If a contractor owns something of value and it is left unprotected for long enough, there is a high possibility someone else will target it. Whether a laborer on a construction site or owner of a high tech company, people are always looking to profit from a potential lack of security.
The first layer of protection always should be physical security of the facility or jobsite, with protection of human assets coming first and physical property second. The primary concern at this level is controlled access points. Limited access points, in combination with active controlled assess, will greatly reduce the likelihood of unauthorized persons accessing the facility or jobsite.
For the perimeter security system to be effective, the purpose for the system and the need for compliance should be explained to all staff. Doors that have been propped open or magnetic locks that have been bypassed in some way defeat the purpose of controlled access points.
Consider additional layers of exterior security such as closed circuit television (CCTV) coverage of as much of the exterior of the facility as possible and roving and stationary security details. While a security guard provides visual deterrence to most people looking to cause harm, the CCTV system provides evidence in the event a breach does occur.
But beyond the physical security of protecting a company’s assets from theft, consider the cost of recovery of property in the event it is ever stolen. Many companies offer asset recovery products which are typically GPS based. With the application of a small, easily hid tracking devices and easy-to-download software, it is simple to pinpoint the locations of equipment quickly and notify law enforcement of its location.
For large assets such as heavy equipment, tractor trailers or portable industrial equipment, a wide array of products can track equipment or other high value assets via GPS tracking; notifications of vehicle movement, excessive speed, hard cornering, hard breaking, hard acceleration and fuel economy; and electronic log compliance for over-the-road trucking operations.
Smaller, more portable assets such laptops, computer hardware and cell phones could have valuable company data or proprietary information on them that could eventually be hacked. These devices should be encrypted, but if not, they need to be tracked and recovered quickly in order to prevent the data from being compromised.
Numerous vendors offer tracking hardware and software to help businesses and law enforcement track and locate property. One company provides small, easily concealed tracking devices that can be hidden in the smallest device.
The chances of recovering stolen devices without the use of tracking software is almost zero. With GPS tracking software and the cooperation of law enforcement, assets stand a better chance of being recovered quickly and safely.