Theseus - Blog

A Holistic Approach to Security Threats and Vulnerabilities

Written by Theseus Team | Jun 28, 2023 9:21:04 PM

We came across this social media post recently and it got us thinking, "how do you stop the lock picking in the first place, and once picked, what happens next?"

In our security consulting and engineering practice, the solution isn't about any one specific physical or electronic technology system being deployed to solve a problem, it's about the layering of systems to create a safe and secure environment based on a thorough risk and vulnerability assessment of the facility.

So, in this video, while it would be nice to stop the lock picking, we also want to consider what happens before the break-in and then what happens once the door opens:

  • Does a sensor trip and set off an on-premises alert and call a central monitoring station?
  • Does a security camera confirm the threat before sending police to the location?
  • Is a facility manager sent an instant text message?
  • Is there another layer of additional protection on the door like a magnetic lock or electric strike that would keep the door shut?
  • Is there an entry vestibule after this door that is secure and requires access control to continue through?
  • What cameras are inside and outside that door to capture evidence for post-incident investigation?
  • What lighting is outside of the door that would deter this incident from ever starting?
  • Would the lighting be sufficient to keep the security camera(s) in color mode?
  • Is there an automated audio message played that warns the criminal that police are on the way?

 

Our list of additional questions, and suitable technologies, devices, and building design and construction options to solve this problem could go on and on. Contact Theseus Professional Services for security consultation and engineering assistance.

 

PRO TIP:

FREE DOWNLOAD: SECURITY RISK ASSESSMENT CONSIDERATIONS GUIDE

Security professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. 

What's Inside?

This guide is intended to assist you with performing an in-house physical security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required.

Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount importance. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>