Key Points For Better Office Security

Modern businesses face a world of potential security threats that were literally unimaginable just a few years ago. There are any number of technological innovations available that dramatically change the way organizations work and make their members more productive; each one of these innovations carries with it new security issues that need to be addressed.

As with most processes in business, an assessment of your office’s security needs to start with a clear understanding of your goals. What are your priorities? Do you simply need to provide a safe environment for your employees when they’re arriving and departing? Does your facility need to meet certain security requirements for formal certification (e.g. UL2050)? No matter what your security goals are, these ten principles should be useful.

1) Clear Communication

It’s impossible to address your security needs if you don’t know what they are, and you’re not going to know that if you have poor communications with your team. You’ll need good two-way communications to keep your organization secure; you need a channel for updating team members about new security concerns as well as one for them to pass you their concerns. You should have a centralized source for all security information to cut down on confusion; your employees should be clear about their go-to resource for security news. Distribute security updates regularly, and try to include positive news along with information about security threats.

2) Access Control

Don’t give out keys (or access codes, etc.) to more employees than strictly need them. Instead of relying on the very fallible “first in, last out” plan for securing your office, assign access point security as a fixed responsibility to specific individuals. Develop and document a thorough and consistent plan for opening and closing your office; make sure this includes checking potential hiding spots like closets, bathrooms, and so on. For physical keys, make sure you get a locksmith to ensure copy is numbered and the assignment of keys to individual employees is recorded. Verify your key registry regularly by having employees present the keys assigned to them.

3) Consistent General Policies

Make sure every member of your organization follows procedures consistent with minimizing your security risks. Implementing a clean desk policy, for example, will cut down on potential targets for theft. If you are using access cards, ID badges, or other forms of personal security, make sure that you have standard policies for carrying and displaying them. Hold everyone using such ID to the same standards. In company directories that are publically accessible, don’t include job titles with names. This makes it harder for criminals or other unwanted intruders to use names and titles to bluff their way onto your premises. Finally, establish receipt procedures that preserve a clear chain of possession for all incoming deliveries. Deliveries should never be left unattended.

4) Make Small But Crucial Security Investments

Protect your IT resources from theft by using locks (cable or plate variety) to secure your computers. This is especially important for laptops. Setting up docking stations can be both convenient and security-conscious. Take extra care with especially valuable or tempting office equipment, including postage meters, check writers, precision machinery, and company checkbooks. Doors between secure and non-secure areas should have keypad locks and peepholes. At especially vital access points, establish an “airlock” entry that forces authorized individuals to pass two locked doors. This makes it difficult for criminals to “piggyback” their way in by following your employees or catching doors when they leave.

5) Cyber Security

It’s virtually impossible to overstate the importance of antivirus software in the modern business environment. Every company needs ample protection against online threats including viruses, Trojans, malware, and other potential problems. Your primary network should be protected by a robust firewall. All wireless routers need security protocols. Your data needs to be backed up regularly, and storing backups off-site is an excellent idea.