The years 2010 and 2011 will definitely go down in history as two years where business learned to do more with less. So why would a company consider using a security consultant to work with them on their security program? I can guess what you are thinking – we have security people and the Internet so we can do Google …
Business Continuity Planning and the Protection of the Supply Chain
As security consultants, we have the privilege of working for multiple companies and agencies around the globe, which gives us deeper insight into how businesses typically view, plan, and prepare for the unexpected. Too often, however, it seems we are brought into the security process in a remedial role, after an unforeseen and unprepared for event. In the current economy, …
A Locked Room
On Monday, an employee reports that there is one monitor missing from the shipment of new monitors that was received the previous Friday. The quantity was verified at delivery by the shipping company and two of your employees. The interior door to the loading dock was locked on Friday evening and was still locked on Monday morning. The roll-up loading …
Access Control – People, Processes, Technology
Sarah nervously approached the building to start her first day at the new job. The email from the HR manager told her to use the intercom at the front door, and someone would escort her to HR to fill out the new hire paperwork. As she walked up to the front door, an employee saw her and smiled. She smiled …
Cell Phones Are Safe… Aren’t They?
Imagine this scenario: You’re unavoidably called out of town for the week and are reluctantly forced to delegate the operation of a meeting with some important clients to Bob, an employee who, despite his best efforts, is less than “tech-savvy.” Everything seems to be going swimmingly though, and the meeting is set to begin on time. Just before everyone takes …
How to Choose an Integrator
A key component to choosing an appropriate security system is a vulnerability assessment or a security threat analysis of a facility. Once an organization’s security needs have been determined, an appropriate security system can be designed to meet those needs. Critically important to the success of these projects is the choice of a qualified systems integrator to install the necessary …
Creating a Master Plan
The process of developing a Master Security Plan begins with and has its foundation in the information, outcomes and recommendations of the assessment activities. Creating an integrated security plan to guide a security program is rooted in the existing organization, policies and procedures, culture and characteristics of the population. Each of these is surveyed and determined during the security survey/vulnerability …
