Security auditing of buildings and assets is ideally a process used by law-enforcement agencies and other security professionals to essentially assess and proactively identify vulnerabilities and threats that could compromise the security of assets.
Information technology (IT) technologists and auditors also utilise identical methods to protect information systems, and evaluate safety measures and practices that secure the organisation’s data.
It is all about asking, “Where could we be exposed?” and “How can we do better?” It is, in fact, a comprehensive review of your property’s existing security measures, policies and procedures.
Each approach has its benefits and drawbacks, and the right approach for any particular organisation depends on their peculiar environment and objectives for carrying out the security audit. Such involves assessing key strengths, concerns and risk areas.
The purpose is to offer a plan of action aimed at improving the needed overall safety and security procedures, and to reduce the risk of harm to the institution, its personnel, and clients alike.
Surprisingly, many Namibian organisations have no security audit policies and procedures in place, thus highlighting the challenges they are facing in combating the risks and menaces of crimes on their properties and systems.
The intricacies of managing security audits require expertise and budgets for maintenance, and that is precisely why many organisations fail a robust test when it comes to managing and enforcing aspects of security audits in their corporations and entities. This leads to getting into trouble with compliance matters. The latest incidents of data breach at Telecom Namibia and the security breach at Namdia in Windhoek, and the queer nature of death as a consequence of aggravating circumstances of the heist (robbery) of diamonds reportedly worth N$1 billion, are fresh in our minds. Security breaches have also been reported in the private sector, with the banks stealing the headlines.
These breaches left citizens tongue-lashing the institutions because of the perceived laxity in their security systems.
It must be stated that many institutions and organisations constantly strive to proactively manage the security of their assets, including information and data, and to manage their audits cost-effectively.
Some go to the extent themselves strenuously to put adequate security measures in place at their workplaces.
But alas, much leaves to be desired nonetheless.
The audit process involves a thorough review of the physical environment, access controls and security protocols in operation. By following various systematic approaches, organisations can proactively address vulnerabilities, enhance their defences and protect their buildings, properties, assets and systems from potential threats.
Another dilemma is the recruitment, training, and hiring of qualified security personnel in an organisation. It is indeed a very expensive exercise. As institutions or companies grow, management costs associated with the employment of the necessary IT specialists, and deployments and scheduling of security personnel and guards, continue to impact their payrolls significantly. For, the personnel required must be highly-trained professionals, or have promising potential in their fields or specialisation, for instance, IT technologists and officers in crime deterrence. Ensuring that the relevant employees possess the necessary certifications and licences is necessary.
They must be effective in technical and tactical communication to respond to threats and criminal acts, and must remain at the cutting-edge of their specialisation. But assessing, finding, training and retaining qualified staff is a challenge. From many incidences, we have learned too late that those who get employed probably would not (have) pass(ed) the rigorous tests of good character for employment.
Nonetheless, institutions or organisations must prioritise risk management, and conduct regular reviews, inspections, surprise visits and checks at each worksite.
These practices help to identify potential hazards. Having secure and safe premises – virtually and physically – is essential. That is the reason why hiring qualified, honest, and loyal security guards is an effective way to provide committed protection to your entity and community.
With growing crime rates essentially everywhere, organisations need to ensure the safety and integrity of their assets, operations, and employees at all times. It is also advisable to consider implementing digital solutions to automate check-ins and check-outs and to maintain current databases.
Security risk assessment
Security risk assessment helps organisations identify, analyse and implement security control in the workplace. It prevents vulnerabilities from threats wanting to infiltrate the organisation, and protects physical and informational assets from unauthorised users.
Such threats may also render the property susceptible to data breaches, vandalism, theft, burglaries, robberies and other crimes.
In addition, the process involves security professionals identifying assets and prioritising security investment to ensure that the most valuable assets, and other assets, are protected. This process starts with the asset identification and recording, and then examination of the major threats to these assets.
This process also involves cost-benefit analysis to determine how much security technology one may require, and to create a security plan that may fit the budget and ensure that the assets are properly protected.
Hence, a proper security system is put in place in organisations, tailor-made to unique requirements. Once the high-risk areas of the identified properties are determined, as well as the weaknesses in the security systems, the upgrading of the security system commences.
It starts with installation of live security video monitoring, with cameras in specific areas of the environment, helping to capture any unwanted incidents on cameras. Videos can be recorded and viewed later, helping to ensure that criminal activities and movements are recorded, resulting in arrests with proper evidence.
Beyond video monitoring systems there are also alarm systems, panic buttons, and coded access control systems that limit access to the property or building, ensuring that only approved individuals have access to the identified property.
One of the added benefits of technological devices is that their presence helps to deter criminals from targeting the identified property or asset.
For high-risk areas and properties that have a history of being robbed or vandalised, or suspected to be targets of criminal enterprises, professional security guards and highly-trained mobile patrol units and readied response teams are essential. All these security measures and technological solutions play a crucial role in identifying and preventing risks and provide a comprehensive security baseline that goes beyond general crime prevention tactics.
In summary, a security-first culture is critical and should be adopted in all organisations and institutions. No matter the size of the industry. Whether you are in charge of a small business, a large corporation, or a public institution, keeping your property, data, assets, and people safe must be on top of your priority list, right now.
Also, security officers come from different backgrounds, just like your favourite pair of shoes. The kind you need plus rigorous vetting depends on where you work. So, what is your workplace like? And, that is the first step in getting the right security officers.
Namdia is a cutting-edge diamond marketing and sales State company. It is a “Strategic State Asset”.
It is, therefore, a plausible argument that, for now, the entire security system of Namdia should be incorporated into the specialised command structure of the Namibian Police, who have the capabilities and means to effectively manage those complicated special operations.
*Maj. Gen. (Rtd) J. B Tjivikua is a Criminal Intelligence Analyst

