Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Effective SMB security on a budget

By Duncan Turner, Contributing writer, Fred Simon
teamwork business

Image from Pixabay

August 23, 2022
✕
Image in modal.

All too often do small to mid-sized businesses (SMBs) find themselves in need of security risk management immediately following an incident. These reactive organizations don’t have an internal security risk management capability and often require help with short-term security needs.

Building toward a long-term security strategy is key to protecting an organization. Small to mid-sized organizations typically only have a need, and the budget, for a single security role. Therefore, this role needs to be filled by a security generalist with experience across a broad range of security-related programs.

There are many strategies lone SMB security managers can employ to create and maintain fast-developed and financially sustainable security programs that mitigate risk, protect employees, promote situational awareness, preserve culture and build resilience.

I have designed the below security risk management model specifically for SMBs. This system of programs is designed to be scalable, cost effective and quick to implement by a corporate security manager with three to five years of experience. The diagram below shows the essential programs that should make up the security risk management system for a SMB.


*Click the image for greater detail

Image courtesy of Turner


SMBs with a single security manager are often constrained by tight budgets and need to be creative in how they mitigate the risks presented by identified threats. Getting started with programs shown in the above diagram can help benefit SMB security. Let’s look at three topics in depth — security leadership and liaison, workplace violence prevention, and employee security culture.


Security leadership and liaison

More so than ever before, SMB founders and leaders are being held accountable by their employees to provide a safe work environment. The reputation, brand and culture of a company are at stake if they fail to recognize and act on the signs and symptoms that a security threat may be materializing in their places of work.

SMB leaders work tirelessly to create a unique and rewarding culture for their employees, and therefore steps should be taken to protect it. One of those steps is hiring a security leader who will work tirelessly to become one of the most trusted, reliable and responsive individuals in the organization. An effective security manager empowers employees to become security advocates throughout the business.

In addition to strategic relationship building inside the SMB, security managers should strive to build relationships and liaise with outside agencies, such as law enforcement and first responders. Most local law enforcement agencies, both large and small, have personnel who are responsible for liaising with the community. These personnel are often more than happy to meet, learn about the company's needs, and offer services such as training or assessments. Additionally, having law enforcement officers familiar with your site is helpful if they ever need to respond to an emergency situation, as knowing the layout beforehand can benefit the outcome of an incident.

Developing relationships with federal law enforcement often comes with greater resources not available to local agencies. Building these relationships comes with the added benefit of being in position to directly report a crime that falls under federal jurisdiction, whether it is cyber or violent, criminal or terrorism-related. Government resources such as agency memberships and fusion centers can help businesses gain valuable threat intelligence that could affect their enterprise.

There have been many examples of companies benefiting greatly from these relationships. In some cases, companies have reached out to their contact at the FBI immediately upon discovering they have become victimized by a business email compromise (BEC). The FBI was able to assist them in recovering funds (often large amounts) believed to have been lost.


Workplace violence prevention

An SMB workplace violence prevention program should be built on three pillars — policy, training and technology. Let’s look at each one in turn.

The creation of policy is a low-cost, impactful and sustainable activity essential for a workplace violence prevention program. Security managers should partner with the HR and legal teams to determine what policies are already in place. Is there a zero-tolerance policy toward workplace violence in any form and at any level of severity? Are there anti-harassment and discrimination policies, substance abuse policies, business conduct and ethics policies, electronic communications and computer use policies? If policies that govern workplace violence reporting and incident response don’t exist, then the creation of those policies should be the security team’s top priority.

In terms of training, security managers should arrange behavioral analysis; Run, Hide, Fight; CPR/AED; first aid; and security awareness training sessions. Finding a local police department to conduct train-the-trainer sessions with the security manager can help reduce the costs associated with training, such as bringing in outside consultants and instructors.

In addition to general employee training, the security manager should ensure that they and their own team keep up with regular, specialized security training as well. Sessions geared towards threat assessment and risk management can benefit security teams while working to prevent workplace violence.

Alongside training, security technologies can aid teams in identifying and preventing workplace violence. Technology such as threat and gunshot detection systems can help reduce response times if a security incident takes place. Security systems that use artificial intelligence (AI) can help the security team automatically detect shots fired.


Employee security culture

One of the primary objectives when leading security operations is to give employees the knowledge and resources necessary to take as much responsibility for their own safety and security as possible. Often the experience and expertise needed to build security awareness is already present in the organization — you just have to know where to look.

More so than ever before, raising security awareness needs creativity and outreach — mandatory annual in-person or online security training is not enough. Even with robust support from HR, getting 100% compliance with mandatory security training is very difficult. The likelihood in this scenario is that online training is rushed and clicked through quickly, or even if employees cannot fast forward, they are paying little attention to the training or have it running in the background while they complete other tasks. But mandatory security training should not be dismissed entirely — there is a place for it in many industries, particularly critical infrastructure where compliance with security training and standards is non-negotiable, and where there is the appetite from HR to hold employees accountable for non-compliance.

However, there are other ways to raise security awareness in SMBs without resorting to mandatory awareness training. One such way is to build relationships with the internal communications and marketing teams within the organization. These teams have the creative expertise to help spread the security team’s message across in a way that will permeate the organization and resonate with employees.

When pushing a security awareness message to employees in the modern SMB, security has 5-8 seconds to capture the attention of their audience and get the message across. A stale poster instructing employees to say something when they see something just isn’t enough these days.

Partnering with the internal communications team to create engaging, fun and poignant security messaging can lead to a wider adoption of security awareness. Thinking outside of the box can lead to more engaging security awareness messaging — create short, animated videos of employees keeping a clear desk, finding out where their nearest emergency exit is, or knowing who to call in the event of an emergency. Animations, videos, artwork or sound bites can all be effective in getting security messaging across to employees.

If an SMB doesn’t have internal teams to leverage for help, there are other ways to get creative with security messaging. Reach out to local colleges with graphic design, marketing, brand management, or video production courses to see if any students may be interested in doing a project with the security department for course credits or a small fee.

Another outreach strategy that can be particularly effective in SMB workplaces is a security team pop-up at strategic locations around the office, preferably near congregation areas. One particularly successful pop-up involved offering employees the chance to enter into a prize draw if they stopped and had a sticker attached to the back of their ID badge with the security operations contact information on it.

The above are just three examples of how small security teams or lone security managers can implement high impact, fast developed and financially stable initiatives. More so than ever before, security leaders are being asked to do more with less. Therefore, they need to be innovative in building programs that are going to reduce the risk of threats materializing at their places of work.

KEYWORDS: employee morale risk management security awareness training security culture small business security SMB security workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Duncanturner

Duncan Turner is a corporate security executive in Los Angeles, leading security operations and building programs with The Walt Disney Company, Snap Inc., Hulu, and now Amazon MGM Studios. Image courtesy of Turner

Fred simon

Frederick J. Simon is Principal at LOOP, a company he created to provide a large variety of security and safety-related services to private and public entities in need. Simon served in the FBI for nearly 24 years. During this time, he was assigned to or assisted with various cases involving human intelligence gathering, hate crimes, espionage, international & domestic terrorism, violent crime, corruption, cyber crime and white-collar crime.

Later in his career, he maintained a leadership/coordinator role in various FBI programs that assisted in safeguarding public and private entities. He assisted the U.S. military, police & fire departments and was ultimately selected to serve as the primary Congressional Liaison for the FBI's largest Area of Responsibility (AOR) for this position, responsible for interacting with 30 U.S. Congress members on a regular basis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Team meeting in office

    The evolution of the corporate security mission

    See More
  • security leader salary

    Building a security operations center (SOC) on a budget

    See More
  • video wall SOC

    How to build a security operations center on a budget

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!