Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

An Eye on ROI

November 1, 2005
As specialists in the design and engineering of security programs for large hospitals and medical campus environments, The Bordes Group of Orlando, Fla., is continuously challenged to justify the monetary output needed for sophisticated security applications and procedures because of management’s concern for its return on investment (ROI). Management needs and desires good security but is cautious to spend because the expenditure is an operating expense with a very weak or non-existent ROI.

My company has discovered some key ways to address ROI in hospitals; hopefully they can be used by others as they address this critical issue.

There are special security needs at healthcare facilities. For example, IKEY’s SlimKey-MD medical keyboards feature cleanable, waterproof designs, built-in pointing devices and backlit keys. Compatible with any hospital cleaning agent, SlimKey-MD keyboards are for use in an array of healthcare settings including security consoles. Photo courtesy: PRNewsFoto

Personnel costs

Our group designs large, integrated electronic security systems that include a multiple of technological disciplines, all of which are designed to improve the security posture of whatever type of facility is being addressed. But employing technology does not mean that jobs will have to be cut. We suggest that hospital security teams and management enhance their overall security program by re-deploying existing personnel to cover areas that perhaps have not, to date, been adequately protected.

Electronic security equipment allows a security console officer – through the use of video, monitoring, audio contacts, and other security applications – to be in many places at one time. If one or two security officers are stationed at a central console and are able to assess situations before the deployment of a response team is necessary, a partial ROI has immediately been established because security is still in place even though the situation is being handled from the console.

A good example of this is late-night security at parking lots and structures. All parking facilities – whether they be structures or lots – should be well lighted, have security video coverage, and be equipped with strategically placed assistance stations with two-way audio circuits that can be heard throughout the lot when the console officer initiates an “all stations” transmission.

Likewise, we recommend that security personnel provide escorts for personnel walking out to the parking lot at, say, 2 a.m., but many times that is not humanly possible. The console officer makes it possible by activating an audio circuit in the area and announcing to the employee that they are on video and will be visibly followed to the car. This serves two purposes: the announcement alerts any perpetrators that a video system is in place, and the employee feels more secure knowing that someone is observing them. With a console officer in place, the hospital’s security program has the ability to implement more patrols and deploy quicker response units, making it immediately more effective.

Units of service

Many times security programs identify the scope of services but cannot document how often a service was performed and who benefited from that service.

Our group helped one client devise an effective solution to this dilemma. Each function performed by the security team was documented and a cost factor was established for the service. Flat fees went for services like monthly video monitoring; but incidental services, such as access control transactions, had a fee, response teams had a fee, and so forth. Even though the dollar amounts were relatively small, they were tallied by the security management team at the end of each month and sent to accounting for interdepartmental charge-backs. These “small” numbers the security services developed were astounding! They proved that the security program was, on paper, making a profit!

Think about it: How many transactions does your access control systems manage a day, and what would be your department’s return at 10 cents per transaction? If you need to establish the number, find out what access control central stations charge per transaction. You may be surprised at their costs!

But even with this unit-cost program in place, our client’s budget is – as at all hospitals – very tight; but the security director now has justification when requesting the necessary funds to maintain, and if possible, enhance the program.

In reality, the eye-opener is not so much the monies identified, but the realization by administration personnel of just how much the security team was contributing to keeping the hospital sailing on an even keel. The program is still in place, and the hospital’s administration looks forward to seeing these numbers on the balance sheet every quarter. The program also provides a vehicle from which management can identify effective versus ineffective efforts, thus providing far better insight for the decision-makers as they ponder security program enhancements or changes.

Internal theft

This is still one of the major problems faced by medical facilities. Too often, visitors, employees, contractors, vendors and service personnel steal, and in some instances, the numbers are very high.

Enhancing your security program to ensure tighter security on hospital exits is always an effective application. This involves the use of not only access control, but video surveillance, audio circuits and egress-control locking devices, if they are acceptable to the fire marshal in your particular area. Otherwise, the use of local alarms with console monitoring and video coverage, both inside and outside, will at least develop an evidentiary audit trail of the individual(s) violating the egress program, and will allow for disciplinary actions.

It is difficult to stop internal theft in hospitals, but with a console officer, those re-deployed security officers can now cover employee entrances and exits. It is extremely important that the security director have the loss numbers from all departments on a monthly or quarterly basis. This will allow for a comparison to be made regarding pre-protection as opposed to post-protection application evaluations.

Last, but definitely not least, it is vital to get employees’ opinions on internal theft, as well as their recommendations on how to address the problem. Employees need to realize that the security department is serious. If they understand how security affects their hospital’s bottom line, feedback could be very positive. The employee is in the trenches and sees what goes on every day in areas where security may only visit once a day, or even less frequently. Their input, if properly solicited, could prove to be invaluable to the program

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keep an Eye on these National Databases

    See More
  • Want to Stop Data Breaches? Keep an Eye Out for These Six Employee Personas

    See More
  • Police tape at an emergency location

    The ROI on Physical Safety and Security

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing