Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

2 min read

Internal Threat Mitigation: A Touchy Subject

Mitigating internal threats can be a touchy subject. While cameras and access control points are placed strategically during construction, acting upon the evidence they collect is a team effort. In this video excerpt from his on-demand webinar, Eric touches on this sensitive topic faced all too often by security operations teams.

 

 

5 top behaviors to look for...

  1. Unusual Working Hours: Employees who frequently stay late or arrive unusually early without a clear reason might be seeking opportunities to commit theft without witnesses. While dedication is admirable, these odd hours can also provide ample time to steal with less risk of being caught.

  2. Reluctance to Take Vacations: Employees who are hesitant to take time off might fear their theft will be discovered in their absence. In many cases, discrepancies become evident only when the regular employee is not there to cover them up.

  3. Control Issues: An employee who is overly protective or secretive about their work, refusing to share tasks or information, might be concealing unethical activities. This behavior often stems from the fear that someone else might uncover their malpractices.

  4. Sudden Change in Behavior: A noticeable change in an employee's behavior, such as becoming withdrawn, anxious, or aggressive, can be a sign of guilt or fear of being caught. It's important to note these changes, especially if they are abrupt and unexplained.

  5. Resistance to Audits or Checks: An employee who becomes defensive or obstructive when audits are mentioned or conducted might have something to hide. Transparency should be a core value embraced by all staff members.

Check out Eric's on-demand webinar about our data center ring of security philosophy >>

image-png-Jan-09-2024-09-39-11-2421-PM

 

PHYSICAL SECURITY RISK ASSESSMENT CONSIDERATIONS GUIDE

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine cover

We understand the challenges that security professionals face in securing their facilities and creating a safe environment within their budget. We also recognize the difficulty in finding the right resources and expert advice to achieve this mission.

That's why we're excited to announce the release of our considerations guide, designed specifically to help security professionals conduct their own in-house security risk assessment.

This comprehensive guide aims to assist you in identifying any missing or inadequate physical security measures that may compromise the safety and security of your assets, people, property, and critical business functions. While we highly recommend consulting with a third-party expert like Theseus Professional Services in certain cases, this guide will empower you to take a proactive approach to assess and address security risks within your organization.

The findings of a security risk assessment play a vital role in measuring and communicating the level of risk to your organization. By following the guidelines outlined in this guide, you can enhance the overall security of your facility while staying within your budget.

We believe that knowledge is power, and we're committed to providing you with valuable resources to help you achieve your security goals. Download our considerations guide today and take control of your facility's security.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine cover

 

The Growing Use of LiDAR in Security Applications

The security industry has witnessed a technological improvement with the integration of Light Detection and Ranging (LiDAR) technology into various...

Read More

A Clear View

You may be one of millions that caught this scene from The Masters last week. If so, did you think of this as an inspirational moment for your...

Read More

Integrating Disparate Low Voltage and Electronic Security Systems

The trend towards integration of disparate security systems to create a unified solution has gained significant traction over the years. This...

Read More