Physical Security Review

Protecting valuable physical assets of business

Physical Security has been a necessary part of business since enterprise first started. The need to protect the business, its brand reputation, its assets, its workforce, its profits and its trade secrets has been daily activity, the value of which is often only recognised when something goes wrong. Physical Security Reveiws are an effective and critical tool for every business to consider regardless of its size and location.

There are a range of physical security risks, including:

  • Vandalism
  • Theft
  • On-site security breaches
  • Rogue or mentally unstable employees
  • Corporate espionage
  • Civil disturbance
  • Political violence
  • Terrorism
  • War

Whether a business own’s or leases a physical premises, physically securing the businesses valuable assets is more important than ever.

The Elmore Physical Security Review is designed to help business identify the risks and catergorise vulnerable assets in to defined categories. Potential threats range from break-ins and thefts to previously overlooked risks of terrorism, espionage and sabotage.

Physical Security Reviews include the following areas

Asset Review

Identifying assets is a critical part of understanding the scope of a Physical Security Review.  People assets include more than just the employees. They also include visitors, contractors, the surrounding community and others associated with the business operation. Property assets range from building, machinery and utilities to operations, equipment and systems. Informational assets are computer systems, processes and confidential business and employee information.

Physical Security Review

An in-depth risk assessment and analysis are the first steps in effective site security planning. This Review will help determine the likelihood and  consequences of a security issue or gap, and help prioritise the appropriate protective actions to take

Post Loss Review

After suffering a loss through a physical security breach a review is required to identify which controls and processes were compromised.  Recommendations are provided in the review to prevent reoccurrence.