Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

Risk assessments in focus amid security challenges

In the face of evolving risks, it’s time to reassess your security operation’s everyday hazards.

By Mike Zblewski
security-risk_assessment-fp1170x658v4pf.jpg

Image by eamesbot via Freepik

September 2, 2022

In 2020, everything changed. Protecting workers’ health and safety from the risks of COVID-19 fundamentally changed what most had come to know as business as usual. The effects of this sudden disruption continue to ripple through many businesses’ day-to-day operations. 


Now, businesses must also contend with supply chain challenges, worker shortages, and inflation concerns. These immediate concerns often require the most attention, distracting leadership from the everyday incidents and compliance issues in their facilities. Common safety risks — from security gaps to employee injuries — haven’t gone away, and may be even more detrimental to your operations if time and resources are already stretched thin. 


If it’s been a while since you conducted a thorough risk assessment, now is the time to get back on top of your safety planning. After all, to be proactive is to be prepared, and safety is foundational to business success. Review the following points to help mitigate potential losses and protect your security team — and your business — from major safety risks.


Why now is a good time to reassess your risks

Supply chain concerns and staffing shortages have created new pressures for businesses to contend with. But think back to life before the pandemic: even under the best-operating conditions, everyone shares responsibility in taking the time to create a safe work environment for each other. 


If anyone questions the need to reevaluate business risks or doesn’t believe they can spend the time or resources conducting assessments, remind them the best practice is to conduct a risk assessment when:


·        You make workflow changes

·        You add a new process

·        You add, replace, or update equipment

·        You hire new staff or change job duties


Change is constant. Given today’s challenges, your business has likely made one or more changes since your last risk assessment. If that’s the case, a thorough review is probably overdue.


Employees reflect your commitment

Unfortunately, we’ve seen declines in employee training quality and quantity over the past few years. No matter your industry, occupational hazards exist in your workplace, and recent hires — or employees who have taken on new responsibilities — simply don’t know what they don’t know. Insufficient employee training can put your business at greater risk of employee injury and significant health hazards, workers’ compensation claims, equipment and facility damage, and security threats.


Investing the time and resources to adequately train your team may be challenging, but targeting those resources to minimize your risks is worth the initial investment. Conducting a thorough risk assessment helps you identify the most pertinent business risks and provides evidence you can use to teach your team members the unique roles they play in protecting themselves and others from danger.


Risk assessment process

While no two businesses operate exactly the same, the goal of any risk assessment is ultimately the same — to protect employees and comply with applicable laws. And while there are no strict rules on assessing your risks and ensuring compliance with safety regulations, we recommend the following process as a starting point.


1.  Identify the security risks

The first step is to broadly consider all the risks of your business — especially those that may be new. Find an insurance partner or safety consultant who can help you create a pinpoint assessment of your facility and business, including:

-      Physical hazards

-      Chemicals

-      Onsite equipment

-      Areas vulnerable to inclement weather

-      Cybersecurity risks

 

2. Define risk metrics

To create and prioritize risk mitigation strategies, hold all risks to the same standard in terms of likelihood and severity, regarding the danger they pose to your operation’s safety and security.


3. Evaluate your results

After considering all your risks and defining standards for their potential impact, identify which ones pose the biggest and most imminent threat to your business. Use that evaluation to plan how to allocate time and resources to your biggest threats.


4. Create security solutions

Take the time to consider what new safeguards can or should be implemented to help reduce the risk of loss. Whether it’s new processes, dedicated safety training, or additional physical protection, the plans you create now can help prevent losses from the key dangers you’ve identified.


5. Implement and follow up

While an initial assessment can make you more aware of potential risks, preventing losses requires action — and reevaluation. Did the solutions you created prevent injuries or business disruptions? Did they have any negative consequences, like new inefficiencies? With these strategies in place, are different risks now a higher priority?


Planning to reduce business risks should always be rooted in a why. Following this approach can help your business evaluate and avoid dangers as they arise. Commit adequate resources to prevent them and stay proactive rather than reactive as your operations evolve. 


While COVID-19 and its related economic challenges continue, it’s time to regain focus on setting your business up for future success rather than playing catch-up. 


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: risk assessment risk management security metrics security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Zblewski is a director of safety services with Sentry Insurance. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • globe COVID-19

    Reimagining risk assessments in global crises

    See More
  • software supply chain

    A focus on risk in software supply chain security

    See More
  • risk-assessments-freepik1170x658v57026.jpg

    Dreading security risk assessments? 6 ways to make them better

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing