Imagine a facility constructed from day 1 with future security requirements as the top priority. Does that describe your security landscape? Most likely not. The level of security installed on day 1 does not always reflect the security required of the organization later.
There’s often a mismatch between budget, specifier input, and end user operational requirements. Requirements change with facility capabilities and in response to prevalent threats. A facility that was once secure with cameras at the entrance, may now require security checkpoints at the property entrance and a perimeter fence detection system with cameras watching the property line. Organizations change, the world changes, and security technologies change in response.
Expansion or reduction of the physical footprint of an organization is impacted by new construction projects. New projects may require alterations or upgrades to the existing systems. Prior to physical changes, a complete security risk assessment must be performed to uncover the new security requirements for the organization. Likewise, if a business changes its scope of operation, there may be the need to increase security. This may happen when cash flow changes or the potential hazard increases.
If a local threat arises, it may impact a cluster of facilities. If a national or global threat arises, the entire vertical market must adopt new security measures, all of which require security risk assessments. For example, the Department of Homeland Security (DHS) directs 16 specific critical infrastructure categories related to cyber, physical, and electronic security requirements. These requirements are reviewed and updated to reflect global security changes and their impact on specific industries.
Security technology changes
Improvements in security system technology are occurring at a staggering rate. Surveillance cameras are being produced with dramatically higher resolution capability. Access control systems are becoming more sophisticated, from card credentials to biometric readers. Legacy perimeter intrusion detection systems (PIDS) attached to fences are being replaced with modern power over Ethernet (PoE) devices and increased, smart sensitivity capabilities. When the mean time between failure (MTBF) for legacy security devices may have been as long as 15 years using analog technology, new IP based system devices may only have a three to five-year replacement cycle.
These common scenarios present reasons to conduct a security risk assessment on a regularly scheduled basis in addition to when specific needs arise. Performing these assessments regularly can bring unrealized vulnerabilities to the surface. These assessments should be conducted by security technology experts in conjunction with officials familiar with the unique operations of the organization. Without expertise from both sides, vulnerabilities may remain overlooked.
You can count on Securitronics to perform comprehensive security risk assessments that address your most demanding safety and security concerns. We are dedicated problem-solvers, always ready to use new and innovative technologies to develop your plan and secure your property, assets, and personnel. Our goal is to build long-term, lasting partnerships based on absolute trust and personalized services from the most skilled and talented security professionals available.
Contact Securitronics today. 800.795.3747