top of page
Optic Security Group

Investing in Your Security: Why the ‘soft’ costs of security systems can hit hard

Writer's picture: Optic Security GroupOptic Security Group

In this third in our five part series of articles on investing in security systems, we look at the not-so-quantifiable ‘soft’ cost factors that you should consider when assessing Total Cost of Ownership (TCO).


In our previous article we looked at the ‘hard’ dollar costs of TCO. In this article, we introduce the difficult to quantify but no less critical ‘soft’ costs – the potential costs incurred by an organisation as a consequence of security system downtime or failure. Calculating TCO is by no means an exact science, but it’s an important one.


In addition to the hard costs there exist a host of other potential costs that are by their nature difficult to account for. These are the so-called ‘soft’ operating costs associated with system failure, downtime and repair, unanticipated inefficiencies, and early obsolescence, which are the downstream consequences of poor product selection, substandard maintenance, inadequate asset management practices, and neglect.


It’s a little ironic, as ‘soft costs’ is something of a misnomer – the more critical security is to your organisation, the more vulnerable it is to the soft costs of things going wrong. Despite being incredibly difficult to quantify, these costs can pose significant financial and disruption downsides to an organisation.


Examples of soft costs generally include the potential costs incurred as a consequence of system downtime/failure, such as asset losses (due to a system’s failure to prevent a security breach), lost productivity, additional personnel costs (such as temporary security guarding), and business disruption. Other hidden costs may include damage to staff morale, administrative – and potentially litigation – costs stemming from contractual or performance issues, and reputational damage.


While they’re difficult to quantify, the risk of incurring potential soft costs can be mitigated. Adhering to robust solution selection and procurement practices, working with reputable security partners and suppliers of quality components and solutions, strong supply chain and asset management, and proactive maintenance practices can all play a role in minimising potential soft costs.


“When calculating TCO, it’s imperative that you account not only for the anticipated hard costs but also for the extent to which a solution exposes your organisation to potential soft costs,” says Mark Lloyd. “This is essentially an exercise in downstream risk management.”


The following is our shortlist of ‘soft’ cost factors placed into corresponding categories:




Loss & Damage Costs are easy enough to account for after a breach, but the costs of potential future breaches are notoriously difficult to model (jump to the next article in this series for some ideas). Needless to say, any loss from a breach made possible due to security system failure (as opposed to a breach that occurs despite the existence of a well-operating system) is a loss that a Board or executive team really should be making the right decisions to avoid.


Disruption Costs are the consequential organisational costs that flow from a security breach, any loss of productivity and staff morale, as well as the cost of any additional work created by the failure, such as additional administrative or contract management resourcing.


The cost factor category in the above table that you may have been surprised to see is Opportunity Costs. In terms of a security system solution, opportunity cost is the unrealised value you would have derived from an alternative security solution if you hadn’t selected the one you did. It’s what you missed out on in order to get what you got.


Opportunity costs may include any unrealised value – from the financial savings you would have gained from a comparatively efficient alternative solution to the customers you would have retained if you had selected a more effective alternative solution capable of protecting you from a reputationally damaging breach.

UCLA Associate Professor of Marketing and Behavioural Decision-Making - Stephen Spiller

According to UCLA Associate Professor of Marketing and Behavioural Decision-Making Stephen Spiller, “consumers should incorporate opportunity costs into every decision they make, yet behavioural research suggests that consumers consider them rarely, if at all.” Economists refer to this as ‘opportunity cost neglect’.


Opportunity cost neglect is essentially the act of making a bad purchase choice as a result of failing to consider the alternatives – a big (and often cited) procurement risk. The obvious mitigation to this risk is to ensure your procurement team actively considers multiple distinct alternative solutions (including their TCOs) as part of its approach to the market.


“Procurement processes are a golden opportunity to meaningfully survey the range of solutions that are out there,” says Mark Lloyd, “but all too often purchasing decisions are driven by professional biases, conventional wisdom and, quite frankly, a failure to link security system requirements with emerging technology trends, future security needs, and the strategic goals of the organisation beyond security.”


In our next article in this series, we’ll explore the Return on Investment (ROI) factors that can not only mitigate the cost impost of a security solution but also turn it into a business value-add. A high-performing security system that pays its way by preventing loss and harm from security breaches and also achieves business outcomes beyond its primary security remit – and does so while remaining adaptable to new technologies and emerging threats – can deliver significant value to an organisation.


In the meantime, if you’d like to find out more about how Optic Security Group can manage your security risks through solutions that tick the TCO box, please get in touch with us.

Optic Security Group

Your security risks. Converged. Managed. Solved.

ISO _45001_14001_2015_9001 & Optic Security Group
  • Optic Security Group LinkedIn

Optic Security Group (AUS) Head Office

34/203 Rooks Road 

Vermont, VIC 3133

Phone (Toll Free): 1300 72 98 72

Australia@opticsecuritygroup.com

Optic Security Group (Auckland)

14 Amelia Earhart Avenue

Airport Oaks, New Zealand, 2022

General: nz@opticsecuritygroup.com

Service: service@opticsecuritygroup.com

Phone: +64 9 950 9990

After Hours: 0800 405 040

Optic Digital

222 Lambton Quay

Wellington, New Zealand, 6011

sales@opticdigital.com

Phone: 0800 126 676

sales@opticdigital.com

Optic Security Group acknowledge the Aboriginal and Torres Strait Islander peoples as First Peoples of Australia, and Māori as tangata whenua and Treaty of Waitangi partners in Aotearoa-New Zealand.

Security Advisory

 

Be vigilant. There has been an increase in reports of false billing scams. If you have received an email with an invoice purporting to be from us, call your Optic Security Group contact person to confirm if it is legitimate. The Australian Competition and Consumer Commission’s National Anti-Scam Centre has reported a 25% increase in losses incurred by Australians from false billing scams in the July-September 2023 quarter compared to the same period last year. This is despite an overall 16% decrease in losses across scam categories.

 

Payment redirection scams are the most prevalent type of false billing scams. These involve scammers impersonating a business or its employees via email and requesting that money, which usually is owed to the legitimate business, is paid into a fraudulent account. For further information, visit the National Anti-Scam Centre website at https://www.scamwatch.gov.au/.   

 

Optic Security Group will never advise a change of bank details via email. If you have received an email with an invoice purporting to be from us, call your Optic Security Group contact to confirm if it is legitimate.

© 2024 by Optic Security Group

bottom of page