Small businesses and corporate managers

 

 

Your task: You have been asked to give a presentation at Business Round Table Event. Attendees are owners of small businesses and corporate managers whose employees are now working from home due to the global pandemic. The need for physical security to protect equipment and other assets has risen in priority for these business owners and managers as they realize that they have a gap in their business continuity planning and response which needs to be addressed.

Background: During the global pandemic, many companies throughout the region, both small businesses and larger corporate entities, successfully transitioned to “work from home” allowing them to continue operating despite the issuance of “work from home” and “stay at home” orders from governmental entities. Storefronts and offices for non-essential businesses and services were shuttered or reduced to minimal staffing. Concerns about the potential for thefts, break-ins, and other forms of unauthorized entry have been raised in many organizations who were not prepared for extended periods in which their facilities would be unoccupied / unattended.

For this presentation, identify and discuss five or more technologies and countermeasures which can be implemented to address the problem of providing physical security in an unoccupied/unattended facility (you should not propose any measures that rely upon guards or other personnel who would need to be physically present). Your presentation should address both preventive and detective controls for physical security, e.g. perimeter fencing, gates, bollards, lighting, CCTV, audio scanning, alarm systems, key-card controlled entry, etc.

Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work.

 

Sample Solution

Introduction

  • The shift to remote work during the pandemic has highlighted a critical vulnerability in many organizations: the security of unoccupied facilities.
  • With fewer employees on-site, the risk of theft, vandalism, and other security breaches has increased.
  • To address this challenge, we must implement robust technology-based solutions that can effectively protect our physical assets.

Technology-Based Countermeasures

  1. Perimeter Security:

    • Install high-quality fencing with barbed wire or electric shock systems to deter unauthorized access.
    • Place bollards at strategic points to prevent vehicles from entering the property.
    • Deploy motion detection sensors along the perimeter to detect unauthorized movement.
  2. Access Control:

    • Implement keycard access systems for doors and gates, limiting entry to authorized personnel.
    • Consider using biometric systems like fingerprint or facial recognition for more secure access control.
  3. Surveillance Systems:

    • Install high-definition CCTV cameras with night vision capabilities to monitor the premises 24/7.
    • Utilize video analytics software to detect suspicious activities, such as loitering or unauthorized entry.
  4. Alarm Systems:

    • Install intrusion detection systems (IDS) to detect unauthorized entry into the building.
    • Protect windows and doors with glass break sensors to trigger an alarm if broken.
  5. Environmental Monitoring:

    • Monitor environmental conditions to detect potential issues like water leaks or fires.
    • Install smoke detectors to detect fires and trigger alarms.

Additional Considerations

  • Regular Maintenance: Ensure that all security systems are regularly inspected and maintained to ensure optimal performance.
  • Employee Training: Educate employees about security procedures and the importance of reporting suspicious activity.
  • Emergency Response Plans: Develop and test emergency response plans to address security incidents effectively.

Conclusion

  • By implementing these technology-based countermeasures, organizations can significantly enhance the security of their unoccupied facilities.
  • A comprehensive security strategy that combines perimeter security, access control, surveillance, alarms, and environmental monitoring can help protect assets, mitigate risks, and ensure business continuity.

This question has been answered.

Get Answer