three part fence

Perimeter Security

William F. Booth, CPP Security Assessment, Security Program Development

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense. Whereas the …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISP Security Program Development, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

physical security lock

Key Control

William F. Booth, CPP Security Assessment, Security Master Planning, Security Program Development

So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …

college students

Security Threat Assessments for Education

Protus3 Security Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …

A Locked Room

Protus3 Security Assessment, Theft, Embezzlement, and Fraud

On Monday, an employee reports that there is one monitor missing from the shipment of new monitors that was received the previous Friday. The quantity was verified at delivery by the shipping company and two of your employees. The interior door to the loading dock was locked on Friday evening and was still locked on Monday morning. The roll-up loading …