article on door barricade devices

Effective Security Requires Thoughtful Decisions

Christine L. Peterson, CPP, ISP News, Security Assessment, Security Master Planning

In her Editor’s Note published in the January/February 2020 Campus Safety magazine, Robin Hattersley reminds us all of the power of seeking professional advice when lives are at stake. Would you go to a pharmaceutical company to advise you about health concerns that you have? Would you invest in health equipment based on a good sales pitch? Why should effective …

circuitboard with keys

More Than Half of Ex-Employees Still Have Access to Corporate Networks

Christine L. Peterson, CPP, ISP Security Program Development

In today’s security programs, we often lose sight of the forest for the trees and forget the basics. Removing an employee’s ability to access company property – whether physical access or access to corporate networks – is so basic that it too often gets overlooked. This article from InfoSecurity is a painful reminder of how lax many security programs are. …

three part fence

Perimeter Security

William F. Booth, CPP Security Assessment, Security Program Development

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …

officer

Full-Time versus Part-time Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of …

law enforcement

Sworn versus Non-Sworn Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Probably the most profound choice in the paradigm is between sworn and non-sworn officers. …

security officer standing next to bike

Proprietary versus Contract Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Basically, there are only two organizational relationships for the security officer. A proprietary officer …

guard with no uniform talking into a device

Uniformed versus Non-Uniformed Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHS Security Program Development, Training

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Whether or not to put security personnel in a distinctive uniform is one of …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Security Program Development, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

college students

Security Threat Assessments for Education

Protus3 Security Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …

probability-criticality

Probability and Criticality

William F. Booth, CPP Security Assessment, Security Master Planning, Security Program Development

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …