top of page
Digital Security Picture

Physical Security

Physical security, in it’s simplest form, is the protection of your people, property and assets. This includes the physical protection of employees and staff, equipment, technology - including data storage, servers and employee computers.

Physical Security Elements

Physical security in today’s world is much more than simply a few security guards and locks.  Modern physical security systems consist of multiple elements and measures, for example:

 

  • Site layout and security configuration: where are your weak points? What needs the most protection?

 

  • Visibility of critical areas: including lighting and video cameras

 

  • Access control: from simple locks through to keypads and biometric access

 

  • Perimeter protection: the “guards and gates” aspect of physical security

 

  • Intrusion detection: including motion sensors, cameras and tripwire alarms

 

  • Infrastructure protection: including power, fire, network connectivity and water

 

  • Staff training and incident response: do your employees know how to handle an incident, and do you have an emergency response process in place?

Common Security Threats, Vulnerabilities and Risks

  • Unauthorized access and/or entry: This could be a person(s) physically gaining access to a secure site and can also include access to digital systems through hacking, social networking or stolen passwords and codes and tailgating (an unauthorized person follows an authorized person into a secure area.

 

  • Burglary/Theft/Vandalism: Assets come in different forms so theft and burglary can be physical - for instance the theft of goods from a business (computers, goods, etc) or digital such as stored information in a database.  Vandalism comes in all forms to include defacing company property or real estate, damage to windows, spray painting.

  • Unaccounted for visitors can pose a threat.  If you don’t know who is or was in your workplace at a specific time, it is impossible to keep a high level of physical security. Unaccounted visitors pose a serious risk, as you will not be able to know if they were present if an incident occurs.

Python Consulting Solutions

  • Physical Security Assessment

You have to start somewhere: That’s where Python comes in.  A first good step is to conduct a comprehensive assessment of any security measures in place and to evaluate potential threats so that measures can be put in place to secure your business.  This includes, but is not limited, to a full assessment of entry/exit points, high value areas, high and low traffic areas, previous security breaches, law enforcement response time and a review of operating procedures and available resources.   

 

  • Physical Security Follow-Up

With a comprehensive assessment or risks and exposure, Python can implement physical security processes, protocols and policies.  This can include installation and proper placement of CCTV systems, alarms, network security and protocols, controlled access doors and locks, security post placement and any other security measures that may be needed based on the assessment.

 

bottom of page