Different types of assessments

Imagine this:
In South Africa, nearly 35% of businesses face a physical security breach each year, an unsettling statistic that demands our attention! Welcome to a deep dive into the world of physical security risk assessments. With over two decades of experience in independent security risk assessments, I’ve witnessed firsthand how each property tells its own unique story of vulnerability. Today, I invite you to explore a range of assessments designed to pinpoint and neutralize security risks before they escalate into criminal acts.
The security risk assessments we conduct cover all of South Africa and apply to every type of property.

 

image_2024_11_22T18_19_54_506Z by security risk assessment . security risk assessment

The Different Types of Security Risk Assessments Alwinco Offers

First, I would like to clarify what most people and companies receive and often mistake for a genuine independent security risk assessment. Many confuse product assessments with security risk assessments, but the two are entirely different.

Product assessments are typically conducted by service providers who sell, install, and maintain security equipment. Because the same company handles both the assessment and the sale, there is a clear conflict of interest. Their focus is not on identifying real risks but on promoting specific products.

These assessments are often offered for free or at a very low cost because the provider expects the client to purchase the recommended hardware. What appears to be a cost-saving measure is actually a sales tactic. The document you receive is not an independent security risk assessment but a product-focused sales proposal that overlooks risks beyond the equipment they sell.

At Alwinco, we do not sell, install, or maintain any security products, nor do we offer guarding services.

We have no affiliations with brands or providers. Our work is completely independent and focused solely on identifying real security risks without any commercial bias. We believe solutions cannot be recommended until all risks are fully identified, understood, and verified.

In South Africa, security risk assessments are also known as vulnerability assessments, threat assessments, security inspections, or security analyses. Though the names vary, they all describe the same process: investigating the physical security risks to a property or individual by examining threats, vulnerabilities, and the environment.

A proper independent security risk assessment is much more than a brief look at locks, cameras, or fences. An Independent security risk assessment is a thorough investigation designed to uncover hidden and overlooked security risks. Many of these risks are missed in assessments conducted by service providers, because their focus is limited to selling products, not understanding the full context of the risk.

In this article, we will explore the different types of security risk assessments, where and how they apply, and why independence is essential in every case. Security cannot be built on assumptions or sales pitches. It must be based on facts, verified risks, and a clear understanding of the real threats you face.

  1. Independent Security Risk Assessment

This is a thorough investigation into the potential threats and vulnerabilities at a property. The focus is to identify opportunities criminals might exploit, whether through theft, vandalism, trespassing, or other crimes. This goes beyond listing visible security features. It’s about understanding how and why your environment is at risk.

The goal is to uncover all possible risks, see how they could be exploited, and suggest ways to mitigate them. This includes looking at how the property is used, who has access, daily routines, and other factors affecting security. A good assessment reduces opportunity and closes gaps.

Independence is key. When someone without ties to product sales or installations conducts the security risk assessment, the findings are objective and fact-based. At Alwinco, we believe that without independence, there is no security risk assessment, just a sales pitch dressed up as advice.

  1. The A-Assessment (Proactive)

The A-Assessment is a proactive security risk assessment. It thoroughly and independently investigates all potential risks on a property. Each risk is explained in detail why it exists and multiple ways to address it. There is no one-size-fits-all solution because every property is unique.

This proactive security risk assessment helps you see the bigger picture by showing how all your security measures connect and work together. Real security isn’t about isolated tools or one-off actions; it’s about creating a system where every part supports the other. A single weakness can undo even the strongest defenses.

The A-Assessment gives you a clear starting point. It guides property owners in strengthening what they already have while also preparing for what lies ahead. Because it is fully independent, the recommendations are based solely on real risks, not on sales targets or outside agendas.

The Security Risk Assessment Report

This report is focused on one thing: uncovering security risks. There is no marketing, no push to buy equipment, and no hidden motives. It is a clear, honest examination of your current security situation. This is not a quick checklist or surface-level inspection. It is an in-depth process that includes investigation, structured questioning, and detailed analysis to stay ahead of potential threats.

Modern risks demand modern thinking. Today’s security must include new realities, such as the rise of artificial intelligence. The assessment looks at where AI can be an advantage, where it can introduce vulnerabilities, and how it should be approached thoughtfully.

Security also depends on what many overlook: how people communicate and how evidence is handled. These softer areas can have just as much impact as physical barriers. That is why the report goes beyond locks and alarms, ensuring your entire approach is effective, practical, and prepared for real-world crime.

  1. Personal Risk Assessment

Also called a profile assessment, this looks closely at an individual’s background, usually for senior roles like CEOs, Directors and Executives (people in high positions). It’s done with full consent and aims to identify risks the person might pose to an organization, property, or family.

This is especially useful when someone new joins a sensitive or high-trust environment. It helps reveal anything that could affect security or reputation. Though mostly used in corporate settings, it also applies to private situations. On a lighter note, I’ve even done one for someone marrying into a wealthy family.

This type of assessment is not about passing judgement and pointing fingers. It is a proactive and responsible step toward creating a safer environment and building trust, both at work and at home.

  1. Home Security Risk Assessment

    Designed specifically for residential properties, this assessment addresses the unique security needs of families and their homes. With this type of assessment, we examine all areas in detail, including critical aspects such as safe rooms and driveway security, which are often overlooked in general assessments.

Your home is your sanctuary, and safeguarding it requires more than basic measures. It calls for a thorough understanding of potential risks and the right strategies to prevent them.

  1. Residential Estate Security Risk Assessment

This hybrid assessment focuses about 20 percent on residential activities and 80 percent on business-related security. Even with cameras, guards, and access controls, many estates suffer from a false sense of security.

It’s important to review your estate’s security risk assessment carefully. Many setups give the illusion of safety while missing real security risks. An independent security risk assessment identifies these opportunities and helps build a stronger, more reliable security system.

  1. Business Security Risk Assessment

This assessment is designed for commercial properties. It identifies risks that could disrupt operations or lead to crime. Some areas covered include standard operating procedures, security communication, management, data mining, emergency access, parking, and basements.

Businesses usually have two access controls: one for employees and one for visitors or contractors. This type of assessment reviews both to ensure they don’t create security risks.

  1. Travel Risk Assessment

This assessment focuses on risks encountered while traveling between home and work. It is especially important for high-risk individuals such as CEOs, executives, or other VIPs who may be targets for kidnapping, assassination, or other attacks.

We assess all possible routes, timing, and opportunities for crime during the journey. Since travel is often the most vulnerable part of the day, understanding these risks allows protective measures to keep travel safe.

  1. Assassination Security Risk Assessment

This detailed assessment targets VIPs and covers three main areas: home, travel, and business risks. By combining these, it provides a full picture of the VIP’s security landscape.

It goes beyond direct threats to life, also addressing risks like kidnapping or any situation that might make the VIP feel unsafe. Every potential danger, no matter how small, is treated with the seriousness of an assassination threat. This ensures all parts of their personal and professional life are protected.

  1. Whistleblower Assassination Risk Assessment

A whistleblower assessment is a specialized type of assassination risk assessment, reflecting the extreme dangers whistleblowers face. Whistleblowers expose misconduct or corruption, often at great personal risk.

In South Africa, protection systems are flawed, and many whistleblowers, and sometimes their families, are killed after speaking out. This makes each case extremely serious.

This assessment looks at risks to the individual, their family, and associates. It carefully examines every threat to create strategies that keep those who speak out safe from retaliation.

VIP Definition for the purpose of security risk assessment.

In security risk assessments, VIPs include CEOs, Directors, Executives, board members, secretaries or Personal Assistants to the VIP, accounting staff, IT professionals, security and operations managers, and their families, including children. Understanding their unique risks helps tailor assessments that protect assets, secure property, and prevent crime.

Taking these steps through thorough assessments moves South Africa toward a safer future, one assessment at a time.

  1. School Security Risk Assessment

Although schools worldwide prioritize security, South Africa often overlooks it. Schools face threats like kidnapping, drugs, and outside influences affecting students.

This assessment covers access control, parking, perimeter protection, and the safety of students and staff. It applies to all educational institutions, including colleges and universities. The goal is to create safer environments where students can learn without fear.

  1. Farm Security Risk Assessment

Security on South African farms is often ignored due to cost concerns and stubbornness. But protecting your farm doesn’t always require big spending. It starts with understanding specific risks and applying smart, affordable solutions.

This assessment identifies vulnerabilities unique to farms, including access points, livestock safety, worker protection, and storage. Practical, tailored measures help safeguard property without overspending.

  1. 70-30 Security Risk Assessment

This follow-up assessment checks whether previously identified risks have been fixed and ensures no new vulnerabilities have appeared.

Seventy percent focuses on documentation, management, and standard operating procedures, while thirty percent examines physical and operational security. This balance keeps both administrative and physical controls effective.

  1. Incident Assessment

An Incident Assessment investigates a specific security event to find out what happened, why, and how to stop it from happening again. It reviews reports from clients and providers and examines protocols for weaknesses.

Independence is essential. An assessor with no ties to clients, security firms, or product suppliers ensures unbiased, risk-based solutions. You cannot be both referee and player in the same game.

  1. The B-Assessment (Reactive)

The B-Assessment takes place after a crime. Unlike proactive assessments, it responds to an event. Usually, a victim’s family or legal team requests it.

The goal is to find if security failures contributed to the crime and identify those responsible. It clarifies what went wrong and helps prevent repeats.

  1. Supplier Risk Assessment

A Supplier Risk Assessment verifies a supplier’s legitimacy, operations, and ability to fulfill contracts. It digs deeper than paperwork, checking skills, compliance, contracts, and even physical presence.

Many suppliers look good on paper but fail in practice. Independent vetting is crucial. Clients use these assessments to avoid costly mistakes when choosing suppliers for tenders or quotes.

This overview explains the key types of assessments Alwinco offers. Each serves a specific purpose, but all share one critical factor: independence. True security comes from understanding real risks, not from sales pitches or assumptions. With the right assessment, you gain the knowledge to protect what matters most.

Click here to read more about the supplier risk assessment.

Written by Andre Mundell. # security risk assessment  #Whistleblower #Assassination

Should you wish to learn more about our services offered or want more information on security risk assessments, please send us an email or kindly visit our website security meetings and subscribe to our Newsletter.

Alwinco conducts Security Risk Assessments all over South Africa. We have a very strong footprint in Gauteng (Pretoria, Johannesburg, Midrand, Sandton, and Centurion). Bloemfontein, Durban, and Cape Town

Independence Assessor vs Third party assessment

Share this on social media:
Facebook
Twitter
LinkedIn
Telegram
WhatsApp
Email

Written by Andre Mundell

Website Index

Scroll to Top