SECURITY MANAGEMENT

Security Management

Crime Prevention Through Environmental Design (CPTED)

McPhee Security Consulting inc. uses CPTED methodology to identify problem areas in your organization’s physical environment and recommend strategies for remediation.

As experts in the application of CPTED principles, McPhee Security Consulting inc. develops a comprehensive plan of action that may include such strategies as the use of security cameras to monitor problem areas, personnel and organizational measures, natural access control mechanical measures and target hardening, natural surveillance and even natural territorial reinforcement.

Security Plan Design and Evaluation

Training, communication, practice and review are important parts of all effective security strategies. The safety and security of your staff and your business can often take a backseat to the immediate priorities of running your operation. We can provide a comprehensive review of your existing plan to ensure that it is up to date with the realities of current threats and risks. From regulatory compliance to social changes to changes in your business and physical environment, we ensure that your ability to anticipate and respond to threats is the best that it can be.

Threat Assessments

Threat Assessment is the basis upon which an effective risk management and mitigation program is built. Natural, criminal, personal violence and societal threats pose significant risks to all organizations in our modern world. Historical data, physical property assessment (CPTED), social and local environment review, safety review, and an inventory of business assets (dollar value, symbolic value, disruptive potential, etc.) are among the elements considered when conducting a thorough threat and risk assessment.

Vulnerability Assessment

Once threats have been identified and evaluated, the next step is to determine the level of vulnerability your organization faces in respect to individual risks. A poorly lit parking garage combined with the need for  individual employees to work later in the evening suggests a high level of vulnerability for employee safety in this area. A building with expensive easy to sell equipment in a remote location indicates a significant level of vulnerability to criminal activity.

Risk Assessment

The combination of threat and vulnerability assessments provides a comprehensive matrix that identifies various levels of risk and suggests actions to minimize them.