securitybuilding

 

From IngramMicroAdvisor:

Every year, organizations around the globe spend a total of more than $100 billion on physical security technologies. Their goal, of course, is to restrict access to people, facilities, products, and other assets. But are the systems you install actually getting the job done?

 

Find out how YOU can become Certified Protection Officer with the IFPO!

 

As a value-added reseller, it is vital for you to have a full understanding of each customer’s physical security position. Is the organization vulnerable to threats that have been unaccounted for? Is the organization spending unnecessary amounts of money on unneeded features? Do its employees understand how to leverage the technology effectively, both during an emergency and on a day-to-day basis?

 

To begin answering these and other key questions, consider conducting a quick security audit of each customer’s facility. With new customers, the audit should occur during the early stages of your work. For existing customers, be sure to offer regular security audits so that they can rest assured that their technology is still being used to its full potential and they are accounting for all potential security threats.

 

Physical security audits can be lengthy, highly involved processes, depending on the size of your customer’s facility, the surrounding environment, potential risks, and other factors. But most audits have several common themes. Knowing the key elements of an audit is a good place to start, and then you can adjust your audit for each customer.

To get started, follow these four steps:

1. Examine the physical layout of the facility.

  • Does the layout create places to hide?
  • Is there enough lighting to illuminate key areas?
  • Is landscaping creating places to hide or providing roof access?

2. Note the number and location of all access points.

  • Do employees and visitors go through a single security checkpoint, or are there multiple access points?
  • Are doors, gates, elevators, and other points secured using electronic access control technology?
  • Are windows closed and locked or otherwise secured?
  • Are all access points illuminated?

Click here to read numbers 3 and 4.