
Depending on your desired outcome, these assessments can be undertaken using varying degrees of detailed analysis ranging from the small issues,
i.e. protection of personal property, to a macro perspective, which focuses on business
continuity. Our Security Assessment is a three step process including:
Risk and Threat Analysis - looks at a number of potential threat components. The product of this analysis is known as your "inherent risk". This is the level of risk which is generated by the nature of your business, the industry you belong to and your daily operations. Critical business functions are also identified.
Review Current Security Systems and Plans - requires a technical and operational assessment of current security
systems, operations and all other countermeasures used to treat the inherent risk. The product of this analysis is your
"residual risk". Based on sound gap analysis techniques, this is the level of risk which continues to exist after current
security management plans are taken into account.
Recommendations Report - details the identified risks, the strengths and weaknesses of current security planning, and
provides a list of realistic recommendations prioritized and provided with cost estimates.




