How To Assess Your Business Security Needs

Posted by Tupei Lu
598 Pageviews
How to Assess your Business Security Needs

Developing your plan for security requires an understanding of your complete
organization so that your security plan can encompass all of the possible
breaches to not only the building but the property within. You must also
consider security breaches from within meaning all personnel that have access
including vendors, employees and management.

Most security systems are setup based on a past security incidents after the
fact instead of for prevention in the first place.
When a security analysis is performed you must take into account the amount of
the expenditure to protect the asset and the actual replacement cost for the
asset.
No asset can be completely protected so a foolproof security plan is not the
goal. The goal is to have different levels of difficulty for a burglar to breach
your security based on the value of the assets that you are protecting. The
level of difficulty is based on how much you can afford to lose a particular
asset.

Definition of Assets

There must be a complete understanding of the company"��s operations including
production equipment, operating systems, raw materials and the finished product.
Power systems and telecommunication equipment must also be taken into account.
It is critical to have a full understanding of the entire scope of operations so
that the areas of potential compromise can be isolated.

Each asset should be assigned a level of importance such as:
1. The loss would be insignificant
2. The loss would cause disruption but recoverable
3. The loss would prove to be catastrophic

Identification of Possible Threats

You must compile as much data as possible in order to make a threat assessment
for your particular company. First review any past security incidents that you
have on record. Where did the security breach occur and what property was lost?
Check crime rates for similar companies across the nation and also check crime
rates for your area. As you do your threat analysis you must categorize each
with a level of probability of occurrence.

1. Probable - The threat will likely occur
2. Possible - The circumstances are conducive for an event to occur
3. Unlikely - not anticipated

Analyze Your Vulnerability to Possible Threats

You have identified your assets and the possible threats to these assets. Now
you must develop a series of obstacles that are designed to make the identified
threats less likely to occur. This is most easily done by constructing possible
scenarios that a perpetrator may take and what countermeasures could be put into
place to lessen the likelihood of these events. Each scenario and the resulting
countermeasures must address the level of likelihood that it could actually
happen and the level of loss that would be suffered if carried through. Each
possible scenario should be constructed with step by step details so that
possible countermeasures can be analyzed for cost effectiveness.

Selection of Security Countermeasures

Only by the correct implementation of security measures can your company receive
the intended benefit. Security can take many forms including security systems,
physical barriers, and security personnel.

Security Systems

1. Intrusion Detection
2. Access Control Systems
3. Surveillance
4. CCTV
5. Duress Alarms
6. Intercoms and Public Address Systems

Physical Barriers

1. Vehicle Barriers
2. Fences and Gates
3. Vaults and Safes
4. Lighting
5. Landscaping

Security Personnel

On site security personnel duties are varied but usually include the operation
of electronic systems, fixed post duties and roving patrols. Security personnel
usually are trained to observe and report.
A professional security company can help you design a complete security system
to fill of your needs and give you the right protection for your business.
Contact Hue and Cry Security for a free evaluation.