A Business Plan Must Include Security
TASA ID: 915
A BUSINESS PLAN MUST INCLUDE SECURITY Fraudulent business practices, shootings, workplace violence, acts of terrorism,
embezzlement, fraud--with the list getting longer every time one picks up the
newspaper. Continual attacks on businesses, large and small. Attacks launched
from inside and out, motivated by greed, politics or revenge.
The common denominator often found within these acts lies with the victims
themselves. It is often found that the targeted business made it relatively easy for
the activity to occur as a result of deficient or no protective protocol.
An absence of checks and balances, little to no employee training, no pre-plan for
Investigative procedure, "window dressing" or no physical security practices,
Administrators with no practical security knowledge or experience coupled with no
planning are often the common weaknesses identified.
American business, regardless of size, continually embraces the thought that "it
can't happen to us." Yet, it happens across the country on almost a daily basis.
One needs only to read the newspaper or specific business journals to be reminded
of what the lack of security programs is costing employees, shareholders and the
American buying public.
Although the absence of prudent or reasonable security protocol is not new, much
has been written and discussed since September 11. Many larger businesses have
again been lulled to sleep as a result of no further attacks against businesses on our
continent.
A prudent and comprehensive security program must include all probable threats
against a business. These threats or "risks" should be identified as they relate to
each component of the business as a whole. A complete definition of a threat must
be agreed upon before any attempt is made to create or upgrade a security
program. A threat must be defined as any probable action, which, if executed,
will cause negative harm to the business objective. Internal theft, fraud, violence,
theft of intellectual property, product counterfeiting, IT hacking, and fire are just a
few examples.
Each operating department, from human resources through building maintenance,
has threats that must be identified and evaluated as to their probability. Once these threats are
recognized, corporate programs should be developed and executed to mitigate or
eliminate them.
Some of the most important components of an organization's security plan must
include the following:
Risk identification
Emergency preparedness
Employee/management awareness
Violence-in-the-workplace strategies
Confidential employee communication programs
Perimeter lighting, doors and windows
Physical security systems
Video surveillance system
Travel security protocol
Successful businesses go to market with a clear and tested business plan. Within
this plan are marketing, advertising, production schedules, sales, funding, financial
objectives, logistics, research and sales. The plan ensures that nothing is left to
"chance." This operating protocol is established and utilized to run and measure
the results on a monthly basis. Ironically, many of these same businesses never
include in their business plan the protection of their employees, facilities, assets
and reputations.
The result? Waiting to react after the damage has been done. This lack of security
planning and inclusion is being questioned both in the boardroom and courtroom
throughout the country. Questions center around did you know, should you have
known, why the lack of even the simplest plan given today's environment?
Allowing a business to become a victim suggests a naivety that no organization
can afford. The core business plan leaves nothing to chance while "luck" was
being used as a security strategy.
Employees, investors and shareholders should expect that every reasonable and
prudent security precaution be taken to ensure the safety and security of the
workplace, which has a direct effect on the financial health of the company. To do
otherwise allows anyone to prey on them.
This article discusses issues of general interest and does not give any specific legal, medical, or business advice pertaining to any specific circumstances. Before acting upon any of its information, you should obtain appropriate advice from a lawyer or other qualified professional.
This article may not be duplicated, altered, distributed, saved, incorporated into another document or website, or otherwise modified without the author's permission through TASA.