• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Professional Security Officers, Security Guard Services

Professional Security Officers, Security Guard Services

Sunstates Security

  • OUR SERVICES
    • Security Personnel
    • Specialized Markets
  • OUR APPROACH
    • Employee Engagement
    • Management Engagement
    • Training and Safety
    • Quality Assurance
    • Strategic Partners
  • WHY SUNSTATES
    • Founding Principles
    • Executive Leadership
    • Testimonials
    • Gallery
  • RESOURCES
    • News
    • Newsletter Subscriptions
    • Tools
  • CAREERS
    • Selection Process
    • e-Learning: Your Career Path
    • Employee Benefits
    • Apply Online
  •  CONTACT 
  •  EMPLOYEE 

Best Practices in Secure Environments

August 2, 2019

SECURITY BY DESIGN: BEST PRACTICES IN SECURE ENVIRONMENTS

SECURITY BY DESIGN: BEST PRACTICES IN SECURE ENVIRONMENTSMost commercial buildings begin with an architect and a designer. Outside, a landscaper or landscape architect will usually be tapped to provide the esthetic surroundings.

Open floorplans. Glass walls. Lots of windows. Outside, beautiful plantings.

These features may be pleasing to the eye. But they also can significantly compromise safety. Security would be greatly enhanced by including a security expert on the initial design team.

The Four Aspects of Designing for Safety

There are four key elements to corporate security:

  • Access control, especially in shared spaces
  • Landscape design that emphasizes security
  • Interior design that mitigates potential threats
  • Security-minded policies and procedures

Element 1: Access Control

Access control can be challenging when a building or campus is shared by different organizations. But there are several best practices that can mitigate the potential for security issues:

  • Individual access control for each office or tenant
  • A centralized communication system, such as a PA, to warn all occupants of potential or actual threats
  • Building-wide access control, so only those who belong in the building can enter
  • Security systems or personnel that can flag unusual activity

Consider, for example, the auto mechanic who was terminated at a West Coast auto dealership after weeks of poor performance, threats to co-workers, and other red flags. He went to his vehicle, retrieved a gun and returned, killing two former colleagues before committing suicide. Incidents such as this highlight what many businesses are now following as a best practice:

  • Have employees park in a secure area with controlled access
  • Restrict employees from visiting their vehicles during the workday or monitor employees who do so

Element 2: Exterior Design

Parking areas, pathways and landscaping should be designed with two goals in mind: perimeter security and elimination of hiding places.

Perimeter security means establishing layers of security, typically with multiple checkpoints and many opportunities to spot potential security issues. Ideally, this strategy positions the initial access control so that a would-be intruder would be stopped before being able to enter or penetrate a facility or campus.

For landscaping, the key is to eliminate not only hiding places for intruders attempting to enter the building, but also places where someone could attack or otherwise harm employees and visitors heading towards or away from the building.

Element 3: Interior Design

The same glass walls and bullpen-type seating areas that give a space a light and airy ambience have a serious drawback. In the event of an active shooter or other incident, employees have nowhere to hide. Walls, offices and secure doors make it possible to hide from an intruder.

Employees have three options when confronted by an active shooter: run, hide or fight. Interiors should be designed to maximize all three of those options. In addition, entrances should have a holding area that can be secured to prevent an intruder from entering the inner offices.

Element 4: Policies and Procedures

None of these steps, of course, will effectively mitigate potential security threats without employee training in the proper policies and procedures to spot and react to security issues.

For organizations without an internal security chief, a security consultant that offers employee training can be an invaluable resource. Security training should be part of every new employee’s orientation, and refresher training should be mandatory and regularly scheduled.

For information on how Sunstates Security can use technology and personnel to provide the best practices in secure environments, or for an evaluation of your existing security systems and strategies, please call 866-710-2019 or contact us.

Primary Sidebar


Categories

  • Awards
  • COVID-19
  • Security News
  • Sunstates News
  • Team
  • Uncategorized

Follow Us On Facebook

Footer

     

 

801 Corporate Center Drive
Suite 300
Raleigh, NC
27607
Toll Free: 866-710-2019

 

 
LICENSES:
CA - PPO120751,
VA-11-2948,
Texas B11167; A10515101; F01339
Illinois #122.001562
Nevada #3064

Copyright © 2023 · Sunstates Security All Rights Reserved · Privacy Statement · Disclaimer · Opt-Out Preferences

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
 

Loading Comments...
 

You must be logged in to post a comment.