Security Risk Factors – 7 Security Tips
Do you check your security measures on a regular base?
The risks and threats that logistics companies are exposed to are continuously changing. Consequently, logistics companies need to frequently review their security measures, and when necessary, adapt them to deal with entirely new circumstances.
By executing a security audit you can analyse and determine whether the current security measures are countering all risks and threats. Examples of new risks and threats are the storage of higher valued goods or goods with a higher attractiveness.
Security installation test
Security installations need to be tested to ensure that they are properly functioning. Unfortunately, this testing normally happens only once during the yearly service and maintenance. By testing weekly instead of yearly, you can ensure that any malfunctions are discovered in an early stage.’
Security procedures and physical security measures
In addition to the security installations, one must not overlook the security procedures and physical security measures. Examples of security procedures are: exit protocols for persons, leaving the employment of the company, rules for the supervision of subcontractors and security awareness training for employees. Examples of physical security measures are: inspection and maintenance of hinges and locks, doors and windows and fences and gates.
Basic security measures
The implementation of security measures doesn’t automatically entail financial investments. With basic security measures you can already counter certain risks and threats. The vast majority of security measures are well known but just not always executed. The seven tips in this article will give you a good basic foundation.
A check of your security measures via a security audit or checklist needs to be done quarterly. Step-by-step plan for an audit/checklist:
- Define all possible risks and threats (security audit, security checklist, external consultant or other risks classification)
- Analyse possible risks and threats (probability, impact, consequence etc.)
- Develop counter measures (Security procedures, physical security measures, electronic security measures). Evaluate the measures taken with all involved departments (HR, Operations, Facilities etc)
- Integrate all risks and measures in a quarterly audit.
A weekly test of your security installations is needed to ensure the functioning. These tests need to be written in a procedure with a checklist.
- Test the functioning of the motion detectors and alarm contacts of your intrusion detection system.
- Check the settings and connection with the external control room.
- Test the functioning and settings of your card readers, electronic locks of access control system.
- Check the access rights of each user.
- Check the management and report software of your access control system.
- Check the functioning and settings of your cameras.
- Check the functioning and settings of your CCTV recorder.
- Check if all systems reflect the same time.
Check daily via a procedure to insure that any person who has left the company is deleted out of your intrusion detection and access control system. Let the super user of the security installations know immediately if a person has left the company. The super user needs to delete all codes to the systems and delete all access rights.
Plan security awareness training on a yearly basis.
- Update the training with new security measures.
- Integrate the training into a new employee orientation program.
Plan preventive maintenance on your security installations.
- Ensure that a maintenance contract is signed with a certified security company.
- The security company needs to draw up plans in consultation with the client.
Plan formal evaluation times with your security company.
- Plan for quarterly evaluation times.
- Implement a Service Level Agreement with Key Performance Indicators to monitor the quality level.
Develop a replacement plan for older security installations.
- Determine the life cycle of your security installations.
- Establish plans for the replacement of the older systems.
- Reserve a budget.
Groenewout can offer you a Quick Scan Security. This scan will help you to identify the risks within your processes, procedures and buildings. This scan can also be used to check on whether you are compliant to TAPA, AEO Security and CTPAT. The duration of the quick scan security is approximately 3 days. This depends on the complexity of your organisation.
If you would like to receive more information about security measures or if you are interested in a Quick Scan security please contact Stijn Belt.
50 years of experience
Consulting firm with over 50 years of experience.
Availability of a European logistics database with benchmark figures on transportation and warehouse costs.
Full scope expertise on network design, as well as warehouse design (conceptual layout, logistics - and storage equipment) and logistics building design (engineering and investment calculations).
Ability to support implementation of new logistics concepts (70% of Groenewout revenue is with existing customers in follow-up/implementation projects.
Extensive operational knowledge, hands-on, pragmatic and bottom-up approach.