There’s a lot going on in the world of physical risk and vulnerability, and it’s nearly impossible to keep up with the latest news and developments. We’ll keep you informed with the best content to keep your business growing.
Check out the top news and headlines from the past month—including must-read details on the latest tool from DHS, a dynamic approach to risk, and best practices for boosting your recurring revenue.
Via American Security Today. A new web-based tool is available to help security professionals at office buildings to perform assessments based on the Best Practices for Anti-Terrorism Security (BPATS). The tool is designed to help building owners apply for protections under the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act.
Our take. The lack of industry standards is one of the biggest issues in physical security today. While this tool doesn’t solve the problem, it does bring us one step forward. By providing a set of best practices that can be easily tracked as DONE/NOT DONE, more commercial office buildings will have greater assurance that they are meeting a set of best practices and standards.
Via Security Magazine. The traditional approach to physical security is cumbersome, costly and slow. On the other hand, a risk-based approach strategically balances security, access, usability and cost to provide the best long-term protection. Risk-Based Security, or RBS, defines a commitment to flexibility and adaptability to deal with ever-changing threats. It is designed to deal more successfully with the ever-shifting strategies of attackers.
Our take. Today’s attackers are constantly changing their strategies. For security professionals to effectively reduce risk and vulnerabilities, physical security efforts need to be as dynamic as the threats. It is necessary for the security industry to adopt new strategies—because attackers certainly will.
Via Security Sales & Integration. Looking for better ways of securing recurring revenue for your security business? Service agreements can be a great way to boost that income stream. Selling can be a challenge, though. This article compiles best practices and helpful advice from four security pros who have mastered the art of selling service agreements.
Our take. It’s critical to treat your security business as a business. You can’t think and operate simply as a security expert—you need to be a business expert as well. Circadian Risk software is designed not only to make you a more successful security consultant, but a more successful business as well.
Via asmag.com. If you’re a retailer, there are many different technologies you can use to improve store security and loss prevention, but none of them should be used apart from the others. This article introduces the benefits of integrating security technologies and communications systems together—including loss prevention, physical security, asset protection, risk management and IT.
Our take. Security doesn’t take place in a vacuum. It’s connected to your business processes, your customer service, employee training, software and POC systems, and just about every other aspect of running your business. Just as physical security and cybersecurity overlap, so should your technologies.
Via Security Magazine. Your access control system might hold the key to a stronger building management system (BMS), and more manufacturers are beginning to integrate their systems with building automation to create value for the end user, according to IHS Markit analysis and the 2018 Smart Buildings Report.
Our take. Here’s a great example of the previous article (Integrate to Improve Loss Prevention). Building access systems can integrate with your building’s other technologies to provide more robust security and help prevent critical events. The article cites advances in data visualizations and analytics as important pieces in making these integrations successful. We couldn’t agree more! Circadian Risk software is built on the core necessity of visual information and data analysis.
Get more must-read content for your security consulting business—subscribe to the Circadian Risk blog.