Corporate Security

Run, Hide and Fortify®: Individual Preparation

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

John Farrar, our guest blogger this month, brings us part two of the Run, Hide and Fortify® series – ‘Individual Preparation and Situational Awareness’ – become aware of your surroundings and what to do when crisis situations occur. Individual Preparation Everyone should strive for a general awareness of his or her immediate environment. It doesn’t take years of meditation or graduating from some High-Speed Low Drag training course. The idea is to just be present in the here and now. Try not to be so engrossed in...

Run, Hide and Fortify®: The keys to survival in an Active Shooter Incident

27 September in Corporate Security, Crisis Response, Travel Safety, Workplace Violence

John Farrar is our guest blogger this month with a three-part series that will cover topics such as how to respond and what to do in an Active Shooter Incident (Part One), Individual Preparation and Situational Awareness when situations arise (Part Two) and finally A Recommended approach for Business continuity planning to deal with potential threats to a company be it manmade or a natural disaster (Part Three). Introduction The concept of “Active Shootings” is rapidly going the same route as the concept of Terrorism with multiple...

Who Owns Security in Your Restaurant?

27 September in Corporate Security, Personal Safety

A common definition of security is: “precautions taken to guard against crime, attack, sabotage, espionage, etc.” And for most of us, we often think of security in this way - as a thing or something we get, or even something we hire or buy.  But consider another correct definition of security: “freedom from danger or risk - safety.”  When viewed in this manner “security” is a state of being - a condition to be achieved and not something to be purchased or provided by another....

Using Metrics for Security Management

27 September in Business Continuity Planning, Corporate Security

The effective utilization of metrics to manage your security department and strategically report accomplishments is one of the fastest growing areas of interest among Chief Security Officers.  Security practitioners in the area of IT security are intimately familiar with the practice and have a broad array of statistical data from which to select to develop powerful reporting dashboards that clearly demonstrate the performance and value of the program. Those of us who exist in the world of physical security struggle to find meaningful measurements that...

Ten Tips to Safely Announce a Reduction in Force (RIF)

27 September in Corporate Security

We are closing out 2012 amid financial uncertainty. Our political leaders are trying to reach an agreement to reign in run-away government spending and increase insufficient government revenues and begin to gain control over our ever-growing national debt. We face the very real possibility that the U.S. economy may suffer and potentially drift backward into recession in 2013. Coupled with the unknown impact of the implementation of national health care, our uncertain financial times are causing many businesses both large and small to pare back...

Cyber Series: 10 Ways to Improve the Security of a New Computer

27 September in Business Continuity Planning, Corporate Security

A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the world is looking back at us. We trust our computers with personal information, banking, bill paying, connecting with family, shopping, and surfing the internet. We constantly communicate with family members, friends, business colleagues through emails, text messaging, and social networks. With this ease of use comes great responsibility. Most importantly, we need to keep our information and the information of others safe and secure...