Helping Security Directors Sleep at Night

Taking a positive role in how security is managed

Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more. The list of threats is endless. Security directors of companies large and small have their work cut out for them trying to keep their employees, assets and buildings safe from harm. Threats come in all shapes and sizes, and can be found outside and inside an organization. They can be physical in nature, such as a terminated employee returning to a job site to hurt the person who fired them, someone stealing cooper tubing from a fenced in area or a terrorist attack.

With all these overwhelming threats, it is a wonder a security director sleeps at all.

Each security director deals with his or her unique security requirements and factors surrounding their business the best way they can, with the resources they have. The type and size of the business play a large role in how security is managed. Often, several systems must be integrated to run and secure a company efficiently, creating even more challenges. Let’s examine three situations that might keep a security director up at night and how to improve those processes.

MANAGING VISITORS

Three types of identities enter an organization each day. Employees, who are vetted with background checks prior to being hired, are considered the safest identities within a building.

Next are contractors, who may or may not be vetted via a background check, depending on the type of business. Contractors are considered semi-safe. They have access to limited areas and are free to roam about those areas. When their work is finished, their access cards are terminated.

Then there are visitors, who are the riskiest of all. Organizations do not know anything about the visitors who enter their buildings. They could be customers, students, patients or tourists. They could have a police record, be on a terror watch list or be an angry spouse of a woman working on the 8th floor. Daily visitors pose the biggest threat to organizations.

How can a security director better manage the daily influx of visitors?

They can start by implementing a web-based visitor management system that actively engages all staff to help pre-approve and vet guests. If an employee is expecting a guest, they can enter the guest into the visitor management (VM) software.

The VM software will not only notify the security staff that a guest is arriving, but it will send the guest a welcoming email. The email could include directions to the company, a map, and instructions about where to park or how to use the VM system upon arrival. Once the guest arrives, they can speak with the receptionist who will acknowledge them in the VM system and issue a guest pass. They may also perform a self-check-in at a kiosk or free standing tablet, or use a barcode or QR code that was sent to their phone.

The important factor here is that the guest is pre-approved by a trusted employee acting as a host. The VM system knows who the guest is, who they are visiting, what time they arrive, the reason for their visit and most importantly, that they checked out and their access to your assets has been removed.

If there is an issue with a guest, for example, they are a past employee who was recently terminated, that information would appear to the employee managing the visit. The VM system knows who are former employees, and also generates a do not admit and/or watch list.

A guest appearing on a do not admit list would not be allowed in the building. The web- based system manages all visitors, contractors and staff access rights from a single interface that can either stand alone or integrate with the PACS to deliver tight policy control, accountability and ultimately better security.

UNAUTHORIZED ACCESS

Power companies often have several small unmanned substations located in remote areas. If the wrong person gains access to an unmanned, or even a manned, substation, the potential for catastrophe is high. One unauthorized person can wipe out the power for hundreds of miles, causing chaos on the highways, local businesses and disrupting thousands of homes. Not to mention what a crisis could do to a power company’s brand, facility or intellectual property.

Creating policies and procedures to help manage access is critical. Setting policies such as a use it or lose it rule can help control access. For example, if an identity has not used their access card at a particular door, such as an unmanned substation for a month, the identity should automatically lose access rights to that door. Setting strict timeframes tightens security.

Software that provides robust identity and compliance audits and reports goes a long way to track employee attempts to access specified areas after hours and identify possible unauthorized access. Research shows that security breaches derive from internal employees as well as outside an organization. Breaches can be inadvertent or intentional. An Identity Audit and Compliance (IAC) system manages physical access and integrates it with back-end or building systems, such as IT or human resources, to allow an organization to manage a person’s identity throughout their employment.

Automated IAC systems managing physical access and policy information provide better controls, smoother on-boarding and off-boarding, give new employees proper access to areas or digital assets they may need, as well as revoke access when the person leaves the company. This eliminates a security team from manually removing access from each separate system, which is time consuming, errorprone and inconsistent.

With an IAC system, organizations can define policies and procedures, create an audit trail of events and eliminate miss-steps that lead to unauthorized access.

TERMINATION

The security director of a large bank once shared his concern over improper termination procedures. When an employee is terminated or leaves voluntarily, how can a security director be sure they are truly terminated in all systems? Large banks often use several systems such as an access control system, visitor management system, PSIMs and different building management systems. Is there an easy way to manage this?

Installing a centralized web-based Identity Audit and Compliance system streamlines the administration of access rights across an entire organization. When an employee is terminated, the information is entered once in the web-based system.

A workflow process can be adopted for administrators to configure employee access and termination status that will automatically filter through to all systems.

A web-based system eliminates miscommunication, and replaces manual and paper-based approval, change and audit processes. No paperwork is needed, and an audit trail proves the person was terminated in all places.

Implementing automatic revocation rules also help ensure employees are terminated.

Automated quarterly audits enforce managers to review employee access rights and make necessary changes. The more often the audits occur, the more secure a facility is. All departments become involved, ensuring better safety for everyone.

Security directors must deploy the best technology available and enlist the help of employees to effectively manage visitors. Companies must align their security protocols with their organization’s policies and procedures to enforce operational effectiveness. An Identity Audit and Compliance system helps an organization develop an audit trail of events, reduce manual errors which can result in unauthorized access and security breaches, and streamline access rights to ensure employee access is properly terminated throughout all company systems.

This article originally appeared in the March 2016 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3