Security Prevention in RI

Security: Prevention-First Mindset

When it comes to security, you must form a “Prevention-First Mindset.” Many companies have this approach backward – they deal with security after the breach, damage, or customer complaints.

In business, we understand company image is everything. The impression individuals form of your business depends on a range of factors—branding, personal interactions, presence, and most of all, “reputation.”

Therefore, robust security prevention and presence can continue your positive ongoing business image.

Question: Why does my business need security? Incidents at my location never happen? 

Answer: Crimes are rising, year after year, and brings us to our point of “preventative” measures. Innovative companies invest in their marketing, growth, customer service, etc. They also understand the peace of mind insurance of having security rolled into their operations. Security comes in many forms – from physical security officers, mobile patrols, surveillance cameras, cyber security, and the list continues.

Supportive data for your awareness: 

The Federal Bureau of Investigation (FBI) released detailed data on nearly 8.9 million criminal offenses reported via the National Incident-Based Reporting System (NIBRS) in 2020. The Uniform Crime Reporting (UCR) Program’s latest report, NIBRS, 2020, presents data about 23 offense categories comprised of 52 offenses. It also presents arrest data for those crimes and ten additional categories for which only arrest data is collected.

Highlights of NIBRS, 2020

In 2020, 9,880 law enforcement agencies, whose jurisdictions covered more than 177.5 million U.S. inhabitants, submitted NIBRS data to the UCR Program. These agencies accounted for 62.1% of the 15,901 law enforcement agencies that submitted data to the UCR Program in 2020. Currently, the FBI does not estimate NIBRS data for agencies that do not submit it. Of the 8,879,728 offenses reported in 7,560,867 incidents, 60.5% were crimes against property, 25.2% were crimes against persons, and 14.3% were crimes against society. (Due to rounding, some percentage breakdowns may not add to 100%.) Among these categories, the offenses most reported include larceny/theft offenses, assault offenses, and drug/narcotic offenses, respectively.

Read the full NIBRS, 2020 report.

Where do I begin with a preventative approach?

Where do I begin with a preventative approach? 

You start with sealing the perimeter – by focusing on prevention. If securing with a physical security officer, you want a security team that provides a security presence, understands proper escalation processes and formal reporting; therefore, the client is always aware of their location’s situation.

Surveillance cameras: you or your service provider want to receive an alert before a crime has begun. High-end Artificial Intelligence (AI) surveillance cameras can distinguish and alert a breach by a human the minute they trigger the camera’s built-in protocols. Alerts are sent to the monitor, reacting and beginning the preventive phase.

Cyber security: Detection-based tools, on their own, can’t provide the level of protection needed to keep an organization secure. On average, most threats go undetected for upward of 100 days. Because detection-based tools rely on signatures, threats that have yet to be seen readily slip through traditional defenses. A staggering 360,000 new malicious files are detected every day. Breaches will remain a daily occurrence until cybersecurity tools can block new threats as quickly as they evolve.

Above are just a few examples of preventive security measures and scratching the surface on how intelligent and effective they can be for an individual, business, or property. 

For additional information please feel to contact any of our security specialists, we’d be happy to assist.

Stay Safe,

SecurityRI

0
Read More
Security Plan

Implement A Security Plan For Your Business

First, What is a Security Plan?

A Security Plan or System Plan documents the controls that have been selected to mitigate the risk of a system. The controls are determined by a Risk Analysis.

Assisting with the process NIST (National Institute of Standards and Technology) provides a catalog of controls with templates outlining the Cybersecurity Framework for Critical Infrastructure and Security Plan. Businesses may use the outline when creating their Security Plan.

How to Implement Your Security Plan?

1. Take an inventory of your physical and information assets (what are you protecting?).
2. Perform a risk assessment to determine what level of security is needed to protect your information assets.
3. Complete the checklist to make you aware of your security strengths and weaknesses
4. Complete an evaluation. Evaluate your findings and discuss recommendations to correct deficiencies and/or improve security with departmental administration and IT staff.
5. Develop a security plan. Create a plan with target dates for implementation.
6. Set Deadlines / Completion Dates
7. Project Management – Monitor the process from start to finish
8. Evaluate upon completion

Responsibilities for a Departmental Security Plan

  1. Inventory – IT Staff
  2. Risk Assessment – Systems Administrator
  3. Checklist – Systems Administrator
  4. Evaluation – Systems Administrator
  5. Plan – IT Staff & Systems Administrator

What does a simple IT security plan schedule look like?

Tasks Example:
  1. Draft Security Plan
  2. Submit Plan for review by other managers / outsourced IT company for this process.
  3. Edit
  4. Finalize Security Plan
  5. Submit to Board of Directors “if needed”
  6. Distribute the Plan to all Management
  7. Distribute the Plan to all Personnel
  8. Meet with Management – set dates – begin implementation
  9. Establish means to accomplish Security Tasks and events
  10. Establish Security Breach Committee
  11. Establish Proactive Security Committee
  12. Obtain and install required new equipment if needed (servers, workstations, programs, etc.)
  13. Implement new policies (ex – clean desk, remote working, etc.)
  14. Evaluate the implementation
  15. Evaluate Security Program
    1. Internal Review
    2. External Review
  16. Modify Security Program and Plan
    1. Schedule follow up meetings / audit

0
Read More
Locations

Corporate Headquarters
58 Waterman Avenue - North Providence RI 02911

MA Office
14 Holly Lane - Westport MA 02790

Toll Free: (888) 219-5296
Local: (401) 231-8130

Operating Live 24∙7∙365