&
Volume 10, Issue 3
May / June 2013
Security Shredding Storage News
Serving the Security Shredding & Paper Recovery Markets Visit us online at www.securityshreddingnews.com
ATTENTION: READERS !
Are you looking for Products, Equipment or Services for your business? If so, please check out these leading companies advertised in this issue: Collection & Storage Containers Big Dog Shred Bins – 6 Bomac Carts – pg 7 Jake, Connor & Crew – pg 11 Equipment Financing TransLease Inc – pg 7 Insurance Downstream Data – pg 9 Lock & Locking Systems Lock America Intl. – pg 6 Mobile Truck Shredders Alpine Shredders Ltd – pg 13 Shred-Tech Limited – pg 8 ShredFast – pg 16 Vecoplan LLC – pg 5
Security in Layers:
Moving Floor System Keith Manufacturing – pg 8
Deter, Delay, and Detect
Replacement Parts ShredSupply – pg 16 Security Consultants Baker Security Group – pg 10 Stationary Shredders & Grinders Allegheny Shredders – pg 11 Ameri-Shred Corp – pg 9 Schutte-Buffalo Hammer Mill, LLC – pg 2 Shred-Tech Limited – pg 8 Vecoplan LLC – pg 5 Waste Commodity Purchasers Dan-Mar Components – pg 13 Web Design Chachka Groop – pg 10 NetGain SEO – pg 6
I
By Brian D. Baker
n the last issue, I wrote about security risk assessment principles and the foundations of the asset threat and probability criticality matrix. As a next step in the security process, this article defines five specific layers of security that can apply to your facility. By learning “security in layers”, you will be able to apply security management principles to specific risks at your facility. Together, these two articles help you to 1) recognize vulnerabilities and 2) create solutions that can improve your overall facility security plan and to manage risk through the deterrence, detection, and delaying of crime and other loss related events.
Security is like an onion …
I
magine your facility like an onion, with various layers. What assets are located near the skin or outer perimeter? What assets are located toward the center? Which are in between? Though most of our properties aren’t concentric like onions, you can determine where your key assets are located (e.g., employees, digital systems, pre-destruction documents, vehicles). In most cases, our key assets are located within the deepest layer of our physical facility. Let’s look at five specific layers where security is critical: PRSRT STD U.S. Postage
PAID
Mentor, OH PRSRT STD Permit No. 2 U.S. Postage
PAID
Mentor, OH Permit No. 2
1. Outer Perimeter
The first layer of security for a facility is the perimeter—that clear boundary marking a transition from public to private property. You may have a gate or a fence that clearly marks
your facility’s outer perimeter. In some cases, the fence may not serve as a deterrent because it could be easily climbed, cut, driven through, and even stolen (yes, scrap thieves steel fencing). Most perimeter fencing offers little concealment for security; however, the same benefit is then extended to the guards and employees who can see beyond the perimeter to an approaching attacker. This line of sight may prevent a surprise attack when the first layer of security is breached. Establishing a strong perimeter is more than fencing and walls, however. A change in landscaping or a difference in lighting can help
Continued on page 3
Inside This Issue
4 A New Picture of
Electronics Exports
8 Electronics, Recycling Associations Seek New Solutions for CRT Glass Recycling
11 Idaho State University Agrees to
Pay $400,000 for HIPAA Violations
12 Trending Now -
Shredding Companies Eye Medical Waste Management