Physical Security Audit And Assessment


Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success

Physical Security Audit & Assessment



(From Imtiaz Ahmad Malik, CEO Reichert Security)

The aim of security audit and assessment is to check the security installations, security procedures, missing trails, compliance, desired impacts and effectiveness of the existing security. It is evaluated keeping in view the associated risk levels. Security cannot be planed and glassed with a view “a size fits to all” as every facility, every area would dictate a different security demands in relation to size, equipment, security gadgets, weapons and even the security company to be selected. For example, Reichert Security and onyx security is known for superior guarding (best bodyguards and the bouncers) in Pakistan while HLS, Phoenix, fearless and ADT is famous for providing alarm systems. Some of the companies are renowned for protection of cellular sites like Reman Security and Pacific security.

What is a Physical Security Audit?

Perceptions and Misconceptions of Physical Security Audit and Site Security Audit

There is a difference between Physical security audit and site security audit. Physical security means only those features and procedures need to be audited linked with the protection of people, property and information. Site security audit shall cover all aspects of security including, general area threat assessment, security plan, security manual, security team, physical security, crisis management, emergency responses, training, reviews and improvements.

Security audit is a constant activity which must be done periodically. A one size and one-size-fits-all both strategies do not work here. It can be feasible in the field of clothing or in education or in other field or the industry. Installation of security systems or the quality of guards you have hired last year not necessarily would work this year as well, they may not meet the current standards for protection and reliability. You don’t have to wait until big disaster has taken place to carryout the security audit. For example, fire taken place in a renowned trade center in Lahore and 50 percent of the building was destroyed, damage of millions had occurred. Fire alarm systems and other gadgets have been installed after a considerable damage. So, need not to wait, just carryout the audit of existing security and eliminate the risks without any fail.

A very trained security professionals are available in the market, can be requested to carry out the security audit. Prepare a check list with the security vendor company, identifying the naked security, gaps and other weak links, review the risk levels and try to mitigate the potential risks.

Good and large organizations have dedicated compliance teams, Monitoring and Evaluation teams (M &E) or Monitoring-Evaluation-Accountability and Learning groups (MEAL sections) to perform such activities to keep the things working in a befitting manner. Security experts carry out audit generally once a year however the interval can be reduced or increased keeping in view the change in the security environment.

It is to be remembered that risk assessment is different as compare to security audit. In security audit experts see the naked security (security gaps) in existing physical security whereas risk assessment is altogether different activity. In security audit, working is done on existing and already complied parameters, documents and SOPs.  

Threat Perceptions

Threats prevail in the environment. Mangers need to know the nature of business and associated risks. Threats could be many but it must be identified which type of risk could harm their business in relation to physical security. After classifying the risk, mitigation measures should be worked out for the physical security. We observe that under-mentioned threats to different businesses are common.

  • Burglary and destruction
  • Break-in or robberies
  • Data steeling
  • Fire
  • Target Killing
  • IED Attacks
  • Physical attacks
  • Harassment
  • Kidnapping
  • Terror activities
  • Corruption
  • Misuse of equipment and vehicles

Access control

Access Control (AC) Systems have to be strong for superior protection. Just deploying the security guards on a gate or installing walkthrough gate doesn’t mean that access control protocols have been completed. Access Control is a system which prevent every type of entry which can harm the business. Identification of the risks is not a responsibility of security guard but this is the obligation which has to be performed by the management.

Security breaches generally occur in conjunction with a physical breach of access control.

AC starts from a simple security guard at door and goes to ID badges, walkthrough gates, mobiles, your laptops and even to your daily mails. Checking on AC authorization is imperative. The security audit will help the organization to devise the SOPs to save all the employees and assets from a major disaster. Following may be checked critically. Mechanical and electronic measures (resistance time), Personnel measures (Security Guards), Psychological measures (martial deterrents), Architectural measures (E.g. revolving door etc.).

Barriers and Access Hardening

For hardening the access to the building there could be hurdles to deter the criminals. The same can be Natural and Man-made, for example natural cover could be some river or marshes etc. Man-made barriers can be fences, barbed wire, gates, doors, windows, locks, walls etc. Barriers

are generally planned to discourage illegitimate entries or the access by incident, by force or by design.

Surveillance and detection of unauthorized entries

There are various implements which help to keep the people under-surveillance. One can detect the unauthorized entries very easily even after-hours. Organizations should install the surveillance cameras on each and every entry point of the facility to have extra eye on all unauthorized movements. The same will help in performance of other security protocols. It is to be remembered that extra visibility to the management has paramount importance for the success of the business activity.

Biometric machines and walk through gates can be installed to check and deter the unauthorized entries. To check the weapons and other material which can cause damage to human life can be checked through metal detectors.  Use of explosive detector is best to identify any entry with explosive.

Ecological mechanisms and Crime Prevention through Environmental Design (CPTED)

Effective use of built environment leads to have satisfactory feelings being safe and secure. It can reduce the chance of crimes and terror. It can provide the cordial environment for work and live freely. Crime Prevention through Environmental Designs (CPTED) can be applied in existing buildings and in constructions as well. Primarily emphasis of CPTED remains on controlling the crime through creating an environment where social conduct reduces the fear and anxiety of being harm. The atmosphere is developed where conduct of the people is according to the physical environment. This aspect of the physical security forms a setting where only the legitimate activities can take place. Measures should be audited which directly contribute in Crime Prevention Through Environment like organizational policies, checks, reporting systems, the other measures could be mechanical in nature like hardware and technological things such as locks, fencing, biometric etc.  Auditors should observe the natural measures as well like all windows and security pickets are cleared from the visibility point of view and nothing is hindering visibility. Make it a point that no tree or the display is obstructing the direct observation. For the purpose lights can be installed and there shouldn’t be any area known as dark spot. Light is great deterrence.

Emergency response Teams and Rehearsals

If team is not well rehearsed and proper emergency response drills have not been carried out, its likely to have irreparable loss when emergency. Therefore, security manager and his team must be ready to tackle any emergency situation. For the purpose physical security measures are to be rehearsed with due diligence.

Managers to look for the technical and tactical gears as well. It may be ensured that alarm systems and other codes are working and re-tested. It has been observed that technical gears stop working due to not having an alternative of electric supply for the gears to work. CCTV cameras are often found not working and do not help in post incident investigation. Always

check emergency response systems. Physical security strategy should include emergency situation planning.

Security Vendors

Security Managers are those personnel who are managing the security systems like Chief of Security, Security Director, Security Manager, Supervisor, Security Officer (Security Guard). The best way to manage the system through security vendor.   It is essential part of the security audit that security vendor is selected carefully or not. Are the vendor being capable to meet the security needs. Are the credentials of a vendor security company okay, track records, website, other social media presence viz-a-vis ground applications and demonstrations are also pleasing from security perspective. Vendor response capability are to be gauged, quality of training, requirement of the weapons is to be assessed. There could be a choice of having unarmed guards but the ground will dictate or law of the land will guide to take the appropriate decision. If one observes critically, it will be found that few security companies are performing as top-notch security vendors while others trying to make money in which those would be failing too. Hence security vendors have to be selected with all judgements and justifications. During the selection of the security vendor, following must be ensured that security management of the vendor company knows following.

  1. Physical security of humans and assets.
  2. Knows the organizational policies in relation to security (Hiring agency can be share) and can implement the same.
  3. Executive Protection
  4. Close Protection

Risk Assessments

  1. Guards Security Awareness
  2. Celebrity Protection and Management (if hiring to protect celebrities /VIPs)
  3. Workplace Violence Protection
  4. Harassment
  5. Event Protection.
  6. Travel SOPs.

SOPs of COVID-19

SOP on Covid-19 are very important. We pray that things may come to normal situation very soon. Check list of covid-19 be prepared and guards deployed on physical security be briefed.

Lock and Key Systems

A proper SOP of the lock and key system should be devised. Now a days very superior technology has come in the market. The investment in latest gears are not wasted.

Fire Fighting

During the course of audit, experts may check that fire fighting equipment is complete and workable. Smoke area should be kept at a distance from the petrol dumps and flammable items. Sprinklers should be in working condition.

Life Safety

The building complies with all life safety codes and regulations and no outstanding code violations? (Obtain copy of most recent life safety inspection report). Security auditors are required to check that building has sufficient exits and those are well lit and sign posting complete.

Supply Power

Auditors may look into the electricity arrangements of the building. All security equipment linked with electricity should be powered round the clock. They have to see that alternative arrangements are complete in case there is a load shedding. Auditors may check for the quality of wires used in the electric circuit, for the purpose, he needs to check the annual electricity fitness certificate issued by the electrical Engineer. It is essential that certified electrical engineer may inspect all electric circuits annually (Some of the security experts / electric engineers advise the same activity after each two years).  Certificate to that account may be kept in the records. 


It would depend primarily on the type and nature of the program or the business operations that walkie-talkie set are required or not. Usually communication is considered essential part of the security audit. During the course of audit, quality of wireless sets, voice quality and range problems are required to be checked. Using of personal mobiles should be prohibited.

Route Havens

If nature of the business involves travelling in hazards area, it’s imperative to identify the route havens. Criteria for selection of route havens is given in the Reichert Security blogs / website.

Trainings and Tryouts

Training is very important to save the life. It is to be seen that all persons associated with the business or using the facility/ building audited have been fully trained and done life saving drills.


This disclaimer informs readers that the views, thoughts, and opinions expressed in the text belong solely to the author, and not to the author’s company or any company individual. The content is written in good faith, and you may not agree with the opinion. Author has the indemnity to any loss/ damage occurred as a result of implementing on the assessments of the author.


Bodyguard and his Responsibilities


Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success

Bodyguard and his responsibility

(From Imtiaz Ahmad Malik, CEO Reichert Security)

 A bodyguard (or close protection officer/operative) as per Wikipedia definition is a type of security guard, government law enforcement officer, or servicemember who protects a person or a group of people — usually high-ranking public officials or officers, wealthy people, and celebrities — from danger: generally theft, assault, kidnapping, assassination, harassment, loss of confidential information, threats, or other criminal offences. The personnel team that protects a VIP is often referred to as the VIP’s security detail.


In layman language, Bodyguards are the security operatives with superior experience and acumen having direct interaction with the principal. Bodyguards have specialized trainings. They often a part of the security team or they perform independently. Bodyguards generally know the activity schedule of the principal and plan their moves and perform responsibilities accordingly. Bodyguards keep the information confidential.


Numerous people hire bodyguards for the reason that they are in public eye and there could be several associated risks. For example, celebrities face risk from overzealous fans and from the people who doe not like their work as a belief. Similarly, some people always want to take advantage of a VIP, s wealth. Few hire bodyguards who are rich, famous, famed and celebrated, hence feel threatened.


Revelries and the jealousy could be another reason to feel at risk. There could be many reasons creating a real demand to have the professional bodyguards for the safety and security.


Prime Responsibility of a Bodyguard


Bodyguard must be a skilled person to prevent and mitigate threats. Bodyguard must be able to stand in front of danger. Bodyguard should assess the imminent threats, security issues and devise a strategy to tackle the same. The work of a bodyguard is extensively challenging and sensitive.


Other skills

 Correct assessment of the situation

  • Reading the imminent
  • Excellent judgment
  • Common sense
  • Must know team work and should be able to perform
  • Stout and healthy
  • Must have good training
  • Weapon handling
  • Preferably should have the driving
  • Calculative decision-making ability
  • Physical health 
  • Trust worthy
  • Communication skill must be good
  • Good height and must look like a
  • Truthful



Bodyguards that protect high-risk principals may wear safety Jacket or the body armor. The bodyguard may also have other ballistic shields, such as Kevlar-reinforced bags / jacket. Principal if does not have grave threats, bodyguard can wear normal but smart uniform comfortable enough to perform his duties without any trouble.




Bodyguard can be armed, without armed depending upon law of the land and the prevailing threats.


Difference between Bodyguard and the Bouncer


“As per wikipedia, A bouncer (also known as a doorman or door supervisor)[1] is a type of security guard, employed at venues such as bars, nightclubs, cabaret clubs, strip clubs, casinos, hotels, billiard halls, restaurants, sporting events, or concerts. A bouncer’s duties are to provide security, to check legal age and drinking age, to refuse entry for intoxicated persons, and to deal with aggressive behaviour or non-compliance with statutory or establishment rules”


Just to understand difference between both “A bouncer is a security doorman who refuses entry to an individual or makes them leave an event if they are deemed to be too intoxicated or causing trouble. Bodyguards are employed to protect individuals from assassination attempts, kidnapping, or other attempts on their physical well-being”.


” The body guard is tasked with protecting one certain individual or a small group from physical harm. Unlike bouncers, they’re likely to be armed, where permitted by law”.

Deniss E. Bolužs

Difference between Security Guard and the Bodyguard


Difference between both is a bodyguard is responsible for one or more individuals whereas a security guard is responsible for one or more premises.


Who may require a bodyguard?


  • Celebrities
  • Government officials
  • Wealthy individuals
  • Individuals who have been threatened in some way
  • Event Companies for the events like High Marriages
  • People who are celebrating events at home (for temporary reasons).
  • Anybody renowned
  • The one who faces some risks due to any reasons
  • Travelers
  • Persons who need protection due to any reasons

Responsibilities / Duties


The major role of a bodyguard depends on several factors.


  • Protection role given by the security company or the security
  • Can be assign the responsibility of close
  • Escort guarding role
  • IED detection if the area is sensitive
  • Surveillance and checking and monitoring not to be under surveillance.
  • Direct interacting with the principal
  • Assessing potential threats
  • Neutralizing any snatching, kidnapping or harassment attempts to the
  • Crowd control

How Bodyguard Squad Works – Concepts and Procedures


We will not discuss here the hiring procedures but purely will deliberate on concepts and work modalities. The concept is to know the threats and associated risks to the principal. Bodyguard gets the planned schedule of all activities well before time. As a team leader or in individual capacity makes the plan for the safety and security of his principal or the group. Arranges transportation, assess the route clearance, destination hazards, security arrangements, location of safe havens etc.


He plans his activities keeping in view the principal activities like if principal is travelling, he would see whether Principal is travelling through Railway or public transport or moving by plane, where he has to attend the meetings etc. He will ensure that his coordination in relation to safety and security are complete. He keeps all confidential.


When principal exposes himself to a range of risks mingling up in public or participates in rally and addresses to large audience, team leader of the bodyguard squad plans for foolproof protection.


Bodyguard team leader seeing the itinerary, plans one or more bodyguards for hanging over security to check the route is completely clear or not.


Clearance of Car / Vehicles


Bodyguard clears the car /vehicle for the principal and does not leave it un-attended as searched car /vehicle has to be attended by the member of a team. Unattended vehicles are exposed to multiple dangers like some IED can be attached etc.


Bodyguard ensures complete protection of the principal when he /she is coming to the car to travel. This moment is considered critical, as 60% of such attacks happen when the protected person is in or around the vehicle.




Travel is a very crucial activity. It has to be planned by the team leader very carefully. Travelling is always vulnerable to many hazards like target killing, ambush and other route perils. Bodyguard plans the halt points/ rest areas carefully. Ensures that choke points are cleared safely.



On arriving destination, two to three bodyguards (depending upon total strength of the squad) dismount from the vehicles and ensure that the site is cleared from safety and security point of view. When they confirm, give okay to other team members, they open the door and take the client to the final destination using flank procedures. If the principal is moving like shopping plaza or moves to some of the playing ground whose entries are open, bodyguard team splits in to small groups, few move with the principal, other perform monitoring around open entrances and exits while one or more remain around the vehicles. If the Principal is attending a marriage ceremony or the meeting in a secure building, bodyguards need to secure him keeping distance and should look after the entrance gates etc.

Return to secure location

On return the same care is adopted as the duties performed during move to the destination. Exiting from the vehicle and walking to the door exposes the client to risk, so the distance is kept as short as possible to cut down the time it takes to reach the door. Vehicle should be parked in carriage, door locked due to the security reasons.

The team leader will ensure collection of weapons, will make safe and keep it in to the designated place like weapon kote or the weapon box.



 This disclaimer informs readers that the views, thoughts, and opinions expressed in the text belong solely to me, and not necessarily to our company or our employees. There is no responsibility on my part for this article for not proving beneficial to anyone or caused any loss /damaged when implemented

Walkthrough Gates and Metal Detectors


Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success

Walkthrough gates & Metal Detectors

Understanding and Selecting Walk Through Security Metal Detectors Walkthrough Gate

Walk through metal detectors fall into one of two general categories. The first style of walk through metal detectors provides single zone detection. The second style provides multi zone detection. Basic multi zone detectors like the Garrett MT 5500 will identify that the target is on the left side or right side. To understand the difference, I will provide a quick example. Let’s say that an individual walk through the opening of the metal detector with a concealed weapon located at their ankles. Both the single and multi zone detectors will locate the target. The difference between the two is that the multi zone detector will be able to identify the location of the target, on either the left or right side of the individual. More advanced multi zone detectors like the Garrett PD 6500 will pinpoint the specific location from head to toe and on the left or right side.

Pinpointing the location of the target quickly is important so that your security personnel can respond swiftly. Larger crowds require greater through put. If you are scanning a large volume of individuals, a multi zone metal detector will let you process more individuals quicker.

Single Zone Walk Through Metal Detectors (walkthrough gate­)

Multi Zone Walk Through Metal Detectors:

What are the typical locations and uses for a walk-through gate metal detector?

At one time, security metal detectors were primarily seen just in airports and correctional facilities. Today we see walk through detectors in a variety of locations including police stations, night clubs, schools, public and private buildings and for corporate work place security. They are also used in manufacturing facilities, warehouses for loss prevention, nuclear facilities, transportation terminals, courthouses, historical landmarks, sporting events, arenas and at concerts. One of the first places to pick up a walk through detector from us was a roller skating rink, and that was nearly 25 years ago.

Choosing the best configuration.

Will your detector be set up at one location or do you plan to move the detector from location to location? If you will be moving the detector often, you will want a light weight portable walk through metal detector or one that can be moved easily.

Setup and operation:

Modern security walk thru detectors are easy to setup and operate. Each unit will come with a detailed manual and instructional setup video. Digital electronics are easily adjusted through a touch pad and LCD display. The walk through metal detectors come with factory preset programs. You can adjust the detectors for your specific location or the type of object that you are looking to locate. Based on the level of sensitivity that you choose, the detector can be adjusted to locate various targets.

Controlling the flow of traffic is important when setting up your metal detector. You will want to be sure that all individuals that enter or leave the building are directed through the detector. It is a good idea to have a basket or tray setup next to the metal detector for individuals to place any metal objects in to. It is important that watches, coins, keys, belts and other large metal objects are removed before walking through the detector. The better organized you are, the better your through put will be.

Do I need a security metal detector wand?

You can think of the walk thru detector as the general screening device. Once you have identified that an individual has a concealed item, you will need to precisely pinpoint it. A metal detector wand will let you locate the target quickly. Security wands will alert you to the target with an audible tone, target identification light, vibration or a combination of the three. The wand metal detector is a required accessory for use with the walk-thru gate.

Metal Detector Security Wands featuring Audio and Vibration Alerts:

Rolling out your security plan:

While it is a significant investment, do not get too caught up on the cost of acquiring your walk through metal detectors. Your largest expense will be the annual cost of security personnel to operate the equipment. While you may already have staff on hand, you might find that you will need to allocate funds to increase staffing. Armed with a good knowledge of your organization and the available types of security metal detectors, you are now ready to choose the best equipment. We are here to help you put the pieces of the puzzle together. Feel free to speak with one of our Security Product Specialists to discuss your specific needs.

Understanding and Selecting Security Guards / Bouncers

By Imtiaz Ahmad Malik

First of all, you need to select a security company which is doing superior work in the field. Just seeing on internet foe few renowned security companies wouldn’t suffice. You need to check for the repute and response. When selecting a company, you may ask your friends and family, see which security company is ISO Certified. Evaluate its work history, check all credentials, held meetings, must see who is heading the company in that area like CEO. You should know that CEO is highly professional and know the job. His back track must tell you that he /she has been working in renowned security setups or has worked in Multinational companies or in UN (Projects or directly worked in UNDSS). If CEO or the chairmen does not have security background that too of international organizations, its likely that you may face problems in getting better services. If you need Security guards, bodyguards, Escort guards, persons for close protection, Executive protections, for travel security or you need home security, you need to select a company with all care.

Most renowned companies of Asia do not provide the services to every client. They select their target market and work in the same. Few good security companies do not provide single security guard, those companies deal in bulk. In Pakistan very few companies have the expertise in training of Body guards and CPOs. Those companies working in provision of Bodyguards are very few in Lahore. If you are in need to travel somewhere or have some event like high marriages or you need to have good protocol with superior bodyguards, CPOs, or the escort guards, you can google , see the website instead of face book, read the blog, look for the services and select your security company for initial stage. In second phase, talk to them, see their professional approach instead flowery offers and attractive discussion. You should be clear on following.

* Full licensure according to state and local laws

* Reputation with previous clients and certifications like ISO certification.

* References

* Policies

* Equipment and weapons

* Management Policies

* Cost vis-à-vis quality

* Responsiveness of a security company

Business Security and Good Practices


Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success

Business Security & Good Practices

Business security is paramount important for thriving your business. You must be aware of workplace violence, business espionage, identity theft issues and confidentiality requirements dictate that your business must be safe from every side. Here we evaluate for the requirement of all types of security to secure our businesses.

Types of Security

We can divide the security into two parts, Physical Security and the Technical or the E Security (Electronic Security).

Concept of Physical Security Arrangements

Physical security can include may include following.

  • External Security Arrangements for a facility
  • Access Control Arrangements
  • Closed Circuit Television Arrangements and sensors
  • Intrusion Detection Arrangements
  • Promove

External Security Arrangements

  • Early warning systems like fence linked with the alarm system
  • Security Gate Systems (Vetting arrangements)
  • Bollards: Fixed & Electrohydraulic
  • Vehicle Entry Barriers
  • Guard Shelters
  • Security Guards
  • Security Lights

Access Control Arrangements

  • Turnstiles
  • Walkthrough gates
  • Identifications and vetting of each entry
  • Logs
  • Biometric arrangements for identification and for record keeping.
  • Security Guard Checks
  • Explosive detectors
  • Metal Detectors

Closed Circuit Television Arrangements and Sensors

Common Types of Security Sensors in Modern Security Devices

  • Infrared (IR) Security Sensors.
  • Photoelectric Beams.
  • Microwave Sensors.
  • Tomographic Motion Detection Sensor.
  • Microphones.
  • Glass Break Sensors
  • Vibration Detection Systems
  • IP Video Systems
  • Analog Video Systems
  • Hybrid Video Systems
  • Digital Video Recorders (DVR)
  • Network Video Recorders (NVR)
  • PTZ Components


Promoves (Protection arrangements during moves) are very important for all VIP movements. VIPs always need close protection (Bodyguards, CPOs, Bouncers, Well trained guards). Following arrangements may be planned according to the threat in the environment and keeping in view the associated risks. Undermentioned arrangements can be done according to the needs.

  • Escort Vehicles
  • Escort Guarding
  • Body Guards or the trained security guards
  • Bouncers
  • All must be with superior weapons if needed according to the situation.

Document Security

“Out of Bound” ne written on a visible entry place where your documents are kept. None should be allowed to go into that office except the authorized persons. All physical documents must have an electronic data and all electronic data must have physical data.

Good Business Practices

Reichert Security carryout analysis for different incidents to determine the corrective measures. Here few good practices are being mention for the business. The same may help you to deal with the physical and the technical security.

Quickly change alarm and login passwords when an employee leaves the company.

  • Require employees to update passwords regularly or employ a password keeper.
  • Thoroughly check employment references and conduct background checks.
  • Keep evacuation plans updated
  • Keep parking lots and building exits well lit.
  • Use keyless locks
  • Invest on CCTV
  • In/out records
  • Ensure Punctuality
  • Carryout stakeholders’ engagements
  • Keep equipment serial wise
  • Fix Walkthrough gates., There are number of walkthrough gates, different types and categories. Invest for good walkthrough gate which should give good results. You can google for walkthrough gates, check good companies. Few Chinese companies are found in making walkthrough gates and delivering to Pakistan with a much cheaper rate. If you need walkthrough gates in bulk, may contact directly with the foreign vendor otherwise you can purchase or can get on rent the walkthrough gates.
  • Keep Good Security Guards, Bodyguards, Bouncers or the escort guards for yours and foe the security of your facility. Its said that you have a security or you don’t have. There is no word having a normal security. So always keep good security guards
  • Beside good guarding, Keep door entrances clear of undergrowth like shrubs / trees, or other objects that block visibility.
  • If you deal with cash and physical checks, vary bank drop-off times or use an armored transport service.
  • Track all company-owned equipment, including serial numbers, and store information off-site.
  • Conduct building walk-throughs before closing for the day.
  • Implement clear desk policy.
  • Keep the area or the facility well lit.

What Physical Security Best Practices Don’t Look Like

(Extract of an article of Andrew Tyler, a certified Security Engineer)

Some organizations think that blocking physical access to the data center, such as by having it behind a locked door with only one entrance or exit, is enough. However, there’s quite a few more elements that would need to be involved there.

Just tracking ingress and egress to the building or to the data center doors itself does not provide a full complement of security compliance.

If you’re not logging access to this secure area, you’re also missing some best practice (and likely compliance) requirements. The clipboard sign in sheet next to the door isn’t going to cut it here either.

You want to be able to see point in time who accessed that area, when they accessed, where they went, and what they did.

Many log structures are done by badge access or biometrics. While these seem secure on paper, there are some definite flaws in just relying on them for physical security. Consider scenarios where a badge, key fob, etc. is lost or stolen.

The badge is assigned to a certain person, so your logs say it was that person that accessed your data center when in reality it was likely someone with bad intent in that scenario.

You may contend that biometrics could fix that problem but they have their own blind spot: consider how that log would look if your employee was leading a customer tour or scanned a co-worker in while they were both chatting in front of the data center.

Though these situations may not seem worrisome, a would-be criminal could employ social engineering tactics to plant themselves among that tour group and your employee may not be aware before they scanned that entire group in.

Typically, this is where something like video monitoring can help. You get recorded, historical insight into that secure area access. However, there’s also some underlying security issues with the typical video system setup that the average business uses.

Most video systems being used in the average business place is for ingress and egress. They’re typically DVR associated systems and the cameras are mounted in strategic locations to track just access to the building.

But putting that DVR device inside the data center – which isn’t uncommon – can defeat the whole purpose of having the cameras in the first place, since it’s easy to steal and provides a single point of failure for the entire environment.

Another potential tripping point is lighting. As I mentioned above, having only a basic light switch controlling the lighting in your data center won’t do your video system much good as it’s unlikely an individual looking to do something unsavory is going to turn the lights on beforehand.

A better option is motion activated lights. These will automatically turn on when they detect movement within their coverage range – literally shedding some light on the situation as your video system rolls.

Based on the above, lets assume a business has this not uncommon setup: check-in at the front desk, badge-only access to the data center, a DVR video system in the data center with a camera mounted inside the data center, and standard lighting. This checks off many of the basics on paper. Here’s a common scenario that can play out with that setup:

Andrew Tyler is a certified Security Engineer with Contegix. He believes in persistence, technical excellence and creativity in developing solutions.

Access Control


Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success


Access control is paramount important for the security of coworkers and for the safety and information. For superior access control systems, the organization can have layered security which restricts all unauthorized entries in a befitting manner. The access control system should provide complete record of in/outs, Stay time, movements, authorized access attempts and unauthorized access attempts. Similarly, information security is protected. Information should travel on need to know basis.


The definition (Wikipedia) of access control is, In the fields of physical and information security, access control (AC) is the selective restriction of access to a place or other resource. Permission to access a resource is called authorization.

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft or terrorist attacks whereas information security is the practice of protecting information by mitigating information risks, It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure,  disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.


First of all we see the risks of access control then we can easily evaluate the mitigations and counter measures and good practices.


It is for sure that aantivirus won’t stop a physical attack but for the purpose, physical security would be required.  Without proper protection measures in place, your business is left vulnerable to physical threats.

Deceptions in Access Control

Most workplaces are secured by some type of access control, whether a locked door or a swipe-card access point. These physical security measures are, unfortunately, easily deceived.

When multiple people pass through doors, and only the front person shows identification or swipes card. The people following behind get the opportunity to get success without following the access control protocols.   

1.      How to overcome the Deception

  • Fixing of anti -tailgating doors.
  • Deployment of hi-quality guards
  • Implementation of access control policy strictly.
  • Hardening Physical Access Control Measures

(1) Physical access control can be made harden to stop the vehicles through barriers, bollards, crash gates (Steel Gates with sliding designs), vedge, Drop Arm (Could be manual or the electronic).

(2). Portable barriers can also be used like plastic barriers which can be lifted on place to another. The same barriers can be devised also. The aim must be cleared that barriers should work efficiently to block or stop the vehicles.

Bollards can be fixed, moveable. Steel bollards are generally fixed and the plastic bollards can be removed easily and shifted from one point to another.

(3). For the facility entry turnstile gates integrated with electronic device can prove effective measure for the control entry of the pedestrians.

Theft of documents

Your office is likely to have papers and documents lying around in many places, from desks to printer stations. Sensitive documents can easily become unaccounted for – and fall into the wrong hands. Even if they are not taken from the office, a visitor could see information that you wouldn’t want them to see.

1.      Measures to Overcome

a       Clear Desk Policy.
  • It good to keep your belongings safe. If you are working in a large office or even small office, clear desking policy will help you to keep your belongings safe.
  • You may not have thought over it but by clearing the desk daily, you can save your money by not losing your important documents, project information and other valuable items.
(b)     Keeping Laptop or the computer screen visibility limited. 
(c)     Keeping diaries and note books well within control.

Un-Vetted and unaccounted Visitors and Guard’s duties

Un-vetted and Unaccounted visitors pose a grave risk, they can plan and execute a negative activity selecting their own time and day. For an instance, some incident happens, it would be difficult for the organization to check the details of visitors as they were not recorded.

2.      Check on Visitors

  • Check through Guards
  • CCTV
  • ID Doors and visitor passes
  • Recording
  • Identification cards
  • Biometric for the registered people.


3.      Guards Duties at Access control

a.      Handling the guests and Invitees

The normal procedure for handling the visitor depends on the types of visitors. whether the visitor is planned, unplanned, or a VIP, etc.

    • Guard should complete all the access control protocols in relation to identification. 
    • If advance notification is done through advance notification form, then he may have identification information already and can Talley the data for confirmation. 
    • If guest has some appointment, guard should confirm it by the office barer who has invited him or fixed the appointment. 
    • Guard should issue visitor badge / card before allowing him to proceed inside premises.
    • Record the entries.
b.      Deliveries of Assets /Stores
  • All the organizational SOPs should be implemented. All stores arriving at Access Controlling Points (ACP) should be properly checked as per the given check list.
    • Guard should complete the screening.
    • Make record of delivery items like Parcel, mail, food, commercial goods. Perishable items should be inspected for the its health.
    • None should be allowed to be delivered for which permission is not granted. 
c.       Venders Access
  1. Guard should carryout screening.
  2. Should check authorizations
  3. Nature of visit, if vendor is making visit of some maintenance team, nature of work must be asked.
  4. Recording entries on log book
  1. Issue the proper access badges and record the badge details in the visitor logbook, mentioning date and time.

4. Guard’s ACP Record Details

Guard should maintain following records at ACP.

  • Identifications
  • Verifications
  • Checking authorizations
  • Search of people and the vehicles before allowing to enter.
  • Log Book Entries should include name, ID details, vehicle details, location, pass number issued, time and date, signatures

5. Guard’s Exit check list

  • Search of outgoing vehicle
  • Search of personnel
  • Depositing back of the visitor card already issued,
  • Ensure same vehicle entered the premises /site on which time and date

Employees, at times, commit crime of steeling identifications

You will observe that own employees do not take it as a crime or the offense using someone else’s identification for access or the exit, meaning by there is no access control at all.  The violators may be dealt using organizational policies.


a.      Measures to Overcome
b.      Training
c.      Checks by the Guards
d.      CCTV



Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success


Child abduction or child theft  (Wikipedia ) is the unauthorized removal of a minor (a child under the age of legal adulthood) from the custody of the child’s natural parents or legally appointed guardians.

The term child abduction includes two legal and social categories which differ by their perpetrating contexts: abduction by members of the child’s family or abduction by strangers:

  • Parental child abduction is the unauthorized custody of a child by a family relative (usually one or both parents) without parental agreement and contrary to family law ruling, which may have removed the child from the care, access and contact of the other parent and family side. Occurring around parental separation or divorce, such parental or familial child abduction may include parental alienation, a form of child abuse seeking to disconnect a child from targeted parent and denigrated side of family. This is, by far, the most common form of child abduction.
  • Abduction or kidnapping by strangers (by people unknown to the child and outside the child’s family) is rare. Some of the reasons why a stranger might kidnap an unknown child include:
    • illegal adoption, a stranger steals a child with the intent to rear the child as their own or to sell to a prospective adoptive parent

Most people are aware of kidnappings but might not be knowing the reasons and the volume. I will not make the people dreaded and terrified of the kidnapping data but just for the information, few statistics will be mentioned to have the right impression of sensitivity. Open sources reveal the data as under.

  • Around 8 million children are reported missing each year worldwide.
  • Teenagers particularly girls are kidnapped for trafficking (for sex).
  • In 2020, almost 400 000 juveniles got abducted in the US.
  • Around 20 000 children become missing annually in Australia.
  • In India, around 100 000 children go missing every year.
  • Thousands of children get abducted and sold in China.
  • A child gets reported missing every two minutes in Europe.
  • Figure exceeds 6.0 kidnappings out of 100,000 for Pakistan
  • New Zealand is the country with the top child abduction rate. 9.5 kids get kidnapped per 100 000 citizens.
  • As the 2020 statistics show, one in six children who ran away from home was a part of child sex trafficking.

There are major two types of kidnappings/ abductions.

  • By the Family members / relatives / Known People
  • Non-Family members / Strangers

Other Interesting Facts are.

  • The age group that gets abducted the most is teenagers, especially girls.

Where abduction rate is more (Places / Locations / Timings)

  • the child on their way to or from school, in parks, in the streets, etc
  • Generally, abductions are found in afternoon (Around School Timings, Park Timings).

Safety and Security Measures: –

Children Should

  • Never say they are alone if they answer the phone/ mobile.
  • Avoid answering the door if you are alone.
  • No gifts from strangers.
  • Not going faraway for playing. Do not play in isolated areas.
  • Know your telephone number and mobile numbers.
  • Know that no one has the right to touch any part of their bodies
  • Do not go into the vehicles of anyone else other than your own car.

Parents Should

  • Newly born babies are mostly kidnapped from hotels or maternity homes etc. Most of the nurses are involved too. Never leave the child un-attended.
  • Parents should be aware of new changes the child is adopting.
  • Parents should keep friendly environment with the children and listen their problems.
  • Always teach them to tell the truth
  • Never leave them alone
  • Always pick and drop the children to school yourself and or hire any trustworthy driver.
  • Children who go work should also go with friends and family
  • Educate the children that adults do not need any help from them.
  • Make them understand if anyone tries to kidnap them so shout for help.
  • Stop the children to take and give lift
  • The parents should always have fresh pictures of children
  • Keep medical record of children
  • Memorize them their home number and close friends
  • The parents should make one (ID bracelet) for their children which should have aluminum plate on which following should be written
    • Short name of the boy
    • Phone number of the home
    • Home addresses
  • Tell them when you are being kidnapped throw the bracelet which has following benefits
    • The place of Kidnapping
    • Easement in the investigation of police
    • Anyone can pick that bracelet and inform at their homes which can help the parents in a great extent
  • The kidnappers try to smuggle the children out of the country if you have already made their passport then it is a little difficult to make another passport which can buy you a time and can help you in investigation.
  • Advise the children not to talk with strangers even though anyone too friendly especially when you are away from home so tell them if anyone is coming towards them so run away.
  • If you teach the children martial arts again that is very awesome at the time of difficulty, he can use modern martial techniques and can defend himself and he should know some other defending techniques too.
  • Tell children not to give any personal information on Facebook, any home address, street number or any other information and always tell them not to meet any Facebook friend.
  • Educate the children not to invite any relative as guest or any of his friends because anything wrong may happen.
  • Tell the children not to take anything from others to eat.
  • Make children believe that what so ever the parents say, teach they are always right and if anyone says against that so they should be alarmed that the person is sign of danger.
  • Parents should tell the children that however anyone insists you to sit in his car but they should never.
  • The children should never play outside alone but if they want to then it should be in group.
  • Use latest technology for the safety if your child.