Thinking About Security
Some of us think about security consistently, every day. Others just don’t care. I suppose security doesn’t really matter until you need it. When you walk into your home after a night out and find that someone has been going through your stuff, it would become pretty important. Security cameras and alarms may deter but won’t stop an intruder. Locks and security screens may make it more difficult for the intruder and for you.
The best practice is to have a plan, lock up your valuables and keep them safe. Take security seriously and use all available solutions to keep you and your family safe.
Automatic sensor lights and cameras can deter and also help identify the intruder to increase the chance of capturing and returning your stolen property. If you are home, cameras can help you to identify early if there is a problem without opening the door.
Alarms, Sensor Lights, Cameras, Security Screens, Dead Locks and don’t forget the value that a dog can have for keeping your property safe. A barking dog may be the deterrent that keeps your property safe.
Viewing your property via a mobile phone is a comfort that everything is safe and well.
In our case, it helps us to stay prepared.
Site Security: Who is responsible for Site | Building security. This includes the physical security of locks, doors and windows. All identifiable entry and exit possibilities should be documented.
All keys and codes should be recorded in a central register.
What is it that you are trying to secure? An asset register should be created, and an inventory of all Tangible and Intangible assets should be recorded with code, references and serial numbers in case of theft.
Tangible assets are assets that have physical existence (we can touch, feel, and see them). Examples of tangible assets include:
Intangible assets are assets that do not have a physical existence. But they must have registration or identification that makes them valuable. If files are destroyed in a fire, will you lose intangible assets?
Examples of intangible assets include:
|Copyrights||Corporate intellectual property|
Ensuring that staff, and visitors have appropriate levels of permissions to access the resources they need, but no more than that, is an important part of a security best practice guide.
In your People Security Sections, identify the scenarios that people currently follow in their daily activities. Use What, When, Where, Why, How and Who (WWWWHW) to create your guide.
What are your procedures for each possible scenario?
Ask What, When, Where, Why, How and Who to the following statements.
|1. Staff members come to work. ||5. Do all staff need access to everything on the network or can you isolate the system?||9. Computer and network security policy – antivirus, firewall ….|
|2. Staff members need access to the car park.||6. Do guests visit the physical site?||10. Do guests need to be supervised when visiting certain areas.|
|3. Individual staff need more access to certain areas.||7. Do guests need access to the internet?||11. Some staff leave early, some staff leave late, or maybe we have shift work. How is security monitored?|
|4. Do all staff need computer and network access?||8. Do guests just plugin to your network or do they have an isolated network to use.||12. Some staff bring equipment to work and take equipment offsite. How do you know what is being used, by whom, when?|
Monitoring, alerts and your security goals
Your policy is your starting point. It creates a place to refer back to, so the process can be improved. Instead of Reinventing the wheel each time there is a change in the organisation, you should always train your staff to refer to the policy. If you need to make a change to the way you do things, you simply change the policy.
Surveillance systems, cameras and bio-mechanical smart devices can automate the process of monitoring and alerting. You are able to identify entry and exit times by using staff id cards or fingerprint scanners. Combing the smart devices with cameras can provide further information about who is with them or what they are bringing into or taking out of the site.
All sites need some form of Security. Both Physical Security and Policy.