Ss&sn may jun '13 final

Page 1

&

Volume 10, Issue 3

May / June 2013

Security Shredding Storage News

Serving the Security Shredding & Paper Recovery Markets Visit us online at www.securityshreddingnews.com

ATTENTION:  READERS !

Are you looking for Products, Equipment or Services for your business? If so, please check out these leading companies advertised in this issue: Collection & Storage Containers Big Dog Shred Bins – 6 Bomac Carts – pg 7 Jake, Connor & Crew – pg 11 Equipment Financing TransLease Inc – pg 7 Insurance Downstream Data – pg 9 Lock & Locking Systems Lock America Intl. – pg 6 Mobile Truck Shredders Alpine Shredders Ltd – pg 13 Shred-Tech Limited – pg 8 ShredFast – pg 16 Vecoplan LLC – pg 5

Security in Layers:

Moving Floor System Keith Manufacturing – pg 8

Deter, Delay, and Detect

Replacement Parts ShredSupply – pg 16 Security Consultants Baker Security Group – pg 10 Stationary Shredders & Grinders Allegheny Shredders – pg 11 Ameri-Shred Corp – pg 9 Schutte-Buffalo Hammer Mill, LLC – pg 2 Shred-Tech Limited – pg 8 Vecoplan LLC – pg 5 Waste Commodity Purchasers Dan-Mar Components – pg 13 Web Design Chachka Groop – pg 10 NetGain SEO – pg 6

I

By Brian D. Baker

n the last issue, I wrote about security risk assessment principles and the foundations of the asset threat and probability criticality matrix. As a next step in the security process, this article defines five specific layers of security that can apply to your facility. By learning “security in layers”, you will be able to apply security management principles to specific risks at your facility. Together, these two articles help you to 1) recognize vulnerabilities and 2) create solutions that can improve your overall facility security plan and to manage risk through the deterrence, detection, and delaying of crime and other loss related events.

Security is like an onion …

I

magine your facility like an onion, with various layers. What assets are located near the skin or outer perimeter? What assets are located toward the center? Which are in between? Though most of our properties aren’t concentric like onions, you can determine where your key assets are located (e.g., employees, digital systems, pre-destruction documents, vehicles). In most cases, our key assets are located within the deepest layer of our physical facility. Let’s look at five specific layers where security is critical: PRSRT STD U.S. Postage

PAID

Mentor, OH PRSRT STD Permit No. 2 U.S. Postage

PAID

Mentor, OH Permit No. 2

1. Outer Perimeter

The first layer of security for a facility is the perimeter—that clear boundary marking a transition from public to private property. You may have a gate or a fence that clearly marks

your facility’s outer perimeter. In some cases, the fence may not serve as a deterrent because it could be easily climbed, cut, driven through, and even stolen (yes, scrap thieves steel fencing). Most perimeter fencing offers little concealment for security; however, the same benefit is then extended to the guards and employees who can see beyond the perimeter to an approaching attacker. This line of sight may prevent a surprise attack when the first layer of security is breached. Establishing a strong perimeter is more than fencing and walls, however. A change in landscaping or a difference in lighting can help

Continued on page 3

Inside This Issue

4 A New Picture of

Electronics Exports

8 Electronics, Recycling Associations Seek New Solutions for CRT Glass Recycling

11 Idaho State University Agrees to

Pay $400,000 for HIPAA Violations

12 Trending Now -

Shredding Companies Eye Medical Waste Management


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.