Thursday, February 13, 2014

The Security Process

Safety and security, regardless of the focus, have a very specific process.  The process applies whether we discuss individual safety, the security of a building, well being of an organization, or even when planning a trip.  More often than not all are factored in.

What do I mean by that?  Assume you are a high net worth individual who feels he/she is in some sort of risk.  When you hire us to perform our security services we will examine your personal security elements at home, when traveling to and from work/school/social engagements/etc.; we will check what the security features are like at the places you frequent, including physical security, cyber security, even your reputation, and much more.  It is a complex process to say the least.


To run an effective security operation one needs a wide array of skills and expertise.  Self-defense or being able to shoot a gun is not enough.  One has to know how to identify risks, means to mitigate those, available resources and how to properly allocate those, and implementation of security processes.

All security operations begin with a risk and vulnerability assessment.  It can be done on your daily activity, or on the house you live in.  It can in depth and comprehensive or just look at a certain element.  But without a properly executed risk assessment the implementation of any security measure will be a calculated guess at best.

Take yourself as an example.  What are some of the risks you may face?  It can involve medial risks, domestic abuse, being hit in traffic, target for terrorism, and more.  you think I am stretching it?  Well tell me this: how many of you work in or by a government office, or a religious institution, or a fortune 500 company?  if you do then terrorism is a risk that is transferred to you just because of where you work or live.  Do you commute daily?  Is it a long commute?  Do you fly often?  Do you fly to unstable areas of the world?  Do you have high blood pressure?  These are just a few of the questions that you should ask yourself.


Once you identified the risks it is time to estimate the probability of the risk actually becoming a reality.  It is probably more likely that you will have a heart attack than get kidnapped (or is it?).  Based on the probability you will then estimate what would be the consequences of such events actually happening.  Will there be a loss of life (yours or others)?  Will there be a significant cost associated (ransom, loss of business, bills)?  Will it be embarrassing and/or affect your reputation?


Now is the time to see what can be done to mitigate the risk.  What is the cost associated with these safety features?  For example, altering your daily commute to be less obvious is cheeper and easier than buying a gun.  It is probably simpler to put thorny bushes outside the windows or get a dog than it is to spend thousands of dollars on high end home security features.  Is the cost of the proposed security feature worth the potential loss associated with threat it is supposed to mitigate?


You completed the assessment, identified the risks, came up with proposed solutions.  Now implement them.  Take actions to be proactive and stay safe and not wait until something bad happens.

Stay safe,
Tzviel 'BK' Blankchtein
Masada Tactical

No comments:

Post a Comment