Understanding the Threats
Spend time with the customer to understand their business and the security, social and environmental risks which can impact its successful operation.
Threat Assessment and Security Plan
Assess the threats and perform a gap analysis from which a security plan/solution can be developed to mitigate the agreed risks. Remember to plan for the future, not just today. Threats to be listed and weighted to ensure the security plan implementation is cost effective.
Defense in Depth
The key to a successful security solution is to deter, detect and deny, but should the defenses be attacked, to buy time for an appropriate response. To buy time, defense in depth is required and can include multiple physical barriers, access control points (manned and unmanned), alarm systems and technical barriers linked to CCTV with on site and off site monitoring and response.
Access should be limited to as few points, as is practical and designed to control flow (people, vehicles, goods) and allow the implementation of screening and search programmes.
Trained and motivated Security Officers, ID card systems and key control are all important elements of a successful access control programme.
Standard Operating Procedures (SOP’s), Reporting, Training and Drills
Developing Post specific Standing Instructions together with the SOP’s are vital to ensure security staff fully understand and comply with the site security needs, reporting and emergency response.
Formal training needs to be tailored to ensure full understanding and compliance. Followed up with “on job training” and regular drills. Audits and inspections are a key element to ensure procedures and training is effective and current. In some circumstances, penetration tests are an excellent way to determine the robustness of the security plan and defenses in place.
Integrated Security Systems
A integrated security system generally comprises, Access Control, CCTV and Alarm Reporting linked to on site and offsite monitoring and response.
Integrated Security Systemis are a vital part of the security solution, but is often designed and installed in isolation and with little consideration to the operational needs of the security team. It is important that a risk assessment and any systems proposed met the risks and designed with the on site security needs in mind.
Business Continuity Plan (BCP)
Forty percent of companies that experience a major catastrophe go out of business after the event.
Companies owe it to their stakeholders to consider the threats and risks to their business and develop and document a BCP. But it is not enough to document a plan, it must be tested and regularly retested to ensure it works and meets current needs.
To ensure our client’s security systems and processes function as designed, meet the threats, comply with the security plan in place and are efficient and effective, we are engaged to carry out both regular and spot security audits.
The audit will identify any gaps found with recommendations to mitigate the risks identified.
We are also one of a select group of security professionals with world-wide expertise in cash management services and we work in association with Lowers and Associates, a top international Risk Mitigation company in providing pre-risk and post-loss risk assessment of cash in transit and armoured car operations.