Category: Security

Increase in Positive Drug Tests Present a Facility Security Concern

Drug use among employees is a broad concern for any organization, and with wide acceptance of medical marijuana and the legalization or decriminalization of recreational marijuana in many states, facility managers, along with HR and security personnel can have difficulty navigating these changes. While public attitudes regarding marijuana use are shifting, serious concerns remain about […]

CFATS Program Extended, But, What is the Personnel Surety Requirement?

On January 18, 2019, President Trump signed a bill providing another 15 months of funding for the Department of Homeland Security’s (DHS) Chemical Facility Anti-Terrorism Standards program (CFATS). Trump signed the bill the day after the program was set to expire. News of the extension provides a moment to examine one of the more unusual […]

Getting the Word Out with Mass Notification Systems

Mass notification systems utilize a number of integrated communication devices and software to alert building occupants about a potentially dangerous situation and facilitate the proper action and response. They represent a very beneficial added layer of life safety protection.

The Importance of Security Communication Integration at Your Facility

One chilling realization stemming from the aftermath of the 9/11 attacks was the inability for the first responders across all disciplines—police, fire, and paramedics—to communicate with each other using the same radio frequencies. Are private sector security practitioners any better at reaching or talking to each other in routine conditions and serious emergencies?

Chemical Security

Chemical Security Compliance for Your Facility: 5 Important Steps

Dangerous chemicals necessitate adequate security to mitigate risks. If you are a facility with a chemical designated by the U.S. Department of Homeland Security (DHS) as a chemical of interest (COI), you may only have 60 days after taking possession of the COI to initiate a security screening process under the Chemical Facility Anti-Terrorism Standards […]

Facility with Trees

Is CPTED Still in Use Today?

The security concept known as CPTED—or Crime Prevention Through Environmental Design—started back in the 1970s with the publication of architect Oscar Newman’s book, Defensible Spaces. His thinking has influenced building designers, facility maintenance directors, security consultants, and even police agencies since that time. The question today is, does it still work?

Security Risk Assessment and Mitigation Share Common Strategies Across Facilities

A comprehensive risk analysis is the first step in assessing security vulnerabilities at any facility. Accurately performing vulnerability risk assessments of premises’ physical security and logical data takes a complete and comprehensive evaluation based on key areas. Let’s take a look at some tips that apply across facility types and industries.

The Importance of Proper Enterprise-Wide Security

As more threat actors look for new tactics to breach existing security measures, there is an increasing importance to integrating information technology (IT) and operational security personnel. A united security team is essential when it comes to confronting the many intersecting threats coming from all directions.

Security leader talking to media

Don’t Reveal Facility Security Secrets to the News Media

It can be flattering when the local or national news media contact the director of security at his or her facility for help on an article about the latest security trends, equipment, or policies. But security practitioners must be careful about how much information they discuss.

Tailgating Infographic

Infographic: Are There Piggybackers or Tailgaters at Your Facility?

We’ve been told since we were kids that it’s polite to hold the door for folks coming into a building or room behind you. While this cultural maxim works fine at, say, the coffee shop, though it could actually pose a security risk at your business or facility. Too often, unsuspecting employees use their credentials […]