This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Do you understand the current risks to your organisations, personnel and infrastructure?

Author : Jason Wakefield is sales director for Todd Research

16 November 2017

Business continuity and effective planning for the security of your building is essential for good Facilities Management, but unfortunately it is often neglected.

Failure to plan for security and counter terrorism often leads to increases in project costs, delays in delivery and poor security by design.

Jason Wakefield, Director at Todd Research explains how you can answer these vital questions with confidence and conviction.

A team of specialist Todd advisors can guide you through the entire business continuity process step by step, enabling you to better identify threats and efficiently manage your security procedures.

In this era of rapid response, reputation and market share can easily be eroded following an inadequate response in the wake of a disruption.

It’s critical that businesses continue to deliver products or services following a serious incident.

Our full continuity assessment service covers everything from a full mapping of your specific critical business functions to training your team on how to react to various types of threats against your business.

Following The Centre for the Protection of National Infrastructure (CPNI) guidelines your business continuity plan should consider:

1.Resilience: critical business functions and the supporting infrastructure must be designed in such a way that they are materially unaffected by relevant disruptions, for example through the use of redundancy and spare capacity;

2.Recovery: arrangements have to be made to recover or restore critical and less critical business functions that fail for some reason.

3.Contingency: the organisation establishes a generalised capability and readiness to cope effectively with whatever major incidents and disasters occur, including those that were not, and perhaps could not have been, foreseen.

Contingency preparations constitute a last-resort response if resilience and recovery arrangements should prove inadequate in practice.

The first part of our assessment is a complete mapping of your critical business functions and key assets, determining what they are used for and how they could come under threat identifying recovery times and alternative working methods.

The assessment examines risk at entry to the building; how visitors are screened and bags searched when entering the building.

How post and parcels are delivered, including the physical location of the post room within the building, and pinpointing any potential surrounding threats that may be business critical.

Rather than a single point of entry, we often find that there are multiple points of entry for post in the building; for example, Royal Mail and courier deliveries into a loading bay and hand delivered items through reception.

This all need to be considered as part of the Threat Assessment. We then look at current known threats in the form of chemical or biological agents, including powder or liquid form, as well as explosives and items designed to inflict physical and psychological harm and how the business would specifically handle or overcome these threats.

In addition, we identifying any services such as computer servers, utilities and any key personnel within your organisation that may be in a potential blast area, so that any detonation would have minimal effect to the business and the area affected can be closed off safely and with ease.

Disaster recovery planning also looks at terrorist or environmental disasters and Todd Research can assist you put in place specialist equipment to help prevent such disasters, such as our cabinet X-ray Mailroom scanners, allowing your staff to identify weapons or explosives before they enter your building.

Next we identify the optimal method for restarting your business from either a co-location or your existing location and have plans in place to replace your key assets quickly.

Where a co-location is selected it should have equal security measures as your main site (e.g. CCTV, Access Control, front of house X-ray scanning and postal scanning and metal detection products).

Once we have gathered all the information needed during the mapping process and determined the best possible recovery methods for your business we design your bespoke Business Continuity Plan (BCP) and then implement it across your business ensuring that your staff are fully trained, understand the plan and can implement their parts successfully.

Finally, we carry out tests to the plan with table top exercises once a year, reviewing every aspect of your BCP and checking the effectiveness and age of the front end security equipment (e.g. CCTV, Access Control, front of house X-ray scanning and postal scanning and metal detection products)

Business Continuity

Once the assessment and action plan is in place, we show you how to achieve full IRR1999 compliance and keep staff up to date with current terror threats following the countrywide alert status set by MI5 and introducing them to the CTSA (Counter Terrorist Security Advisor).

An overview of groups that may target businesses in the surrounding areas will also be identified and reasons why they would specifically target your organisation; it is important to also consider the lone activist, disgruntled employee or customer with a grudge.

A reporting schedule will be put into place, recording any mail attacks, tracking current trends and methods used by individuals or groups which can also be used as a staff training tool.

Finally, we assess and ensure that a business can still operate effectively if it were to evacuate because of a suspect package by identifying a co-location either on another site or in another part of the building.

Full procedures with actions on finding suspect devices will be written, practiced and updated on a regular basis, so that operators and security staff know exactly what to do if a suspect device is found.

Employees, customers and visitors to a building feel secure when they see these security precautions in place.

However, it is important to understand that the secret to security success is as much in the assessment, recommendation and implementation of measures and regular awareness training.

When it comes to ensuring business continuity, Todd Research can assist in a number of ways either by carrying out a full assessment as detailed above or assisting with part of the pre-planning and logistics capability.

Whatever direction you take, our professionals will work alongside your team to enable your business to continue operating in a safe and efficient way.


Contact Details and Archive...

Print this page | E-mail this page

MOST VIEWED...


Article image Why the Law Says You Need a Nappy Bin Disposal Service

At home, parents are used to disposing of their babies’ used nappies the same way they do any other domestic waste - bagging it up and sticking it in the rubbish for general collection.Full Story...

Article image Value in creating an all-inclusive company approach

Continuing the discussion on diversity in FM, following PFM’s previous interview with Gary Zetter, featuring comments from the industry’s leading lights on this topic.Full Story...

Beneficial effects of HS2 revealed

Sky-high expectations within the vertical city

Continuing growth predicted for street lighting

http://www.fsifm.comhttps://www.emergencyuk.com/pfmb18https://ccsheretohelp.uk/products-services/buildings/facilities-management/?utm_source=press-display&utm_medium=banner&utm_campaign=buildings-fm&utm_content=pfm-websitehttp://www.pfmawards.co.uk/https://www.daikinapplied.uk/service