Author name: admin

Imran named in three more terror cases

LAHORE: Pakistan Tehreek-e-Insaf (PTI) Chairman Imran Khan has been named in three more cases of terrorism, Geo News reported. Police sources said the PTI chairman has been named in Jinnah House and Askari Tower attack cases. Besides, he has also been nominated in an attack on the Prime Minister’s Model Town Secretariat. According to the police, there were seven cases registered against him in Lahore under terrorism provisions. Now after nomination in more cases, the number of terrorism cases against him has increased to 10. The police said that Imran had been nominated in three cases of terrorism in Lahore in the light of statements of the arrested accused. He also faces 19 cases of terrorism in other districts of Punjab. Source: https://www.thenews.com.pk/print/1089658-imran-named-in-three-more-terror-cases

Imran named in three more terror cases Read More »

News

UK Issues Pakistan Travel Advisory

LONDON – The United Kingdom on Tuesday advised its citizens in Pakistan to be cautious and limit their movement in certain areas amid rising terror threats. The Foreign, Commonwealth & Development Office cautioned its nations not to attend any political demonstrations, huge crowds of people, and events. In the fresh advisory, UK nationals in Pakistan are told to avoid traveling to certain areas in Khyber Pakhtunkhwa including the provincial capital Peshawar, Bajaur, Mohmand, Khyber, Tank, Banu, Lakki Marwat, Chitral, DI Khan, Swat, Buner, Lower Dir, Orakzai and other areas. The British government further warned its nationals living in the crisis-hit country to avoid travelling to Balochistan coastal areas and Pakistan-India’s Line of Control. The advisory warned people to keep themselves away from political protests being held in the country,  especially those ‘fuming anti-west sentiments’. Foreign, Commonwealth & Development Office further advised people to keep updated with local news. It said these public gatherings can turn violent and escalate quickly. British nationals were further told to keep vigilant about the weather updates in Pakistan during their travel. Source: https://pakobserver.net/uk-fresh-travel-advisory-warns-of-possible-terror-attacks-in-pakistan/

UK Issues Pakistan Travel Advisory Read More »

News
1-8.jpg

Kidnapping Country Report

KIDNAPPING/ ABDUCTION OF CHILDREN Child abduction or child theft (Wikipedia ) is the unauthorized removal of a minor (a child under the age of legal adulthood) from the custody of the child’s natural parents or legally appointed guardians. The term child abduction includes two legal and social categories which differ by their perpetrating contexts: abduction by members of the child’s family or abduction by strangers: Parental child abduction is the unauthorized custody of a child by a family relative (usually one or both parents) without parental agreement and contrary to family law ruling, which may have removed the child from the care, access, and contact of the other parent and family side. Occurring around parental separation or divorce, such parental or familial child abduction may include parental alienation, a form of child abuse seeking to disconnect a child from the targeted parent and denigrated side of the family. This is, by far, the most common form of child abduction. Abduction or kidnapping by strangers (by people unknown to the child and outside the child’s family) is rare. Some of the reasons why a stranger might kidnap an unknown child include: extortion to elicit a ransom from the parents for the child’s return illegal adoption, a stranger steals a child with the intent to rear the child as their own or to sell it to a prospective adoptive parent human trafficking, stealing a child with the intent to exploit the child themselves or through trade to someone who will abuse the child through slavery, forced labor, or sexual abuse. Most people are aware of kidnappings but might not be knowing the reasons and the volume. I will not make the people dreaded and terrified of the kidnapping data but just for the information, few statistics will be mentioned to have the right impression of sensitivity. Open sources reveal the data as under. Around 8 million children are reported missing each year worldwide. Teenagers particularly girls are kidnapped for trafficking (for sex). In 2020, almost 400 000 juveniles got abducted in the US. Around 20 000 children become missing annually in Australia. In India, around 100 000 children go missing every year. Thousands of children get abducted and sold in China. A child gets reported missing every two minutes in Europe. The figure exceeds 6.0 kidnappings out of 100,000 in Pakistan New Zealand is the country with the top child abduction rate. 9.5 kids get kidnapped per 100 000 citizens. As the 2020 statistics show, one in six children who ran away from home was a part of child sex trafficking. There are major two types of kidnappings/ abductions. By the Family members/relatives / Known People Non-Family members / Strangers Other Interesting Facts are. The age group that gets abducted the most is teenagers, especially girls. Where the abduction rate is more (Places / Locations / Timings) the child on their way to or from school, in parks, in the streets, etc Generally, abductions are found in the afternoon (Around School Timings, Park Timings). Safety and Security Measures: – Children Should Never say they are alone if they answer the phone/ mobile. Avoid answering the door if you are alone. No gifts from strangers. Not going far away for playing. Do not play in isolated areas. Know your telephone number and mobile numbers. Know that no one has the right to touch any part of their bodies Do not go into the vehicles of anyone else other than your car. Parents Should Newly born babies are mostly kidnapped from hotels or maternity homes etc. Most of the nurses are involved too. Never leave the child unattended. Parents should be aware of the new changes the child is adopting. Parents should keep a friendly environment with their children and listen to their problems. Always teach them to tell the truth Never leave them alone Always pick up and drop the children to school yourself and or hire a trustworthy driver. Children who go work should also go with friends and family Educate the children that adults do not need any help from them. Make them understand if anyone tries to kidnap them so shout for help. Stop the children to take and give a lift The parents should always have fresh pictures of their children Keep medical records of children Memorize them their home number and close friends The parents should make one (ID bracelet) for their children which should have an aluminum plate on which the following should be written Short name of the boy Phone number of the home Home addresses Tell them when you are being kidnapped throw the bracelet which has the following benefits The Place of Kidnapping Easement in the investigation of police Anyone can pick that bracelet and inform at their homes which can help the parents to a great extent The kidnappers try to smuggle the children out of the country if you have already made their passport then it is a little difficult to make another passport which can buy you time and can help you in the investigation. Advise the children not to talk with strangers even though anyone is too friendly especially when you are away from home so tell them if anyone is coming towards them so run away. If you teach the children martial arts again that is very awesome at the time of difficulty, he can use modern martial techniques and can defend himself and he should know some other defending techniques too. Tell children not to give any personal information on Facebook, any home address, street number, or any other information, and always tell them not to meet any Facebook friends. Educate the children not to invite any relative as a guest or any of their friends because anything wrong may happen. Tell the children not to take anything from others to eat. Make children believe that what so ever the parents say, teach they are always right and if anyone says against that so they should be

Kidnapping Country Report Read More »

News
PM0czGKEqDauUI45EUXAmUqIbEtwCR00CeJ5aE03f.jpg

US, China Ships Clash at Sea

A US Navy destroyer sailed near the disputed Paracel Islands in the South China Sea and sparked yet another confrontation between the US and China for the second day in a row. The first confrontation occurred on Thursday when the USS Milius guided-missile destroyer sailed near the group of islands. On Friday, the ship was spotted again in the vicinity of the islands, as part of a “freedom of navigation operation” challenging requirements from China, Taiwan, and Vietnam, that require advance notification or permission before a military vessel can pass through.

US, China Ships Clash at Sea Read More »

News

Business Security and Good Practices

Business Security and Good Practices Business security isc1 paramount important for thriving your business. You must be aware of workplace violence, business espionage, and identity theft issues, and confidentiality requirements dictate that your business must be safe from every side. Here we evaluate the requirement of all types of security to secure our businesses. Types of Security We can divide security into two parts, Physical Security and Technical or E-Security (Electronic Security). Concept of Physical Security Arrangements Physical security can include may include following. External Security Arrangements for a facility Access Control Arrangements Closed Circuit Television Arrangements and sensors Intrusion Detection Arrangements Promote External Security Arrangements Early warning systems like fences linked with the alarm system Security Gate Systems (Vetting arrangements) Bollards: Fixed & Electrohydraulic Vehicle Entry Barriers Guard Shelters Security Guards Security Lights Access Control Arrangements Turnstiles Walkthrough gates Identifications and vetting of each entry Logs Biometric arrangements for identification and record keeping. Security Guard Checks Explosive detectors Metal Detectors Closed Circuit Television Arrangements and Sensors Common Types of Security Sensors in Modern Security Devices Infrared (IR) Security Sensors. Photoelectric Beams. Microwave Sensors. Tomographic Motion Detection Sensor. Microphones. Glass Break Sensors Vibration Detection Systems IP Video Systems Analog Video Systems Hybrid Video Systems Digital Video Recorders (DVR) Network Video Recorders (NVR) PTZ Components Promotes Promotes (Protection arrangements during moves) are very important for all VIP movements. VIPs always need close protection (Bodyguards, CPOs, Bouncers, Well trained guards). The following arrangements may be planned according to the threat in the environment and keeping in view the associated risks. The undermentioned arrangements can be done according to the needs. Escort Vehicles Escort Guarding Body Guards or the trained security guards Bouncers All must be with superior weapons if needed according to the situation. Document Security “Out of Bound” be written on a visible entry place where your documents are kept. None should be allowed to go into that office except the authorized persons. All physical documents must have electronic data and all electronic data must have physical data. Good Business Practices Reichert Security carries out analysis for different incidents to determine the corrective measures. Here few good practices are being mentioned for the business. The same may help you to deal with physical and technical security. Quickly change alarm and login passwords when an employee leaves the company. Require employees to update passwords regularly or employ a password keeper. Thoroughly check employment references and conduct background checks. Keep evacuation plans updated Keep parking lots and building exits well-lit. Use keyless locks Invest on CCTV In/out records Ensure Punctuality Carryout stakeholders’ engagements Keep equipment serial wise Fix Walkthrough gates., There are several walkthrough gates, different types, and categories. Invest in a good walkthrough gate which should give good results. You can google for walkthrough gates, and check good companies. Few Chinese companies are found in making walkthrough gates and delivering to Pakistan at a much cheaper rate. If you need walkthrough gates in bulk, may contact directly with the foreign vendor otherwise you can purchase or can get on rent the walkthrough gates. Keep Good Security Guards, Bodyguards, Bouncers, or escort guards for your and the security of your facility. It’s said that you have security or you don’t have one. There is no word of having normal security. So always keep good security guards Besides good guarding, Keep door entrances clear of undergrowth like shrubs/trees, or other objects that block visibility. If you deal with cash and physical checks, vary bank drop-off times or use an armored transport service. Track all company-owned equipment, including serial numbers, and store information off-site. Conduct building walk-throughs before closing for the day. Implement a clear desk policy. Keep the area or the facility well-lit. What Physical Security Best Practices Don’t Look Like (Extract of an article by Andrew Tyler, a certified Security Engineer) Some organizations think that blocking physical access to the data center, such as by having it behind a locked door with only one entrance or exit, is enough. However, there are quite a few more elements that would need to be involved there. Just tracking ingress and egress to the building or to the data center doors itself does not provide a full complement of security compliance. If you’re not logging access to this secure area, you’re also missing some best practice (and likely compliance) requirements. The clipboard sign-in sheet next to the door isn’t going to cut it here either. You want to be able to see the point in time who accessed that area, when they accessed it, where they went, and what they did. Many log structures are done by badge access or biometrics. While these seem secure on paper, there are some definite flaws in just relying on them for physical security. Consider scenarios where a badge, key fob, etc. is lost or stolen. The badge is assigned to a certain person, so your logs say it was that person that accessed your data center when in reality it was likely someone with bad intent in that scenario. You may contend that biometrics could fix that problem but they have their blind spot: consider how that log would look if your employee was leading a customer tour or scanned a co-worker in while they were both chatting in front of the data center. Though these situations may not seem worrisome, a would-be criminal could employ social engineering tactics to plant themselves among that tour group and your employee may not be aware before they scanned that entire group in. Typically, this is where something like video monitoring can help. You get recorded, historical insight into that secure area access. However, there are also some underlying security issues with the typical video system setup that the average business uses. Most video systems being used in the average business place are for ingress and egress. They’re typically DVR-associated systems and the cameras are mounted in strategic locations to track just access to the building. But putting that DVR device

Business Security and Good Practices Read More »

Articles
1-5.jpg

Walkthrough Gates and Metal Detectors

Understanding and Selecting Walk-Through Security Metal Detectors Walkthrough Gate Walk-through metal detectors fall into one of two general categories. The first style of walk-through metal detectors provides single-zone detection. The second style provides multi-zone detection. Basic multi-zone detectors like the Garrett MT 5500 will identify whether the target is on the left side or right side. To understand the difference, I will provide a quick example. Let’s say that an individual walk through the opening of the metal detector with a concealed weapon located at their ankles. Both the single and multi-zone detectors will locate the target. The difference between the two is that the multi-zone detector will be able to identify the location of the target, on either the left or right side of the individual. More advanced multi-zone detectors like the Garrett PD 6500 will pinpoint the specific location from head to toe and on the left or right side. Pinpointing the location of the target quickly is important so that your security personnel can respond swiftly. Larger crowds require greater throughput. If you are scanning a large volume of individuals, a multi-zone metal detector will let you process more individuals quicker. Single Zone Walk Through Metal Detectors (walkthrough gate­) Garrett Magnascanner CS 5000 (walkthrough gate­) Garrett Magnascanner MS 3500 (walkthrough gate­) Multi-Zone Walk-Through Metal Detectors: Garrett Magnascanner MT 5500 (walkthrough gate­) Garrett PD6500i (walkthrough gate­) Fisher M-Scope Portable Walk-Through Security Metal Detector (walkthrough gate­) What are the typical locations and uses for a walk-through gate metal detector? At one time, security metal detectors were primarily seen just in airports and correctional facilities. Today we see walk-through detectors in a variety of locations including police stations, nightclubs, schools, public and private buildings, and corporate workplace security. They are also used in manufacturing facilities, warehouses for loss prevention, nuclear facilities, transportation terminals, courthouses, historical landmarks, sporting events, arenas, and at concerts. One of the first places to pick up a walk-through detector from us was a roller skating rink, and that was nearly 25 years ago. Choosing the best configuration. Will your detector be set up at one location or do you plan to move the detector from location to location? If you will be moving the detector often, you will want a lightweight portable walk-through metal detector or one that can be moved easily. Setup and operation: Modern security walk thru detectors are easy to set up and operate. Each unit will come with a detailed manual and instructional setup video. Digital electronics are easily adjusted through a touchpad and LCD. The walk-through metal detectors come with factory preset programs. You can adjust the detectors for your specific location or the type of object that you are looking to locate. Based on the level of sensitivity that you choose, the detector can be adjusted to locate various targets. Controlling the flow of traffic is important when setting up your metal detector. You will want to be sure that all individuals that enter or leave the building are directed through the detector. It is a good idea to have a basket or tray set up next to the metal detector for individuals to place any metal objects in. Watches, coins, keys, belts, and other large metal objects must be removed before walking through the detector. The better organized you are, the better your throughput will be. Do I need a security metal detector wand? You can think of the walk thru detector as the general screening device. Once you have identified that an individual has a concealed item, you will need to precisely pinpoint it. A metal detector wand will let you locate the target quickly. Security wands will alert you to the target with an audible tone, target identification light, vibration, or a combination of the three. The wand metal detector is a required accessory for use with the walk-thru gate. Metal Detector Security Wands featuring Audio and Vibration Alerts: Garrett Superscanner (walkthrough gate­) Garrett Superwand (walkthrough gate­) Fisher CW-20 Hand-Held Security Metal Detector Wand (walkthrough gate­) Fisher CW-10 Hand-Held Security Metal Detector Wand (walkthrough gate­) Metal Detector Security Wands featuring Vibration Only Alerts: Garrett THD (walkthrough gate­) Rolling out your security plan: While it is a significant investment, do not get too caught up on the cost of acquiring your walk-through metal detectors. Your largest expense will be the annual cost of security personnel to operate the equipment. While you may already have staff on hand, you might find that you will need to allocate funds to increase staffing. Armed with a good knowledge of your organization and the available types of security metal detectors, you are now ready to choose the best equipment. We are here to help you put the pieces of the puzzle together. Feel free to speak with one of our Security Product Specialists to discuss your specific needs. Understanding and Selecting Security Guards / Bouncers By Imtiaz Ahmad Malik, First of all, you need to select a security company that is doing superior work in the field. Just seeing on the internet a few renowned security companies wouldn’t suffice. You need to check for the repute and response. When selecting a company, you may ask your friends and family, to see which security company is ISO Certified. Evaluate its work history, check all credentials, held meetings, must see who is heading the company in that area like the CEO. You should know that CEO is highly professional and know the job. His backtrack must tell you that he /she has been working in renowned security setups or has worked in Multinational companies or UN (Projects or directly worked in UNDSS). If the CEO or the chairmen does not have a security background that too of international organizations, it’s likely that you may face problems in getting better services. If you need Security guards, bodyguards, Escort guards, persons for close protection, Executive protection, travel security or you need home security, you need to select a company with all care. Most renowned companies in

Walkthrough Gates and Metal Detectors Read More »

Articles

Bodyguard and his Responsibility

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat, is a result-oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in the Pakistan Army. Managing international organizations and operations with proven success (From Imtiaz Ahmad Malik, CEO of Reichert Security) A bodyguard (or close protection officer/operative) as per Wikipedia definition is a type of security guard, government law enforcement officer, or servicemember who protects a person or a group of people — usually high-ranking public officials or officers, wealthy people, and celebrities — from danger: generally theft, assault, kidnapping, assassination, harassment, loss of confidential information, threats, or other criminal offenses. The personnel team that protects a VIP is often referred to as the VIP’s security detail. In layman’s language, Bodyguards are security operatives with superior experience and acumen having direct interaction with the principal. Bodyguards have specialized training. They are often a part of the security team or they perform independently. Bodyguards generally know the activity schedule of the principal and plan their moves and perform responsibilities accordingly. Bodyguards keep the information confidential. Numerous people hire bodyguards for the reason that they are in the public eye and there could be several associated risks. For example, celebrities face risks from overzealous fans and from people who do not like their work as a belief. Similarly, some people always want to take advantage of a VIP, s wealth. Few hire bodyguards who are rich, famous, famed, and celebrated, hence feel threatened. Revelries and jealousy could be another reason to feel at risk. There could be many reasons creating a real demand to have professional bodyguards for safety and security. Prime Responsibility of a Bodyguard The bodyguard must be a skilled person to prevent and mitigate threats. A bodyguard must be able to stand in front of danger. Bodyguards should assess the imminent threats, and security issues and devise a strategy to tackle the same. The work of a bodyguard is extensively challenging and sensitive. Other skills Correct assessment of the situation Reading the imminent Excellent judgment Common sense Must know teamwork and should be able to perform Stout and healthy Must have good training Weapon handling Preferably should have the driving Calculative decision-making ability Physical health Trustworthy Communication skills must be good Good height and must look like a Truthful Uniform Bodyguards that protect high-risk principals may wear safety Jackets or body armor. The bodyguard may also have other ballistic shields, such as Kevlar-reinforced bags/jackets. The principal does not have grave threats, a bodyguard can wear a normal but smart uniform comfortable enough to perform his duties without any trouble. Weapons Bodyguards can be armed, without armed depending upon the law of the land and the prevailing threats. Difference between Bodyguard and the Bouncer “As per Wikipedia, A bouncer (also known as a doorman or door supervisor)[1] is a type of security guard, employed at venues such as bars, nightclubs, cabaret clubs, strip clubs, casinos, hotels, billiard halls, restaurants, sporting events, or concerts. A bouncer’s duties are to provide security, to check legal age and drinking age, to refuse entry for intoxicated persons, and to deal with aggressive behavior or non-compliance with statutory or establishment rules” Just to understand the difference between both “A bouncer is a security doorman who refuses entry to an individual or makes them leave an event if they are deemed to be too intoxicated or causing trouble. Bodyguards are employed to protect individuals from assassination attempts, kidnapping, or other attempts on their physical well-being”. ” The bodyguard is tasked with protecting one certain individual or a small group from physical harm. Unlike bouncers, they’re likely to be armed, where permitted by law”. Deniss E. Bolužs Difference between Security Guard and the Bodyguard The difference between both is a bodyguard is responsible for one or more individuals whereas a security guard is responsible for one or more premises. Who may require a bodyguard? Celebrities Government officials Wealthy individuals Individuals who have been threatened in some way Event Companies for the events like High Marriages People who are celebrating events at home (for temporary reasons). Anybody renowned The one who faces some risks due to any reasons Travelers Persons who need protection due to any reasons Responsibilities / Duties The major role of a bodyguard depends on several factors. The protection role is given by the security company or the security Can be assigned the responsibility of close Escort guarding role IED detection if the area is sensitive Surveillance and checking and monitoring are not to be under surveillance. Direct interaction with the principal Assessing potential threats Neutralizing any snatching, kidnapping, or harassment attempts to the Crowd control How Bodyguard Squad Works – Concepts and Procedures We will not discuss here the hiring procedures but purely will deliberate on concepts and work modalities. The concept is to know the threats and associated risks to the principal. Bodyguard gets the planned schedule of all activities well before time. A team leader or in an individual capacity makes the plan for the safety and security of his principal or the group. Arranges transportation, assess the route clearance, destination hazards, security arrangements, location of safe havens, etc. He plans his activities keeping in view the principal activities if the principal is traveling, he would see whether the Principal is traveling by Railway or public transport or moving by plane, where he has to attend the meetings, etc. He will ensure that his coordination about safety and security is complete. He keeps all confidential. When the principal exposes himself to a range of risks mingling up in public or participating in rallies and addressing a large audience, the team leader of the bodyguard squad plans for foolproof protection. The bodyguard team leader seeing the itinerary plans one or more bodyguards for hanging over security to check whether the route is completely clear or not. Clearance of Car / Vehicles The bodyguard clears the car /vehicle for the principal and does not leave it unattended

Bodyguard and his Responsibility Read More »

Articles
2-6.jpg

Physical Security Audit And Assessment

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat, a result-oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in the Pakistan Army. Managing international organizations and operations with proven success (From Imtiaz Ahmad Malik, CEO of Reichert Security) Security audit and assessment aim to check the security installations, security procedures, missing trails, compliance, desired impacts, and effectiveness of the existing security. It is evaluated keeping in view the associated risk levels. Security cannot be planned and glassed with a view “a size fits to all” as every facility, and every area would dictate different security demands about size, equipment, security gadgets, weapons, and even the security company to be selected. For example, Reichert Security and onyx security are known for superior guarding (best bodyguards and bouncers) in Pakistan while HLS, Phoenix, fearless, and ADT are famous for providing alarm systems. Some of the companies are renowned for the protection of cellular sites like Reman Security and Pacific Security. What is a Physical Security Audit?  Perceptions and Misconceptions of Physical Security Audit and Site Security Audit There is a difference between Physical security audit and a site security audit. Physical security means only those features and procedures that need to be audited linked with the protection of people, property, and information. Site security audit shall cover all aspects of security including, general area threat assessment, security plan, security manual, security team, physical security, crisis management, emergency responses, training, reviews, and improvements. A security audit is a constant activity that must be done periodically. A size and one-size-fits-all both strategies do not work here. It can be feasible in the field of clothing or education and other fields or the industry. Installation of security systems or the quality of guards you hired last year not necessarily would work this year as well, they may not meet the current standards for protection and reliability. You don’t have to wait until a big disaster has taken place to carry out the security audit. For example, a fire took place in a renowned trade center in Lahore and 50 percent of the building was destroyed, and damage to millions had occurred. Fire alarm systems and other gadgets have been installed after considerable damage. So, need not wait, carry out the audit of existing security and eliminate the risks without fail. Very trained security professionals are available in the market and can be requested to carry out the security audit. Prepare a checklist with the security vendor company, identifying the naked security, gaps, and other weak links, reviewing the risk levels, and trying to mitigate the potential risks. Excellent and large organizations have dedicated compliance teams, Monitoring and Evaluation teams (M &E), or Monitoring-Evaluation-Accountability and Learning groups (MEAL sections) to perform such activities to keep things working in a befitting manner. Security experts carry out audits generally once a year however the interval can be reduced or increased keeping in view the change in the security environment. It is to be remembered that risk assessment is different as compared to security audit. In a security audit, experts see the naked security (security gaps) in existing physical security whereas risk assessment is an altogether different activity. In a security audit, work is done on existing and already complied parameters, documents, and SOPs. Threat Perceptions Threats prevail in the environment. Managers need to know the nature of business and associated risks. Threats could be many but it must be identified which type of risk could harm their business about physical security. After classifying the risk, mitigation measures should be worked out for physical security. We observe that the under-mentioned threats to different businesses are common. Burglary and destruction Break-in or robberies Data stealing Fire Target Killing IED Attacks Physical attacks Harassment Kidnapping Terror activities Corruption Misuse of equipment and vehicles Access control Access Control (AC) Systems have to be strong for superior protection. Just deploying the security guards on a gate or installing a walkthrough gate doesn’t mean that access control protocols have been completed. Access Control is a system that prevents every type of entry which can harm the business. Identification of the risks is not the responsibility of the security guard but this is the obligation that has to be performed by the management. Security breaches generally occur in conjunction with a physical breach of access control. AC starts with a simple security guard at the door and goes to ID badges, walkthrough gates, mobiles, laptops, and even your daily mail. Checking on AC authorization is imperative. The security audit will help the organization devise the SOPs to save all the employees and assets from a major disaster. The following may be checked critically. Mechanical and electronic measures (resistance time), Personnel measures (Security Guards), Psychological measures (martial deterrents), and Architectural measures (E.g. revolving door, etc.). Barriers and Access Hardening For hardening the access to the building there could be hurdles to deter the criminals. The same can be Natural and Man-made, for example, natural cover could be some rivers or marshes, etc. Man-made barriers can be fences, barbed wire, gates, doors, windows, locks, walls, etc. Barriers are generally planned to discourage illegitimate entries or access by incident, by force, or by design. Surveillance and detection of unauthorized entries Various implements help to keep the people under surveillance. One can detect unauthorized entries very easily even after hours. Organizations should install surveillance cameras at every entry point of the facility to have an extra eye on all unauthorized movements. The same will help in the performance of other security protocols. It is to be remembered that extra visibility to the management has paramount importance for the success of the business activity. Biometric machines and walk-through gates can be installed to check and deter unauthorized entries. To check weapons and other materials which can cause damage to human life can be checked through metal detectors. The use of an explosive detector is best to identify any entry with an explosive. Ecological Mechanisms

Physical Security Audit And Assessment Read More »

Articles
Scroll to Top

Request A Quote

Pakistan

Risk Level

Terrorism

Environment

Police Stability

Health Risk

Natural Risk

To view the locked country ratings download the 2023 Global Risk Forecast Report and Risk Map.