Introduction
The Walter Widget Manufacturing plant risks the plight of being subjected to greater insurance premiums by its insurance cover Company. During this hard economic times that have been on a downwards trend, the impact of increased premiums would lead to crumbling financial muscles of the plant. The number of employees and the costs of production are likely to shoot thus agonizing any efforts made towards profitability. It thus means that diligent and carefully selected measures have to be undertaken for rectification of the situation. Therefore, the study adopted in this research paper is justified in trying to identify and enhance the security details of the plant’s block so as to strategically reposition itself in enhancing the security thus avoiding escalation in the insurance premiums charged by the insurance cover.
Overview
This essay attempts to thoroughly scrutinize the security options that have been advanced by the company as pertinent in securing enhanced watch and levels of security in the plant. For instance a bias stand is taken with regard to the physical burglary options that can be possibly undertaken by criminals. Intrusions, personal attacks and arson are also given a thorough analysis. The options of employee training through sensitization are also given a flow thought in as far as the security planning of the plant is concerned. The plant’s mode of hiring and sensitization mechanisms and initiatives among its employees are also questioned in an attempt to understand the logical security plan and methods to be adopted as the best security enhancement. There is also an observation of the emergency response and recommendations for the security details that are best placed in terms of adoption.
The Walter widget manufacturing plant is located in an area of virtual security, protected by the ambience of the security offered by police patrol in the area. However the increase in criminal attacks stipulates that urgent and stricter mechanisms have to be undertaken in securing the safety of the employees. McIlwraith (2006) notes that the safety of employees is important in ensuring that company employees are at ease during operation hours. The two shift way of working that is adopted by the company can only be properly functional if the staff is well protected and the plight of workers monitored at highly frequented alternations. Therefore the building needs to be thoroughly alarmed for enhancement in the security details. For instance there is a need to employ watchmen and guards who will man the facility’s entrance and exit doors. Personal screening needs to be done on every person entering the building. However as Chan et al. (2005) observe, in their report, the staff needs to be sensitized about the nature of security measures undertaken by the security team so as not to be offended by the screening done.
The alternative can be the installation of burglar-proof doors that are computerized in access. Here the working members of the company will be provided with codes or PINs that are unique for the entrance doors. Security will be amplified by adopting the use of burglar proof doors, especially in areas of high profile company files. The advent of surveillance cameras and sniffer spies on security matter will also go a long way in improving the security details of the block (Chan et al., 2005) .The cameras for instance should be installed both in-house and outside the house so as that they ca n monitor the activities taking place in the company. McIlwraith (2006) notes that the use of cameras enhance the levels of awareness of the people around; there is definitely going to be more caution in the levels of indulgence therefore enhancing the security levels in the company. The results will definitely be positive. Chan et al. (2005) also observes that the security of company block can be enhanced through the adoption of stringent measures on members who breach security measures undertaken by the company. This means that the policies that are adopted must be in line with the stringent measures that have been enforced.
It is also not a strange thing to note that sometimes the vandalism or property damage can be caused by the laborers or workers in the job place. Therefore the company should develop a new policy that safeguards its equipment. Measures should be taken against members of staff who collude with the external groups of individuals to acquire company property. Criminal charges should be advanced at this people by suing them for theft and breach of contract terms. Measures like possible job sacking or disciplinary action taken against them will play a big role in controlling the level of behavior among the employees.
Another factor to be considered in ensuring the security of the plant is through the regularization of information access to the staff. The information that the ordinary staff members are able to access needs to be controlled for proper security measures. When the information is centered in a particular area or department, it means that it is that department that is responsible for particular duty and therefore fully responsible for any eventualities that may be forthcoming. For instance information pertaining to the cash office should strictly be handled by the finance department and not leaked to the ordinary laborers and the unskilled staff. The information records on security systems should be well backed up to ensure that there is a continuous report for analyses in case of any attacks on the company block. The video memory of the CCTV surveillance should be stored for at least a month for an elaborate and comprehensive cover.
The hiring policy and training should also be scrutinized so as to follow the tough security measures that are being undertaken by the plant. In the process of maximizing security measures, desperate measures must be undertaken to avoid such technicalities that may arise out of wrong procedural employment measures (McIlwraith, 2006). The new members joining the company must be thoroughly scrutinized and taught about the company’s policy on matters of security and their behavior at work. McIlwraith (2006) observes that new entrants at the job market will normally manifest character traits that are related to the manners of the existing fraternity in the industry. This therefore calls for fresh re-observation of the parties involved. Changing the perception adopted by the entrants through exposure to the standard rules, ethos and practices advanced by the company will ensure that security details and good culture continually become the norm of the company. Security would then be achieved through the rigorous scrutiny that is adopted by the plant industry.
The emergency response of the company also needs to be reappraised if it is old or in poor conditions of maintenance. The building needs to be fitted and installed with evacuation equipment, fire extinguishers, automatic alarms and other equipment that is necessary in improving the security level of the area. The company can for instance incorporate the use of call numbers that are that the general public can report any crimes taking place in the area. The security systems team should adopt use of radio calls in trying to patrol the block at night. This will ensure that they are able to coordinate their actions and movements easily. The patrol will enhance the security system of the company thus providing another level of security measures taken by the company.
McIlwraith (2006) speculates that the security measures if a company can also be improved through training of its personnel. The Walter Widget manufacturing plant poses as one of the companies that is majorly affected by the concerns of security in the ever-increasing criminally ill city surroundings. Training of tight security guidelines of the security team will go in handy in securing the building. For instance the members need to be trained on the levels of relations between the staff and the external community. They should be sensitized to understand the extent to which the company opens to the external visitors and other members requiring the services of the company. This will improve service delivery to clients while at the same time ensuring constant monitoring of the security operations of the area. Training also needs to be mounted for the internal staff with regard to personal care and being conscious that the area is under frequent attacks. The staff needs to be sensitized and trained on how to avoid being caught up by criminals who currently are spelling a season of attacks. The emphasis of being cautious of where they leave their things, for example where the cars are parked and checking who they give a lift home or outside the block is necessary in promoting security measures and concerns among the workers. The security of the block will therefore be enhanced when all the staff members are aware of the situation at hand, and thus able to cope up with the requirements and speculations adopted to avert any ugly scenes.
McIlwraith (2006) further argues that security trainings include how to react to needy situations in case of an attack. Members here are taught what to do and how to behave min such a situation. In the report, Should you use armed guards (1996), it is speculated that lady employees are the ones who are most affected when it comes to reacting to a witness or being involved in a crime. It pertinent that the people involved maintain a cool and relaxed state and report the incident instead of panicking and becoming overwhelmed with the occurrence of the events. Training needs also to be cognizant of the analysis of the situation before reacting. If the members are armed it is advisable to cooperate to their demands and, only report when it is safe, otherwise one risks their lives on the hands of criminals. Criminal response skills need to be inculcated in the security guards and the watchmen. The use of the computerized burglar proof doors also needs to be trained in terms of access. Some employees have the habit of ignorance and may leave the door open even after using it. The use of these types of doors will ensure that the workers are working under an area of high security measures. Workers should therefore be taught how to operate the electronic doors. This is so because not all employees in the plant are well acquainted to the electronic gadgets. This will promote better use and enhanced security in the area of work.
IT security of the firm also has to be secured since there is an increase in cybercrime and online penetration of systems. Wikibon, (2010), notes that cybercrime is increasingly becoming a threat to many companies. This therefore means that if proper mechanisms are not adopted to reverse or curb the trend, the state of security levels of the company is likely to deteriorate and perhaps posing dire consequences to the overall functioning of the company. There are different levels of IT security that can be adopted by the Walter Widget plant. Some of them will involve the design of risk management framework, security policies and through logging, monitoring and reporting of crime attempts that may be sniffed in the online systems. The company needs to boost up its information management levels to a more spirited one. The information needs to be filtered so that only the relevant information of the company can be accessed by the employees and no other unsolicited information that may add flaws to the foreign. Controlling the traffic that is able to flow over a network is necessary in enhancing the security of the systems at the work stations (Wikibon, 2010).This translates to better and improved information security for the company.
Wikibon (2010) observes that re-authentication on PCs is mandatory for any working space that needs to improve its security. The more the number of employees the Walter widget company handles the more the need for authentication on the working machines. This is because many computers are hacked into by malicious users and can lead to security breach. Some of the computers can be accessed from home by employees in scenarios where members want to work or complete their work after normal working hours. This could lead to a possible security threat, thus negatively impacting on the company.
Another information security level that should be undertaken is housed the mainframe and other minicomputers in strong rooms that are free from external exposure. This ensures that the central processing zone is secured and therefore free from any possible external interference. Platform security may also be adopted. This refers ‘hardening’ whereby an entire software that runs in the programs of the Walter Widget plant is protected, therefore securing it from malware and other spoofing software that may be implanted by hackers. Wikibon (2010) also notes that identity and access mechanisms such as authorization and authentication are necessary in enhancing security through uniquely known information that is provided by the users. Authorization ensures that only restricted number of staff have the access codes to specific rooms or information. This reduces the levels of likelihood for breach of security.
Guard force as recommended by the security agent is necessary in physical manning of the Widget plant block. There is need for manual security enforcers so that there is a feeling of security around the building. This will scare away criminals who are alerted that there is surveillance and strict security measures involved in the access of the building. Wikibon (2010) argues that vandalism in most cases is conducted in blocks where there is no physical presence of the guard force. Areas where the guard force is heavily felt will normally exhibit low cases of guard attacks or crimes experienced in the area. Guard force is very important in enhancing the security of the company because of many factors. One of the major reasons for its consideration is the fact that the guard force presence has a major impact in terms of overseeing the company security and policing the block to prevent any crime from happening. The guards go a long way in ensuring that the areas of operation are properly manned thus preventing any likely ugly scene of theft. Therefore it is a good and recommendation that needs to be implemented without fail.
The Walter Widget Plant concerns of its employees who have to cross to the half-acre parking has also been factored in consideration of security enhancement. The plant will need to employ more guards who will take control of the parking lot. This guard will be responsible of guarding the region and the cars parked in the area. Anyone who has no access to the area and is not an employee of the company will have to be frisked and directed to the proper areas of concern. This way security of the employee property will be guaranteed and taken into account. Surveillance cameras should also be fitted to monitor the activity in the region where the cars are parked. The surveillance will ensure the security of the region is put under control since every detail will be under watch. Therefore the members will not have to worry of their property and about their safety. If anything that is likely to interfere with the security of the plant is noted, it should be reported before it escalates into a big problem.
The path leading to the parking bay and where employees board public transport should also be considered in the security measures taken by the company. For instance, here the company should employ guards and sniffer spies who traverse the region before the eventual crossing of the area by the employees. The guards should also escort the employees across the road if the area is under great threat. However as Nyanchama (2005) notes escort of employees should be carefully done to avoid suspicion by gang groups. When suspicion is greater the likelihood of attacks increases thus putting the life of the employees in greater danger than actually protecting them. The escort should therefore be done through a hibernation mode, where the guards are dressed in civilians and walking through with the employees as they cross the road. One disadvantage of this mode is that it could be expensive, therefore amore better way to do it would be use of company bus to ferry all employees to the other side by the end of the working day. This will ensure that there is tight security accorded to all members at once through escort rather than individual protection of members who leave at their own pleasure; of which it may not be practical.
The Walter Widget floor Plant should adopt a more secured policy in terms of access. This should use the authentication and authorization policy as earlier discussed in this essay. For instance computerized burglar proof doors may be fitted with secured access codes where only the staff members have access. The floor should be thoroughly fitted with alarms systems and CCTV surveillance to increase the security level and emergency response ability of the company to its offices. Security guards should also be placed at the door to conduct incoming members screening to ensure that those who enter the offices are free from harm. All this measures will go a long way in enhancing the security details of the firm. As much as the company is grappling with the issue of insecurity in the area, efforts of enhancing security will have to start being implemented by the members themselves. Security is better enhanced if the employees are aware the security requirements of the area they are working from (Nyanchama, 2005).
References
Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy & Security, 1(3), 18-41. http://search.proquest.com/docview/203675978?accountid=45049
McIlwraith, M.,(2006).Information security and employee behavior: How to reduce risks through employee training and Awareness. Burlington USA: Gower Publishing Company
Nyanchama, M. (2005). Enterprise vulnerability management and its role in information security management. Information Security Journal, 14(3), 29-56. http://search.proquest.com/docview/229507383?accountid=45049
Should you use armed guards? (1996). Drug Topics, 140(21), 97-97. http://search.proquest.com/docview/205054366?accountid=45049
Wikibon (2010).Eight levels of Information Technology Security. Retrieved from http://wikibon.org/blog/8-levels-of-information-technology-security/