Skip to contentSkip to footer
returnToHomeBoon Edam logo
Contact

The Changing Face of Business Risk and Liability

Recent events have changed the sort of risks that businesses need to consider when planning their physical security. Today the list of potential risks is longer than ever, and includes threats that are faster-occurring and far more dangerous than those of the past. Active shooters, workplace violence, terrorist incidents, and cyber attacks are all possible threats to a modern business that businesses should put in prevention plans to try to mitigate. These all pose problems not just for employee safety and productivity, but also for the continuing functioning of the business.

In addition, businesses need to consider liability issues posed by these threats. If a firm is found in the wake of an event to have neglected to factor in security that could have prevented the event, it could be held liable for the resulting damages. This could lead to crippling liability judgments, loss of status and reputation, disruptions to productivity, and changeovers in staff and management. The liability risk posed by these threats can often outweigh the problems presented by the threats themselves. Increasing the physical security of a business helps protect not only the employees and the facility, but the integrity of the operation.

Regulations have also changed as the threats to business operations have evolved, requiring businesses to remain in compliance or face penalties and possible business disruption. The passing of Homeland Security legislation to protect critical infrastructure has included industries such as Manufacturing, Energy, Transportation, Technology, and others. With these regulations-- such as FISMA, NERC CIP 14 4-6, ISO, Food Defense, OSHA, and a variety of other regulatory legislation and departments— it is now in an organization's best interest to determine and mitigate threats and stay within compliance.

It is for this reason that the entrances to a business facility have needed to evolve. In the past, the style and operation of the doors may have been specified by the architect, engineer, or building contractor and have been based on compliance to safety guidelines regarding egress (during a fire, for example). Considering the desire for user convenience and an overall design aesthetic for the facility, sliding or swinging doors were typically selected. Managers were often under-informed of the security implications of the selections being made for them, because the people choosing the style of entrances did not often have any security background. The result was buildings equipped with doors that could neither deter criminals nor reduce vulnerabilities, leaving businesses open to liability and threats from outside.

Free Whitepaper: Mitigating Risk with Security Entrances

What would be the impact to your facility if someone unauthorized got in with an agenda?

Mitigating Risk with Security Entrances

Swinging Doors Sacrifice Security for Convenience

Even with the most sophisticated access control solution deployed in the lobby and main entrances, if there is one single swinging door anywhere on a perimeter, the facility is in fact fully vulnerable. Swinging doors create risk for businesses because they cannot prevent unauthorized intrusions. This creates a physical security risk for an organization that can lead to a liability should an intruder cause harm or loss.

While sensors can be installed on swinging doors to detect certain situations – for example, that a door remains open, or that more than one person has entered on a valid authorization (known as “tailgating”) – the swinging door itself cannot prevent such intrusions. For businesses with existing swinging doors, there can be no denial of either risk or liability in the case of an incident. Many facilities employ guards to monitor swinging doors and deal with incidents when they occur. However, human nature means that guards are subject to distractions, absenteeism, fatigue, being spread too thin or overwhelmed during busy periods, and all the other issues that can come with relying on a human being for security. There is even a term in the hacker universe for getting around security guards: social engineering. Guards perform a crucial role, but without reliable technology to support them in controlling physical access into facilities, they leave firms open and vulnerable to being held liable in the aftermath.

The tools to fix this gap – security entrances – are readily available to help protect business employees and assets. Security entrances are the most reliable and proven solution available today, and can tremendously reduce both the physical and cyber security risks associated with intruders.

Tailgating Survey

Physical Security Is Integral to Protecting Data

As the internet has connected more and more of our world, security teams have needed to consider the implications of protecting their virtual assets as well as their physical assets. Historically, that has been the responsibility of the IT department, as they were considered to have a better knowledge of how to secure data, while Physical Security protected the physical facility. Today physical and cyber security not only protect each other, but also have a shared role in the protection of data, and must be planned and supported in a coordinated way to ensure that protection is effective.

If, for example, a hacker gains remote control of a building’s access control system through external networks, then the physical security of a facility is compromised—a problem that has potential repercussions across multiple business operations. Conversely, if a physical intruder to the facility gains access to an internal data network by plugging into an Ethernet port or walking out with a stolen server, then firewalls are compromised, and all of your data is fully vulnerable. Either failure puts intellectual property and other information at risk, including business strategies, financial records, pricing, product design data, personal information about employees and much more.

Many businesses do not recognize the synchronicity required by physical and cyber security, and some have paid the price. In just the last few years, hundreds of millions of data records have been compromised in dozens of well-publicized data breaches, and it is likely that many additional records have been compromised in smaller and less-public incidents. Today, virtually all regulations around cyber security mandate some form of physical access control to prevent ingress into a facility containing protected data.

Regulations concerning data protection often do not consider presence of a standard swinging door (or gate, if outdoors) as compliant, given the risk of unauthorized entry. Non-compliant firms may be subject to significant fines and other actions.

Here are some examples:

Risk Mitigation Strategies | Pillar Page

How Security Entrance Solutions Mitigate Risk

Security entrances reduce liability by demonstrating a plausible degree of effort to prevent infiltration. They protect the personal safety and security of staff, visitors and anyone else in your facility. But, not all security entrance solutions are created equal. There are four categories to consider for effective entrance implementation: crowd control, deterrence, detection, and prevention.

Conclusion

There are a wide variety of solutions that can provide security at the entrance to a facility, but many do not adequately compensate for the possible risks posed in today’s environment. Modern security entrances can help to mitigate business risk by preventing unauthorized access and providing essential metrics to physical security operations. Ultimately, security entrances are a good investment for any organization that needs to control access to any points in their facilities.