Why should you hire a security consultant? What can a security consultant do for your business?
You are an expert in your business, but not necessarily an expert on security. While you may have some thoughts or ideas on your security needs, you recognize that effective security involves a lot more than just putting locks on doors and windows, or installing surveillance cameras or an alarm system. You are not familiar with the latest research on security surveillance cameras, the use of blue light to prevent and deter crime, or on IESNA (Illuminating Engineering Society of North America) guidelines for security light illumination.
You are busy running your business and cannot be expected to know everything. This is where a security consultant can help you. A security consultant can assess your security liabilities and develop a specific and customized security plan that gives full consideration to the upside and downside of all security options.
A security consultant can also provide an objective perspective on your existing security policies and procedures and assist in developing and delivering security training for employees, all with the goal of mitigating your security risks and vulnerabilities in a cost effective manner. Some additional services include:
- Security planning and development
Every business, whether it is a company with just a few employees or a company with hundreds of employees, should have policies, programs, and technologies to reduce the likelihood of security breaches occurring and contingency plans ready in case those security lapses occur. Properly conceived and implemented, security strategies are essential to ensure a company’s resistance and recovery from threats. A one or two person company might be able to keep this information within the head of the business owner or manager, but even a very small company will benefit from putting this information on paper where it can be discussed, reviewed, updated, and put into action.
Critical asset identification
The finite nature of security resources requires prioritizing the deployment of security measures. That means a security analysis should concentrate on the assets that are most critical to the business. These assets vary from business to business but typically include critical infrastructure – those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended period, would significantly impact the economic wellbeing of the company.
- Threat and vulnerability assessments
All businesses face a certain level of risk associated with various threats. These threats may be the result of natural events, accidents, or intentional acts to cause harm. Regardless of the nature of the threat, business owners and managers have the responsibility to limit and manage risks from these threats to the extent possible. Risk assessments can sometimes get confusing and overly complicated. For a more thorough explanation of security risk management refer to article authored by George Babnick entitled “Demystifying Security Risk Assessments”.
- Risk mitigation strategies
Risk mitigation strategies link assets to threats and are action plans to lessen or reduce the adverse impacts of known or perceived risks inherent in a business. Mitigation strategies vary from business to business but can include things like procedural controls, system controls, and personnel training.
- Crime Prevention through environmental design
Crime prevention through environmental design (CPTED) is a physical security concept based upon research that shows that the design and physical layout of buildings and open spaces can lead to a reduction in the fear of crime and the actual incidence of crime. The three elements of CPTED are Territoriality, Surveillance, and Access Control. When used together, these elements strengthen total premise security and personal safety. For a more thorough explanation of CPTED please refer to
Babnick and Associates is uniquely qualified to provide expert physical security consultation services to businesses and individuals. Mr. Babnick personally handles all security consultations for Babnick and Associates and only started offering security consultations after businesses and individuals came to him asking for help. Before he became a private investigator, George Babnick studied physical security, including Crime Prevention Through Environmental Design, at Portland Community College and Portland State University and authored numerous articles on security issues. He is an advocate for using the latest empirical research and time tested “best practices” when making practical and cost effective security recommendations. He is also the editor of a respected blog devoted exclusively to physical security issues, Physical Security Online.
Unlike some “security consultants” Babnick and Associates does not use consulting services as a door opener to sell particular products and services you may or may not need. We are truly independent and do not represent any specific company or a particular technology solution. Additionally, we do not use a “cookbook” checklist approach to assessing security issues. We take the time to understand your business and develop cost effective solutions unique to your security needs.
No one likes to pay for assistance until after a problem shows up but waiting for a security problem to happen could have horrific consequences. Failure on the part of a business to adequately plan and respond to potential security threats can result in increased insurance premiums, major liability awards, business recovery and reconstruction costs, and even injury or loss of life.
In today’s litigious world more and more businesses are being sued for negligent security – either the lack of security or inadequate security. Working with a security consultant to identify security vulnerabilities and develop policies, procedures, and plans to address security issues is one of the most effective ways to reduce liability and improve the overall security and safety of your business.