Security Alignment, Optimization, and Maturity

  Overview: If you’re like me you either played Whack-A-Mole as a child or with your children or grandchildren. As we know the challenge was to be ready to whack the mole when its’ head popped up in one of several holes in front of us. In a way some companies play a version of

Read More

Security Practices: Trust But Verify

Security Policies & Procedures Basic security policies and procedures are at the core of a sound security risk program. Former President Ronald Reagan popularized the phrase “trust but verify” when negotiating with the Soviet Union in the 1980s. Although certainly not on the same scale, that phrase can be applied everyday to ensure we provide for

Read More

Security Guards: Leveraging as a Resource

Benefit or Burden? Properly leveraging security guards, contract or proprietary, can have a significant and positive impact on a facility’s security program. Not properly utilized these resources can drain your security budget, increase liability, and provide for a false sense of security. The value these officers add to the business has a direct correlation to their selection, training,

Read More

Security Systems: Plan and Integrate

Case Study A manufacturing company was the victim of multiple thefts of high value product from their shipping area.  During a subsequent security assessment several vulnerabilities were discovered that contributed to these thefts. And although the company thought they had the appropriate resources in-place to deter or detect a theft, they learned otherwise. Malfunctioning video surveillance equipment

Read More