Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success

Business Security & Good Practices

Business security is paramount important for thriving your business. You must be aware of workplace violence, business espionage, identity theft issues and confidentiality requirements dictate that your business must be safe from every side. Here we evaluate for the requirement of all types of security to secure our businesses.

Types of Security

We can divide the security into two parts, Physical Security and the Technical or the E Security (Electronic Security).

Concept of Physical Security Arrangements

Physical security can include may include following.

  • External Security Arrangements for a facility
  • Access Control Arrangements
  • Closed Circuit Television Arrangements and sensors
  • Intrusion Detection Arrangements
  • Promove

External Security Arrangements

  • Early warning systems like fence linked with the alarm system
  • Security Gate Systems (Vetting arrangements)
  • Bollards: Fixed & Electrohydraulic
  • Vehicle Entry Barriers
  • Guard Shelters
  • Security Guards
  • Security Lights

Access Control Arrangements

  • Turnstiles
  • Walkthrough gates
  • Identifications and vetting of each entry
  • Logs
  • Biometric arrangements for identification and for record keeping.
  • Security Guard Checks
  • Explosive detectors
  • Metal Detectors

Closed Circuit Television Arrangements and Sensors

Common Types of Security Sensors in Modern Security Devices

  • Infrared (IR) Security Sensors.
  • Photoelectric Beams.
  • Microwave Sensors.
  • Tomographic Motion Detection Sensor.
  • Microphones.
  • Glass Break Sensors
  • Vibration Detection Systems
  • IP Video Systems
  • Analog Video Systems
  • Hybrid Video Systems
  • Digital Video Recorders (DVR)
  • Network Video Recorders (NVR)
  • PTZ Components


Promoves (Protection arrangements during moves) are very important for all VIP movements. VIPs always need close protection (Bodyguards, CPOs, Bouncers, Well trained guards). Following arrangements may be planned according to the threat in the environment and keeping in view the associated risks. Undermentioned arrangements can be done according to the needs.

  • Escort Vehicles
  • Escort Guarding
  • Body Guards or the trained security guards
  • Bouncers
  • All must be with superior weapons if needed according to the situation.

Document Security

“Out of Bound” ne written on a visible entry place where your documents are kept. None should be allowed to go into that office except the authorized persons. All physical documents must have an electronic data and all electronic data must have physical data.

Good Business Practices

Reichert Security carryout analysis for different incidents to determine the corrective measures. Here few good practices are being mention for the business. The same may help you to deal with the physical and the technical security.

Quickly change alarm and login passwords when an employee leaves the company.

  • Require employees to update passwords regularly or employ a password keeper.
  • Thoroughly check employment references and conduct background checks.
  • Keep evacuation plans updated
  • Keep parking lots and building exits well lit.
  • Use keyless locks
  • Invest on CCTV
  • In/out records
  • Ensure Punctuality
  • Carryout stakeholders’ engagements
  • Keep equipment serial wise
  • Fix Walkthrough gates., There are number of walkthrough gates, different types and categories. Invest for good walkthrough gate which should give good results. You can google for walkthrough gates, check good companies. Few Chinese companies are found in making walkthrough gates and delivering to Pakistan with a much cheaper rate. If you need walkthrough gates in bulk, may contact directly with the foreign vendor otherwise you can purchase or can get on rent the walkthrough gates.
  • Keep Good Security Guards, Bodyguards, Bouncers or the escort guards for yours and foe the security of your facility. Its said that you have a security or you don’t have. There is no word having a normal security. So always keep good security guards
  • Beside good guarding, Keep door entrances clear of undergrowth like shrubs / trees, or other objects that block visibility.
  • If you deal with cash and physical checks, vary bank drop-off times or use an armored transport service.
  • Track all company-owned equipment, including serial numbers, and store information off-site.
  • Conduct building walk-throughs before closing for the day.
  • Implement clear desk policy.
  • Keep the area or the facility well lit.

What Physical Security Best Practices Don’t Look Like

(Extract of an article of Andrew Tyler, a certified Security Engineer)

Some organizations think that blocking physical access to the data center, such as by having it behind a locked door with only one entrance or exit, is enough. However, there’s quite a few more elements that would need to be involved there.

Just tracking ingress and egress to the building or to the data center doors itself does not provide a full complement of security compliance.

If you’re not logging access to this secure area, you’re also missing some best practice (and likely compliance) requirements. The clipboard sign in sheet next to the door isn’t going to cut it here either.

You want to be able to see point in time who accessed that area, when they accessed, where they went, and what they did.

Many log structures are done by badge access or biometrics. While these seem secure on paper, there are some definite flaws in just relying on them for physical security. Consider scenarios where a badge, key fob, etc. is lost or stolen.

The badge is assigned to a certain person, so your logs say it was that person that accessed your data center when in reality it was likely someone with bad intent in that scenario.

You may contend that biometrics could fix that problem but they have their own blind spot: consider how that log would look if your employee was leading a customer tour or scanned a co-worker in while they were both chatting in front of the data center.

Though these situations may not seem worrisome, a would-be criminal could employ social engineering tactics to plant themselves among that tour group and your employee may not be aware before they scanned that entire group in.

Typically, this is where something like video monitoring can help. You get recorded, historical insight into that secure area access. However, there’s also some underlying security issues with the typical video system setup that the average business uses.

Most video systems being used in the average business place is for ingress and egress. They’re typically DVR associated systems and the cameras are mounted in strategic locations to track just access to the building.

But putting that DVR device inside the data center – which isn’t uncommon – can defeat the whole purpose of having the cameras in the first place, since it’s easy to steal and provides a single point of failure for the entire environment.

Another potential tripping point is lighting. As I mentioned above, having only a basic light switch controlling the lighting in your data center won’t do your video system much good as it’s unlikely an individual looking to do something unsavory is going to turn the lights on beforehand.

A better option is motion activated lights. These will automatically turn on when they detect movement within their coverage range – literally shedding some light on the situation as your video system rolls.

Based on the above, lets assume a business has this not uncommon setup: check-in at the front desk, badge-only access to the data center, a DVR video system in the data center with a camera mounted inside the data center, and standard lighting. This checks off many of the basics on paper. Here’s a common scenario that can play out with that setup:

Andrew Tyler is a certified Security Engineer with Contegix. He believes in persistence, technical excellence and creativity in developing solutions.

Leave a Reply

Your email address will not be published. Required fields are marked *