<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=216107089418520&amp;ev=PageView&amp;noscript=1">
Let's Talk

Your Physical Security Checklist: 7 Must-Haves for Every Business Facility.

avatar

Posted by Jackie Edwards - 14 December, 2017

Your Physical Security Checklist: 7 Must-Haves for Every Business Facility

Most of the discussions involving security are focused on cybersecurity, from ransomware to zero-day threats. However, many organizations are discovering holes in the physical security in and around their facilities. A dead bolt, an after-hours security guard and a 20-year-old closed-circuit-TV surveillance system are no longer enough. Without a comprehensive physical security strategy and the right tools, your employees and company assets are at risk.

Here is a checklist of basic physical security features that every building should have.

1) Door Security and Alarms

Most doors at the main entrance have proper alarms. However, emergency exits are often neglected. Every entrance or exit, including windows, should have locks and sensors that trigger alarms that are supervised, controlled and inspected. Important rooms inside the facility, such as data centers and document storage rooms, should be similarly protected. All alarms should have an emergency power source in case of a power outage, and be tested regularly.

2) Access Controls

Access control systems that use keys, smart cards, badges, biometric scanners and other tools for validating a person’s identity prevent unauthorized personnel from entering your building. Access controls should provide an audit trail telling you where and when people are entering the building.

3) Video Surveillance

Modern video surveillance systems provide high-quality footage — often in color rather than grainy black and white — that can be remotely monitored and managed. Cameras can record continuously or automatically begin recording and storing data when an alarm goes off or motion is detected. Video cameras also serve as deterrents to both internal and external threats, so experts recommend leaving them visible.

4) Lighting

It may sound obvious, but inadequate lighting makes life easier for criminals and more difficult for security personnel and law enforcement. Lighting should overlap in case bulbs go out, and the power supply for lighting systems should be protected to prevent tampering. Standby and emergency lighting should be tested frequently.

5) Communications and IT Systems

What happens when an alarm goes off? Who is notified and how? Are communications systems reliable and secure? Are redundant communications systems available? Are computer systems and equipment accessible to authorized personnel only? These and other questions should be addressed as part of your security strategy.

6) Document and Technology Disposal

Many organizations keep all physical files and devices forever instead of securely disposing of them once they’ve reached the end of their useful life. A room or closet filled with these assets is a goldmine for criminals, even if hard drives, computers and mobile devices supposedly have been wiped of files. Outdated documents need to be shredded and old technology removed from the premises by a reputable e-waste company.

7) Personnel

During business hours, reception and/or sales associates are often the first line of defense for organizations that are open to the public. Employee training should explain how to respond to situations involving threatening individuals and suspicious behavior.

Just as a multilayered IT security strategy is critical to protecting company data and other digital assets, multiple layers of physical security are needed to prevent unauthorized access to your facility and certain areas and resources within that facility. Let us help you ensure that your physical security strategy is up to date, technically sound and properly managed.

Topics: Technology, #Wireless

Physical_Security_Checklist_PDF

Recent Posts

Is Your Remote Workforce Creating New Insider Threats?

read more

Beyond Data Backup: Why You also Need Disaster Recovery

read more

6 Suggestions for Improving Data Access Controls

read more