Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

2 min read

A Holistic Approach to Security Threats and Vulnerabilities

We came across this social media post recently and it got us thinking, "how do you stop the lock picking in the first place, and once picked, what happens next?"

In our security consulting and engineering practice, the solution isn't about any one specific physical or electronic technology system being deployed to solve a problem, it's about the layering of systems to create a safe and secure environment based on a thorough risk and vulnerability assessment of the facility.

So, in this video, while it would be nice to stop the lock picking, we also want to consider what happens before the break-in and then what happens once the door opens:

  • Does a sensor trip and set off an on-premises alert and call a central monitoring station?
  • Does a security camera confirm the threat before sending police to the location?
  • Is a facility manager sent an instant text message?
  • Is there another layer of additional protection on the door like a magnetic lock or electric strike that would keep the door shut?
  • Is there an entry vestibule after this door that is secure and requires access control to continue through?
  • What cameras are inside and outside that door to capture evidence for post-incident investigation?
  • What lighting is outside of the door that would deter this incident from ever starting?
  • Would the lighting be sufficient to keep the security camera(s) in color mode?
  • Is there an automated audio message played that warns the criminal that police are on the way?

 

Our list of additional questions, and suitable technologies, devices, and building design and construction options to solve this problem could go on and on. Contact Theseus Professional Services for security consultation and engineering assistance.

Theseus dialog bubble-1

 

PRO TIP:

FREE DOWNLOAD: SECURITY RISK ASSESSMENT CONSIDERATIONS GUIDE

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine coverSecurity professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. 

What's Inside?

This guide is intended to assist you with performing an in-house physical security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required.

Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount importance. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine cover

 

 

 

The Crucial Role of Third-Party Risk Assessments in Security Planning

When it comes to designing a security solution for a campus or facility, the expertise of a certified professional, such as a Physical Security...

Read More

1 min read

The 5 Ds of Perimeter Security and Why They Matter

There are fences surrounding more properties than you can count in your community alone, strategically working in conjunction with various electronic...

Read More

The Growing Use of LiDAR in Security Applications

The security industry has witnessed a technological improvement with the integration of Light Detection and Ranging (LiDAR) technology into various...

Read More