Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

1 min read

Download Our FREE In-House Security Risk Assessment Considerations Guide

Security professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. So now you can download it for free below.

This guide is intended to assist you with recognizing the critical aspects of and performing an in-house security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required. Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount concern. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.

 

Before jumping into your in-house security risk assessment exercise, it’s important to have a good background related to site surveys, risk assessments, and other consultation options available to your organization. When it comes to a risk assessment of your facility, sometimes an in-house assessment can be the perfect starting point before asking for third-party, expert consultation.

Considerations for access control, perimeter detection, intrusion detection, video surveillance, visitor management, and other technologies need to be considered based on the organization’s desired security posture, policies, and daily operational procedures.

REQUEST THE FREE DOWNLOAD LINK HERE >>

 

 

 

 

 

A Clear View

You may be one of millions that caught this scene from The Masters last week. If so, did you think of this as an inspirational moment for your...

Read More

Integrating Disparate Low Voltage and Electronic Security Systems

The trend towards integration of disparate security systems to create a unified solution has gained significant traction over the years. This...

Read More

Explained: Piggybacking versus Tailgating

When it comes to securing sensitive areas of a building, the terms "piggybacking" and "tailgating" often come up. Although they might seem similar at...

Read More