incorrectly. The findings and conclusion of the assessment can be inaccurate when the assessor has not carefully considered all extenuating factors or a point system was used and the outcome is actually more subjective as risk cannot be predefined into a low-to-high rating.
In this sense, the independent Security Risk Consultant is a “chess guru”. Years of experience and the ability to conduct reverse crime engineering when examining all the variables and influential factors of a property, provide the assessor the means to accurately determine and consequently the deflection of the variety of moves his opponents may make next, and into the future, even if there is now more than one challenger involved in this high stake game of crime.