Fundamental protection is based on layers, or rings of Security surrounding what needs protected. Adversaries should be detected at the outermost perimeter. Those that pass through this detection must be defeated by interior layers of Security. Early detection is vital to a successful Security program.
Books and movies are filled with “impenetrable” security devices that are foiled by the villains and heroes. The only technical devices that are truly effective are those that work in concert with the other vital elements of security. The tools available continue to evolve and are very effective when applied in the right situations and circumstances vital to a good security program.
A security solution that relies solely on physical fortification or technical protection will fail. There is an absolute necessity to insert the human element. Individuals with the right skills and training are able to successfully respond to all situations and make sound security decisions. Security forces that work in concert with the customer, public, and other elements are essential personnel.
The protection of electronic and hardcopy documents goes well beyond virus software, passwords and locked desk drawers. Information is vulnerable wherever it is stored and must be protected. In addition, social media, news bulletins and emails have the potential to inadvertently leak your valuable information or result in an difficult situation.
You cannot succeed in business or government without a trusted work force. Proprietary or classified information is vulnerable as soon as it is shared with one single person. If that person is not trustworthy, you lose. You lose information, other employees, reputation and income when someone leaks your information.
“ A security solution that relies solely on physical fortification or technical protection will fail. There is an absolute necessity to insert the human element. ”
;