• Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Phone:985-875-0119

Consultants@sds-web.net
Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC

Protect your business from loss and liability!
SERVING CLIENTS SINCE 1998

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

When is a Security Assessment Required

Home Uncategorized When is a Security Assessment Required

When is a Security Assessment Required

Nov 8, 2017 | Posted by Michael Khairallah | Uncategorized |

This month’s discussion was prompted by a post on Linkedin that referenced an article titled “How Often Should You do a Risk Analysis?”  The author makes some good points such as:

  • Clients wait 3 – 5 years (a lifetime in security) between reviews
  • Risk is not static, it changes without forewarning
  • Circumstances change making your business more risk susceptible

 

A clue to the frequency of a security assessment is in the degree of analysis done at each step.  Not every assessment requires a formal examination with a detailed report.  For example, at the most basic level, protocols can be developed and added to security guard routines that require frequent monitoring of certain facility vulnerabilities.  When anomalies are observed they can be reported to management who can then make an immediate evaluation of how to mitigate future exposure.

 

Moving that up a notch, if the anomalies are wide spread and frequent, the business may have a systemic problem requiring the services of a security consultant but within a limited scope of work.  The problem has already been identified and the consultant’s task is to recommend a comprehensive solution to the systemic problem.

 

Finally, we recommend once a year each business has a security review by an independent consultant to verify the current conditions against those conditions recorded since the last security review.  This would naturally assume a reexamination of the threats and may also include a crime analysis for their area.

 

The best way to prevent criminal activity is to assume it can and will happen and make plans to prepare and respond before it occurs.  Preparedness helps to deter crime (remember, the goal of private security is to deter, detect, delay and respond to unwanted human activity).   Many businesses become complacent when they are not directly affected by criminal activity in their area and only examine their risk after an incident has occurred on their premises.  Don’t let that happen to you.  Contact your security consultant today to discuss the best ways to keep your facility safe.

0
Share

About Michael Khairallah

Michael is a physical security systems consultant providing services to clients throughout the United States. Michael entered the security industry in 1980 as a Manufacturer’s Representative for Cardkey Systems then founded Card Access Systems where he served as President and CEO for 17 years. He became an Independent Physical Security Systems Consultant in 1998 and provides all the elements of risk assessment and mitigation for his clients.

Find us on Facebook

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Contact SDS for your assessment today Contact

Contact SDS for your system implementation today.

Louisiana Security Consultant LA-Consultants@sds-web.net
U.S. Security Consultant US-Consultants@sds-web.net
International Security Consultant International-Consultants@sds-web.net

Telephone 985-875-0119

© 2025 · Security Design Solutions LLC

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map
Prev Next