You should be alarmed … and monitored! Forgive my play on words to get your attention but the concern is real, a facility not properly alarmed and monitored diminishes the value of other security mitigations. For example, without alarms how would security forces know to respond to a break in or an unsecured door, or […]
About Michael Khairallah
Michael is a physical security systems consultant providing services to clients throughout the United States. Michael entered the security industry in 1980 as a Manufacturer’s Representative for Cardkey Systems then founded Card Access Systems where he served as President and CEO for 17 years. He became an Independent Physical Security Systems Consultant in 1998 and provides all the elements of risk assessment and mitigation for his clients.
This month’s discussion was prompted by a post on Linkedin that referenced an article titled “How Often Should You do a Risk Analysis?” The author makes some good points such as: Clients wait 3 – 5 years (a lifetime in security) between reviews Risk is not static, it changes without forewarning Circumstances change making your […]
Who, goes where, when … that is access control in a nutshell. In this post we will discuss why we need access control, some of the variations in how it is applied and some suggested techniques on applying these systems. Why Do We Need Access Control All security systems start with a controlled perimeter. […]
With all the attention being paid to electronic gadgets these days we sometimes lose sight of the basic elements that establish security, perimeters. What is a perimeter; in security we define it as: … A contiguous set of barricades such as walls, doors and natural features (like a rock face or the side of […]
Let’s first define a threat assessment, the textbook definition is: “A threat assessment determines the credibility and seriousness of a potential threat, as well as the likelihood that it will be carried out at some point in the future”. Many people simply lump together the elements of a threat assessment with a vulnerability […]
A security consultant can help attorneys resolve difficult cases through a variety of solutions. A consultant can interpret video recordings for frame by frame analysis, examine service records to confirm that security equipment has been properly maintained; these and other resources are available to the attorney when seeking the services of a security consultant. The […]