Search

5 Security Procedures That Will Cost You Nothing

Every organization or security operator wants to enhance security at its location, but at what cost? Here are 5 procedures that will cost absolutely nothing:

1. Facility Closing Checklist


“And the evening and the morning were the first day” (Genesis 1:5). What we do in the evening will influence us the next morning. This is true in security as it is in life.


Closing a facility at the end of the day is often done by security, latest staff member or cleaning crew. By definition, it’s the last task of the day, and it’s the only task which delays employees from going home after a busy day. Ensuring all windows and doors are locked and alarmed, the facility is vacant and no vulnerability is left unaddressed overnight is no doubt a critical security task. To ensure the job is done effectively and in full, create a written checklist and signoff sheet.


2. Facility Opening Checklist


First staff to arrive in the morning should perform a quick walkthrough around the facility perimeter, entry and exit points. It is better to identify a security concern, such as a broken window or unlocked door, before going into the building. Evacuating already arrived students or staff is a much more difficult task. Excellent communication between the "facility closer" and "facility opener" is essential to validate security concerns identified. As different personnel may conduct this task, ensure to have a written checklist.


3. Emergency Numbers & Speed Dial


Emergencies come quickly and by surprise. How quick you respond relies solely on your preparedness. Storing emergency contact numbers in quick-dial, on both the landline and mobile may save you valuable time under pressure!



4. Visitor List


We all have visitors. Security or reception personnel need to be able to identify expected visitors, differentiating them from walk-ins. Ensure all employees report visitors to appropriate staff ahead of time. In most cases, it's as easy as an email.



5. Mail Review Procedures


Almost every facility receives a lot of mail. The mail is usually handled and distributed by a designated staff member and is generally opened without a second look. Mail is a significant security concern often not addressed. Whether the mail distributor is a security guard, receptionist or staff member, 99% of arriving mail is routine and divided into a few main categories including promotions and sales material, bills, payments, letters, etc. Taking a moment to review all mail before distribution to identify suspicious or irregular material can be done by anyone. All it takes is awareness, having a security-minded approach and an appropriate mail handling procedure.


Want to identify other vulnerabilities in your security procedures? Use EasySet today to generate comprehensive assessments, fast.



  • LinkedIn
  • YouTube
  • Twitter
  • Facebook
  • RSS

Copyright © EasySet LLC | All Rights Reserved | United States | [email protected]