Protection Program/Security Assessments:
The first step in determining what tools your organization needs to protect its assets is to perform a security assessment. There are many types of assessment, from a short “walk through” of your facility that may take only an hour, to an extended in-depth assessment that could take two weeks to perform.
A consultation by an experienced professional, along with any restrictions you may have (funding, manpower constraints, project deadline, etc…) will allow you to determine what is best for your organization.
Understand that the performance of the security assessment itself is a deterrent to criminal activity. When performed, the assessment sends a clear message to employees, management, shareholders, and anyone else who is aware of the assessment that your organization cares about its protection and is willing to expend resources to protect its personnel and assets.
The Benefits of a security assessment include:
1. Providing a road map to align your security objectives with a well thought out plan
2. Reducing your vulnerabilities to numerous criminal activity
3. Increasing awareness of security by all staff members, and allowing them to become part of the solution.
4. Assuring that the dollars you spend on future security needs is in line with your new security plan, and not an unnecessary expenditure.
5. Determining if your current security program (if you have one) addresses your needs.
6. Allowing you to state in a court of law that you took responsibility to protect your employees, visitors, products, and other assets should a liability issue arise.
A security assessment should not be a single, one-time only event. Technology changes, and criminals and terrorists get smarter to foil countermeasures that are put in place. They perform many activities that established companies perform in order to steal your valuables: they plan for contingencies; they think about resources to be used, they inspect their target, and they learn from their mistakes.
To foil criminals and terrorists, we must constantly improve our methods and stay one step ahead of their thought process. An annual security assessment will allow you to take advantage of the latest in hardware and software technology, and will allow you to learn the newest techniques to foil the bad guys!
Why are Annual Security Assessments important?
1. In today’s world of elevated stress and a heightened apprehension of terrorism, an assessment will address these concerns and put in place countermeasures to reduce your risk.
2. You may have a change in your business such as a new building, modifications to your facility, a change in your labor force, an impending layoff or strike, or a merger or acquisition.
3. There may be a government or industry-specific requirement (such as the chemical industry or water treatment plant industry) that make an assessment compulsory.
4. You may realize that your employees are actually increasing the risk to your facility or product through unsafe activities (propping doors open for a cigarette break, allowing unauthorized visitors into a secure area, etc…)
5. A security incident has already occurred, and you wish to prevent another occurrence.
How does Battleline Tactical Protection Programs preform Security Assessment?
Although there are many ways to perform a security assessment, there are some basic functions that must be performed to ensure a proper assessment that clearly identifies accurate potential threats and not a fearmonger approach. This helps the customer decide the proper areas demanding funding for their protection programs.
1. Analysis of the facility - A basic overview of the location is necessary to understand its mission, scope of activities, workforce makeup and culture. It's also imperative to find out the physical layout, the rate of visitors or subcontractors that visit the site, any history of incidents, the area crime rate and the composition of the neighboring community.
2. Determine critical assets - This is important to understand the targets that any criminal/aggressor may be seeking to acquire/attack. These could include company assets such as computers, customer lists, cash on site, research and development documentation, new or existing products, data, people or a number of other items. Once the assets are identified, it is important to rate them for criticality, meaning how important they are to the operation of the facility. It is less important to protect an asset that is not vital to the operation or survivability of the company than one that is.
3. Determine the threats that may place the facility in danger –These threats may take many forms, and could include some that you are not even aware of. They include external risks from burglars, terrorists, animal rights or environmental extremists, angry neighbors, vandals and transients, as well as internal risks from disgruntled employees, cleaning crews, fired or laid off workers, domestic violence issues that spill over from personal situations, and subcontractors that have access to the building, to name a few. (Special Note: Battleline Tactical prides itself on the fact that we take steps to ensure that we provide our customers with the most accurate snapshot of real threats as it is applicable to them. We will never use FEAR to sale our customers on training or security equipment.)
4. Identify the existing countermeasures - It is important to review what existing defenses you have in place to protect your assets. They may be adequate, or they may need strengthening to increase your security condition. Countermeasures may include fences, gates, padlocks, locked doors, paper shredders, proper policies and procedures, trained employees, access control systems, burglar alarms, CCTV cameras, parking lot lighting and others. Battleline Tactical can work with your local law enforcement and first responders to develop agreements as it applies to patrols and response times.
5. Identify the security variance - At this point it is possible to identify the gap between what assets are protected with existing security countermeasures vs. what assets are vulnerable.
6. Develop countermeasure recommendations - Battleline Tactical will develop recommendations to counteract each threat that may pose a risk to the organization's assets. The recommendations are varied, and could include a number of low costs, higher cost, or free solutions, including employee training, fences, security officers, locked departmental doors, a badge program for visitors, locked safes and desks, a receptionist at the front door or other solutions. Whatever the recommendation, it should be in synchronization with the atmosphere, culture and organizational goals of the company or your environment.
Battleline Tactical Protection Programs can also provide our customers with several others services based on the findings of the assessment.
We can work with your team/staff to develop and review protection programs policies, procedures, plans, and event annual training programs.
We can provide several types and levels of training. The following is a basic short list of these training services;
1. Protection Program Awareness seminars
2. Train security teams and other staff on procedures, policies, tactics, and techniques
3. Protection Program Exercises. This is where we work with your team to conduct real world live training of your programs and responses.
4. Train your VIP/Key personnel and their families one personal security tactics and techniques while at home and traveling.
5. Train the trainer. This is where we train your team/staff on how to conduct annual training without having to call in outside services to assist.