As the COO, the entire operational ecosystem of your company comes first. When a security problem arises, it can impact data integrity, business continuity, and the financial bottom line.
What type of security problem is it?
- Cyber security
- Physical security
Who is the threat?
- Known intruder (insider or close affiliate)
- Unknown intruder (outsider)
For a cyber security intrusion challenge, your IT department will be the first resource you consult. They’ll need to work with you and outside firms to resolve the situation. The scale of the situation may be limited to a few computers or company-wide, involving in-house servers or cloud-based service providers.
For a physical security challenge, your security operations team will be a primary resource. They’ll rely on video surveillance recordings and access control activity logs as a common starting point for prevention and investigation. Once the breach is uncovered, a review of how to prevent similar situations in the future is in order.
No one likes to consider the risk presented by current or former employees. From retail to manufacturing, risk is always present among employees.
Threats from the outside can involve past employees or players separate from your company.
Several resources are available to your company. There are three primary categories:
- Security consultants
- Security integrators
- Security manufacturer representatives
All three of these categories exist in both the cyber and physical security realms.
Closing a Physical Security Gap
Closing the gap in a current physical security strategy involves a holistic review of the current security approach and a strategic plan implementation to rectify the uncovered weaknesses.
There are many existing systems and policies to review:
- Access control software
- Door control hardware
- Perimeter detection
- Surveillance cameras
- Recorded video
- Backup systems
- Intrusion detection
- Perimeter barriers
- Hours of operation
- Employee access requirements
- Legal regulations
Creating a security zone around your facility, or specific areas, requires multiple systems and enforceable policies. Physical devices like gates, doors, and turnstiles can present physical barriers that delay, control, or prevent entry. Access control software tracks successful and denied requests for entry in log files that are used to review challenges to the security plan. Intrusion detection systems provide a keypad system to turn on or off specific zones within the facility. Video surveillance footage provides a visual record of attempts to breach the perimeter or sensitive interior areas. Synchronization, and often integration, of these disparate systems allows for smooth daily operations as well as speedy investigations of unauthorized behaviors.
Internal and external valued partners are a must-have. Trusted advisors provide valuable insight when developing policies and planning for security hardware and software system implementation. Securitronics is a solutions-driven, problem solver, selecting the right technology and integrated security systems design for every vertical market. Solutions include video surveillance, access control, intercom, communications, and intrusion detection systems.