Recent Posts

Monday, November 25, 2013

Vulnerability Analysis

It is cheaper to mitigate threats ahead of time than to pay for a disaster after the fact.

Who will protect this business? 

The task of shrinking risk to a level we can live with falls upon the shoulders of many different people.  Some, who own businesses, must do what it takes based upon their knowledge and understanding of what needs to be protected. Others are hired to do nothing but make businesses safe and secure.  Either way, this is no easy task given the many areas of vulnerability that could be addressed.  Couple that with keeping business operations unburdened by extra security measures and you find yourself in a challenging situation.

Despite the challenge, it is always recommended that you invest in protecting your business by whatever means are available.  And given the variety of assets that need protected – from people to trade secrets – it sometimes takes an expert to get the job done.  Even though it is your business or your purview, obtaining an outside perspective can be healthy and wise.

Protect the front door, the back door or both?  

One of the challenges in protecting a business is first identifying what needs protected.  It may not be as obvious at you think.  This is especially true if your focus is on running the business and making money.  In the big scheme of things, you know your competitive advantage needs to be protected.  This is also true for your physical property and your people.  But what may not be obvious is that all three interact to some degree.  What that means is that any valid security solution will need to encompass and integrate all aspects of your operation.  This is where a vulnerability analysis comes in handy.

A good starting point.  

In general, a vulnerability analysis is a top to bottom, front to back review of your physical plant and your associated safety and security program.  In addition to the physical make up of the property, the analysis looks at elements like technology, behaviors, patterns and adherence to procedures. With established programs, the analysis is able to review current standards and practices for practicality and effectiveness. For businesses without plans in place, it is a good starting point because it starts from scratch and finishes with a complete picture of where you are and where you need to go.  

The right approach with fringe benefits.  

Certainly, a vulnerability analysis of your business can lead to a safer and more secure environment.  Safe and secure is desirable for obvious reasons. What might be overlooked is that with these attributes, you are likely to see better performance from your staff.  This has also been shown to be true for learning environments.   So investing in protecting your business unburdens your employees from distracting concerns and frees them up to focus on the job for which they were hired.  

Commitment needed up front.

Contracting with a safety and security expert to evaluate your business is a wise investment.   And if you do take this step to protect your business, here are a few things to keep in mind:  
  • Be prepared to be challenged by the findings.    Sometimes overlooking the obvious is embarrassing but good leaders know they are not perfect and that professionals are out there to help, not hinder. 
  • Commit to making the recommended changes.  If you cannot get to them all right away, start somewhere and build on it. It’s okay to take it one step at a time, just keep moving forward.  
  • If you budget for a vulnerability analysis, make sure you have funding left over to cover upgrades.  While you don’t know what will be discovered during the review, some changes may be critical and need to be installed quickly.  
  • Use the analysis to create a new awareness of safety and security. Many changes are dependent upon human compliance.  You may have to enforce changes initially to mold the culture but eventually it will become habit for your employees.
  • Safety and Security is an ongoing endeavor.  Use the vulnerability analysis to make a plan.  Review it regularly and involve other employees in the process.  Finally, track your progress toward meeting your safety and security goals.  If you don’t measure, it won’t happen.  



0 comments:

Post a Comment