As we look back on 2024, we have much to be grateful for at Integras Intelligence. Our team, capabilities, customer retention and acquisition, and overall development all surpassed expectations, and we’re excited about the future and facing the challenges ahead.
The threats faced by the public and private sectors are constantly growing and evolving, with bad actors lurking everywhere—some in plain sight, others hidden, and many online. Fortunately, we have skilled professionals, emerging technology, and proven methods to prevent, detect, and react to risks.
Despite the efforts of many, some unfortunate events occurred this past year. One of our nation’s strengths, however, is our collective focus on safety, security, and threat prevention. While effective security requires extensive effort, following basic principles can go a long way toward ensuring public safety and security.
As we move into 2025, I wanted to share my thoughts on key considerations when developing and/or evaluating a security program. I hope this information will be helpful for those new to security or with limited resources to create a roadmap for their organizations, while reassuring seasoned professionals.
Tips for General Security Preparedness
- Risk Assessment. Risk profiles vary for organizations and individuals. It is important to understand what the specific risks threatening your organization and to implement a formal program that addresses your unique needs, from cybersecurity and facility security to travel and event security to protection of executives and physical/intellectual property. Assessments need to take place on a regular basis to address changing risks.
- Security Personnel. The security team may consist of in-house personnel, contractors, or a combination of the two. Regardless, organizations need to routinely evaluate staffing levels to address current security needs. Executive protection while at home and during travel must also be considered.
- Emergency/Crisis Response Team. Every organization needs an emergency management team that incorporates various functions across the company (e.g., security, facilities, HR, legal, etc.). This group should conduct regular meetings and drills to prepare for crises. When appropriate, hold after-action meetings at the conclusion of large-scale events and/or incidents.
- Emergency Response Plan. Develop detailed emergency response plans for various scenarios, like fire, active shooter, bomb threats, threatening communications, suspicious packages, evacuation or natural disasters. Conduct employee training and emergency-response drills to ensure personnel know what to do in a crisis. Routinely update the response plan, including emergency contacts and phone numbers.
- Employee Vetting and Training. Conduct background checks on employees before and during employment. Educate employees on security procedures, including how to identify suspicious activity and reporting protocols. Foster a culture of security awareness within the company.
- Intelligence and Social Media Monitoring. Create a system for timely collection and communication of potential threats to an organization and/or its personnel. This can be done internally, using external resources, or a combination of both.
- Investigations and Threat Assessments. Whether relying on an internal team, an outsourced partner, or a combination of the two, it’s important to have experts available to investigate and assess potential threats.
- Mass Communication. Organizations need a communication system in place to keep employees informed throughout an emergency. Employee contact information should be confirmed regularly to ensure accuracy.
Physical Security Best Practices
- Perimeter Security. The first line of defense, perimeter security needs vary depending on the facility type. Consider whether measures such as fencing, gates, barriers, signage, etc., are appropriate for the organization’s risk profile. Ensure proper lighting to provide visibility at all times.
- Access Control. Consider how people access the property and buildings. This includes employees, visitors, contractors, delivery people, and anyone else who comes to the location. Restricting access to authorized personnel typically requires both access policies and security measures, such as ID cards, access points (doors, turnstiles, parking gates, etc.), readers (keypads or card readers) that verify a user’s identity, control panels, etc. Typically, security personnel play a key role in this important function.
- Video Surveillance. Place cameras strategically throughout the premises, particularly at entry/exit points and sensitive areas. Aside from capabilities and quality of the equipment, consider if the cameras will be monitored regularly or reviewed after incidents, how long footage is saved for, ease of use, and integration with other security components, such as access control.
- Alarm System/Panic Buttons. Use intrusion detection systems and alarms to alert security personnel in case of unauthorized access. Install panic buttons at strategic points within facilities, if deemed necessary and appropriate. Written procedures should be developed for responding to these alarms.
- Ongoing Testing. Review and test all measures on a regular basis to ensure proper functionality and to keep policies and response plans current and relevant.
Parting Thoughts on Cybersecurity
Cybersecurity is a key part of almost every organization’s security program and deserves a lengthy article of its own. While it’s not the focus of this piece, I would be remiss in not mentioning a few critical practices.
- Cyber assessments are crucial in determining the needs of an organization.
- Policies and procedures form the foundation of cybersecurity, while vulnerability and penetration testing identify weaknesses before incidents occur.
- An incident response plan is essential if an issue arises.
If you need assistance with developing or evaluating your corporate security program, please contact us at info@integrasintel.com or (212) 871-1274.