Personnel Access Poses a Continued Risk

The Security Consultant's Perspective...

Implementing Personnel Security Initiatives should be the objective of every security director, human resource director, facility manager and safety manager. Key to the assurance of who gained access to your facilities is the knowledge of having a centralized identification system that allows for verification and retrieval of historical data through collaboration by the team mentioned above. I believe a solid ID Badge System is your first line of defense against fraud, theft, espionage, violence, sabotage and other identity-related threats. Such systems are specifically designed to reduce one's security vulnerabilities and increase your control over visitors, vendors, contractors, delivery personnel and employees and are not difficult or expensive to implement.

Violators Seeking Access Are Creative...

Individuals wanting access will stop at nothing and stoop to anything including compromise of your identification systems. If your lack luster identification system provides an opportunity for the average thief, imagine what a professional can do with a sophisticated approach. In an April 22 bulletin, the Department of Homeland Security warned hospitals that a string of people posing as inspectors for the Joint Commission on Accreditation of Healthcare Organizations had visited hospitals across the country at odd hours, demanding information about the inner workings of their facilities. Such intrusions are not limited to hospitals only. Any organization, business, or system is the target of calculating individuals focused on probing existing security measures and evaluating protective measures. Their goal is to plan for the future.

"Hospitals are particularly attractive because a terrorist could use radiological material to create dirty bombs, or steal, an ambulance to create a well-disguised explosive", said, Dr. Irwin Redlener, Director, National Center for Disaster Preparedness at the Mailman School of Public Health at Columbia University. Frank Taormina a Hospital Security Director and current president of the Metropolitan Healthcare Security Directors Association and chair of the New York City Chapter of the International Association of Healthcare, Security and Safety Professionals said, "He takes warnings like these very seriously...it is something I am concerned about. It makes you wonder what the underlying reasons are for all this...we have been assuming the worst in New York since September 11. We've been checking IDs all along." Mr. Taormina and other professionals are quite concerned because one breach is all that is needed to afford the perpetrator his base of operations.

How Effective Is Your Security Identification System...?

Given the fact that we cannot guarantee access denial to a well prepared professional, security professionals can implement preventive and proactive counter-measures to distract, deter and defend one's facility against compromise through faulty access controls. If you are relying on a simple sign-in system, you are setting yourself up for a problem. Whatever system is used must allow for as much verification as possible, a photograph of the individual and some type of system that allows the capturing of data in order to track movement and verify departure. In sensitive environments, identification issued must endeavor to limit access to the specified floor or department. While sophistication is my objective in protecting against intrusion, most security experts would be happy with a verification system the employs a photo identification. Them more sophisticated systems go beyond traditional identification systems and might suit your particular operation.

Intruders Are In Your Facilities Daily...

Your Risk Assessment should endeavor to ask, "What measures can I take to reduce or eliminate the threat and/or conditions posing the potential threat"? This is a vitally important beginning point because every facility and type of business is potentially compromised every day. What do you do when the regular truck driver of a service provider, messenger or delivery person suddenly appears at your door or loading platform? What system do you have in place to verify the identity of this person? Do you check at all? Do you believe the employee is authentic or do you verify? What if you are the victim of a robbery that goes bad and several employees are seriously wounded and killed because due diligence was shortchanged? A simple preventive and proactive procedure is having the employer notify you when they change employees. After all, you are paying for a service and therefore have the right to instill a heightened sense of security to your operations. Lawsuits emanating from due diligence issues are real. While this scenario seems far-fetched, it is not.

Your Identification System...

Your Identification System should at a minimum contain the following elements:

- Trained personnel

- Limited & restricted access

- Suitable form of identification with a photograph

- Tracking and monitoring capability

Notice how I did not mention sophistication while I know the technology exists. And depending on the type of establishment, the imagination runs the gamut. The objective is to prevent a compromise by being proactive.

Felix P. Nater is the president and owner of Nater Associates, Ltd.a security management consulting practice offering services in Workplace Violence Interdiction and Prevention and General Security Consulting Services. He has over 30 year of expertise in the security and criminal areas.

In The News:


pen paper and inkwell


cat break through


Problem Solving - Think Cleopatras Ass

Picture the scene. Anthony pops down to the guardhouse, partly... Read More

Get Meeting off To a Great Start

When asked what part of their job they find a... Read More

Knowledge Management - Lessons Learned and How To Identify Them

Many organisations use the term "lessons learned" to describe the... Read More

Test Your Hiring IQ

The purpose of any selection process is to discriminate (albeit... Read More

Why Employees Are the Best Source of Cost-cutting Ideas

Cost cutting has become a necessary and important reality in... Read More

Multiple Channels, Multiple Times

I've just been reading about the frustrations of a Human... Read More

Bolster Credibility with Investors--Avoid These Phrases in Your Business Plan

Remember Papa John's commercial on TV with the slogan "Better... Read More

Creativity and Innovation Management ? Personality Testing

Whilst tests measuring the creative or innovative personality exist, there... Read More

10 Fool Proof Ways To Intensify Your Profits

1. Create benefit intensifiers for your list of ad copy... Read More

Bosses Are Out ? Managers As Coaches Are In

There is a new trend taking hold in business today... Read More

Improve Operations by Restructuring

Transitioning from Vertical Hierarchies to Decentralized / Flatter OrganizationsThe need... Read More

Conference Calling Can Save Your Sales OrganizationTime and Money!

Conference calling can save you money. There is no doubt... Read More

How to do SWOT Analysis for your Business

SWOT analysis is needed for all business to understand how... Read More

What We Have Here Is A Failure To Communicate

Today's successful organizations are the ones which carry on open... Read More

Organizational Culture, Creativity, Innovation

It can be concluded with great certainty that certain organizational... Read More

Delegation: When to Delegate, Who to Delegate to

There are some very simple guides for delegation.Most people delegate... Read More

How Managers Can Turn Failures Into Successes

Although there are real, external reasons for managerial difficulty ?... Read More

Performance Appraisal - Ten Stupid Things Managers Do To Screw It Up

Performance appraisals aren't fun. But a lot of the time... Read More

Driving of work trucks

Each time you or one of your work crews cruises... Read More

The ?Better People? Fallacy

It's easy enough to convince your own staff that better... Read More

Managing After Downsizing

So, you survived the downsizing. Your company did something that... Read More

Finding the Right Way to Motivate Your Employees

Fear, Incentives and GrowthZig Ziglar says that there are three... Read More

ISO 9001 Okay Now You Have It How Do You Market It?

Marketing ISO 9001 2000.Lately we've been seeing a lot of... Read More

9 Strategies for Writing Accounts Payable Procedures

The Cash to Cash Cycle Part Four of SeriesNext: Complete... Read More

Running Successful Meetings - The Key Steps To Getting It Right

We all complain about meetings which are a waste of... Read More

Nine Vital Lessons For Avoiding Training Fads That Waste Time, Money and Enthusiasm

Unfortunately, at least two thirds of much of the training... Read More

Difficult Employees-Poor Performance - 10 Tips for Dealing with it in the Workplace

I personally struggle with the term 'managing people' - because... Read More

Creating Your Own Business Upturn - Powering Business Development

We all see it . . . business markets are... Read More

Key Control ? Who Has the Keys to Your Kingdom?

Key control, or more accurately the lack of key control... Read More

Managing Rebellious Employees

Surveys of executives reveal that many companies fall short of... Read More

The Seven Cs: Partnership Danger Signs - Competitive, Not Complementary Action

A series of articles exploring the seven critical areas that... Read More

Performance Appraisal Scenarios: Improve Your Communication

IMPROVING COMMUNICATION DURING THE PERFORMANCE APPRAISAL: If the employee has... Read More

Do You Hear That?

I read a report in the Toronto Star stated that... Read More