Alert security guard in uniform scanning surroundings outside a building, highlighting visible deterrence and common vulnerabilities criminals look for

Here’s a question most business owners never ask themselves: What would a criminal notice about my property?

Not because they’re paranoid. Because understanding criminal decision-making is the first step toward effective prevention.

Criminals are rational. They evaluate targets. They look for signs that a property is vulnerable and that they can operate without getting caught. And most businesses overlook some of the most important vulnerabilities—including one that property owners consistently ignore.

Most businesses overlook these risks until a real incident happens. By then, it’s too late.

At Secure Guard Security Services, we’ve spent 20 years helping California businesses understand what criminals look for—and how to close those gaps. Here’s what your property might be telling potential threats, and how to change the conversation.


How Criminals Choose Targets

Before breaking down specific vulnerabilities, it’s important to understand criminal decision-making.

Criminals operate on a simple calculation: risk versus reward.

  • Reward: What can they gain? Cash, electronics, copper, inventory, tools?
  • Risk: What’s the chance they’ll get caught, identified, or confronted?

A property that appears to have low risk and high reward is a target. A property that appears to have high risk (even if the reward is attractive) is often passed over.

This is why visible security presence is so effective. It doesn’t just respond to crime—it changes the criminal’s calculation before they act.

According to the National Crime Prevention Council , properties with visible security measures are significantly less likely to be targeted than those without.


Vulnerability #1: Lack of Visible Security Presence

The most fundamental thing criminals look for is absence.

No security guard at the entrance. No patrol vehicle in the parking lot. No signs indicating the property is monitored. No one watching.

What criminals see: A low-risk opportunity. They can enter, take what they want, and leave without anyone noticing or intervening.

Why businesses overlook this: Some property owners believe that cameras alone are sufficient. Others assume that because nothing has happened yet, nothing will happen. Still others view security as an expense to minimize rather than an investment in protection.

The reality: Cameras record crime; they don’t prevent it. A criminal willing to wear a hoodie and mask doesn’t care about cameras. But a uniformed guard? That’s a different calculation entirely.

How to fix it:

  • Maintain visible, uniformed armed and unarmed security presence during operating hours and after-hours
  • Use mobile patrol vehicles that actively circulate, not just park in one spot
  • Ensure signage clearly indicates the property is under security surveillance
  • Vary patrol patterns so criminals can’t predict guard movements

Learn more about effective deterrence in our post on security guard patrol techniques .


Vulnerability #2: Poorly Secured Entry Points

The second thing criminals evaluate: How easy is it to get in?

Every property has multiple potential entry points: front doors, back doors, loading docks, windows, roof accesses, gates. Each is a potential vulnerability.

What criminals look for:

  • Doors that don’t latch properly
  • Locks that are old, damaged, or easily bypassed
  • Windows that can be forced open
  • Gates that don’t close completely
  • Loading docks with after-hours access
  • Rooftop ladders or stairs that anyone can climb

Why businesses overlook this: Many property owners assume that because a door is locked, it’s secure. But a lock that doesn’t fully engage or a door that’s propped open “just for a minute” creates an opportunity.

Real-world impact: Unsecured entry points are a leading factor in commercial burglaries. The San Diego Police Department notes that many commercial burglaries involve entry through doors or windows that were simply left unsecured—not forced.

How to fix it:

  • Conduct regular security guard safety checks to verify all entry points are secure
  • Implement access control systems that log entries and alert to doors left open
  • Train employees to never prop doors open, even briefly
  • Install door position sensors on critical entry points
  • Regularly inspect and maintain all locks and hardware

Vulnerability #3: Predictable Patterns (Most People Ignore This)

Here’s the vulnerability that most businesses miss: predictability.

Criminals watch. They learn your routines. They know when deliveries arrive, when employees leave, when security patrols pass, when the property is empty.

What criminals look for:

  • Same patrol route at the same time every shift: They know exactly when the guard won’t be in a particular area
  • Consistent closing times: They know when employees leave and the property empties
  • Delivery schedules: They know when doors are open and attention is elsewhere
  • Weekend vs. weekday patterns: They know when staffing is reduced
  • Holiday schedules: They know when properties are empty for extended periods

Why this is ignored: Most security plans focus on what is protected, not when and how predictably. Business owners rarely think about whether their security patterns are telegraphing vulnerabilities.

Real-world example: A retail store with a security guard who patrols the same route at the same time every shift might as well post a schedule for criminals. All the criminal has to do is wait for the guard to pass, then operate in the area just checked.

How to fix it:

  • Randomize patrol routes and timing: Guards should vary their paths unpredictably
  • Vary shift schedules when possible: Consistent guard presence is good; consistent patterns are dangerous
  • Review routines from a criminal’s perspective: What patterns would you exploit?
  • Use technology like Secure Track to verify that patrols are genuinely unpredictable
  • Train guards to notice surveillance: Someone watching the property repeatedly may be casing it

For more on this, see our post on security guards manage conflict .


Vulnerability #4: Slow or Uncoordinated Response

Even when a criminal is detected, poor response can turn a prevented incident into a successful theft.

What criminals look for:

  • Delayed alarm response: If it takes minutes for anyone to respond, they have time to act
  • No security on-site: Cameras and alarms without guards mean no one intervenes
  • Uncoordinated staff: Employees who don’t know how to respond or who to call
  • No relationship with local law enforcement: Slow police response because information isn’t clear

Why businesses overlook this: Many property owners assume that alarms are enough. But an alarm without follow-up is just a noise. A camera without someone watching is just a recording.

Real-world impact: In organized retail crime, thieves work quickly—often in groups. They know that if they can grab merchandise and exit before a coordinated response, they’ll get away.

How to fix it:

  • Maintain on-site mobile patrol or dedicated guard presence
  • Ensure employees are trained in emergency response protocols
  • Establish relationships with local law enforcement before incidents occur
  • Use real-time reporting systems to alert supervisors immediately
  • Conduct regular drills to test response times

Real Examples: Organized Retail Crime in California

Understanding criminal methods is essential. California has seen highly organized theft operations that reveal exactly what criminals look for.

Example 1: San Francisco Organized Retail Crime

A theft crew operating in San Francisco carried out over 26 coordinated retail theft incidents, targeting multiple stores across the city before being stopped by authorities. These weren’t isolated shoplifters—they were organized operations that hit store after store, exploiting predictable routines and slow responses.

According to the San Francisco Police Department , the SFPD Organized Retail Crime Task Force has been actively pursuing these crews, recognizing that organized retail theft is not a victimless crime—it harms businesses, employees, and communities.

Example 2: Multi-City Theft Ring

Another investigation linked 60 theft incidents across 19 California cities, demonstrating how widespread and coordinated these operations can be. A single organized crew can target dozens of businesses across multiple jurisdictions, knowing that local law enforcement may not share information across city lines.

These criminals identified vulnerabilities: predictable store routines, slow or uncoordinated responses, and gaps between jurisdictions. They exploited those vulnerabilities repeatedly until law enforcement connected the dots.

What these examples teach us:

  • Criminals are patient and observant
  • They target patterns, not just individual properties
  • Slow response enables repeat offenses
  • Visible, coordinated security disrupts their operations

What Criminals Exploit in These Situations

Let’s pull together the patterns from real-world incidents.

Predictable Store Routines

In both the San Francisco and multi-city cases, thieves targeted stores repeatedly. Why? Because those stores had predictable patterns—the same staffing levels, the same security gaps, the same response times shift after shift.

Criminals learn these patterns. They know when security patrols pass (or don’t). They know when employees are distracted. They know exactly how much time they have.

Slow or Uncoordinated Response

In organized retail theft, crews often work in groups. Some create distractions while others grab merchandise. They know that if they can act quickly, they can be gone before any coordinated response occurs.

Properties with on-site security guards disrupt this calculation. A visible guard can intervene immediately—not minutes later after an alarm company calls a keyholder.


The Role of Professional Security in Disrupting Criminal Targeting

Professional security guards don’t just respond to incidents—they change the criminal’s initial calculation.

What quality security provides:

  • Visible deterrence: Guards who are present, alert, and engaged
  • Unpredictable patrols: Patterns that criminals can’t anticipate
  • Rapid response: Immediate intervention when incidents occur
  • Access control: Managing who enters and when
  • Environmental awareness: Identifying and reporting vulnerabilities before they’re exploited

At Secure Guard Security Services, our guards are trained to think like criminals—so they can anticipate and prevent. We combine armed and unarmed security with mobile patrol and event security to create comprehensive protection that criminals learn to avoid.


Your Next Steps: Closing the Gaps

Most businesses overlook these risks until a real incident happens. Don’t wait for that day.

Conduct a security audit:

  1. Walk your property like a criminal would. What do you see? What vulnerabilities would you exploit?
  2. Review your security patterns. Are they predictable? Could someone learn your routines?
  3. Test your response. If an incident occurred right now, how long would it take for someone to respond?
  4. Assess visible presence. Does your property look protected—or vulnerable?
  5. Check your entry points. Are all doors, windows, and gates actually secure?

Ready to see your property through a criminal’s eyes?

Secure Guard Security Services offers free, no-obligation consultations. We’ll assess your property, identify vulnerabilities you may have missed, and provide honest recommendations for closing the gaps that criminals target.

Don’t wait for an incident to reveal what criminals already see.

Contact Secure Guard today to schedule your consultation. Serving California with integrity, professionalism, and 24/7 reliability since 2005.