Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

Risk assessments in focus amid security challenges

In the face of evolving risks, it’s time to reassess your security operation’s everyday hazards.

By Mike Zblewski
security-risk_assessment-fp1170x658v4pf.jpg

Image by eamesbot via Freepik

September 2, 2022

In 2020, everything changed. Protecting workers’ health and safety from the risks of COVID-19 fundamentally changed what most had come to know as business as usual. The effects of this sudden disruption continue to ripple through many businesses’ day-to-day operations. 


Now, businesses must also contend with supply chain challenges, worker shortages, and inflation concerns. These immediate concerns often require the most attention, distracting leadership from the everyday incidents and compliance issues in their facilities. Common safety risks — from security gaps to employee injuries — haven’t gone away, and may be even more detrimental to your operations if time and resources are already stretched thin. 


If it’s been a while since you conducted a thorough risk assessment, now is the time to get back on top of your safety planning. After all, to be proactive is to be prepared, and safety is foundational to business success. Review the following points to help mitigate potential losses and protect your security team — and your business — from major safety risks.


Why now is a good time to reassess your risks

Supply chain concerns and staffing shortages have created new pressures for businesses to contend with. But think back to life before the pandemic: even under the best-operating conditions, everyone shares responsibility in taking the time to create a safe work environment for each other. 


If anyone questions the need to reevaluate business risks or doesn’t believe they can spend the time or resources conducting assessments, remind them the best practice is to conduct a risk assessment when:


·        You make workflow changes

·        You add a new process

·        You add, replace, or update equipment

·        You hire new staff or change job duties


Change is constant. Given today’s challenges, your business has likely made one or more changes since your last risk assessment. If that’s the case, a thorough review is probably overdue.


Employees reflect your commitment

Unfortunately, we’ve seen declines in employee training quality and quantity over the past few years. No matter your industry, occupational hazards exist in your workplace, and recent hires — or employees who have taken on new responsibilities — simply don’t know what they don’t know. Insufficient employee training can put your business at greater risk of employee injury and significant health hazards, workers’ compensation claims, equipment and facility damage, and security threats.


Investing the time and resources to adequately train your team may be challenging, but targeting those resources to minimize your risks is worth the initial investment. Conducting a thorough risk assessment helps you identify the most pertinent business risks and provides evidence you can use to teach your team members the unique roles they play in protecting themselves and others from danger.


Risk assessment process

While no two businesses operate exactly the same, the goal of any risk assessment is ultimately the same — to protect employees and comply with applicable laws. And while there are no strict rules on assessing your risks and ensuring compliance with safety regulations, we recommend the following process as a starting point.


1.  Identify the security risks

The first step is to broadly consider all the risks of your business — especially those that may be new. Find an insurance partner or safety consultant who can help you create a pinpoint assessment of your facility and business, including:

-      Physical hazards

-      Chemicals

-      Onsite equipment

-      Areas vulnerable to inclement weather

-      Cybersecurity risks

 

2. Define risk metrics

To create and prioritize risk mitigation strategies, hold all risks to the same standard in terms of likelihood and severity, regarding the danger they pose to your operation’s safety and security.


3. Evaluate your results

After considering all your risks and defining standards for their potential impact, identify which ones pose the biggest and most imminent threat to your business. Use that evaluation to plan how to allocate time and resources to your biggest threats.


4. Create security solutions

Take the time to consider what new safeguards can or should be implemented to help reduce the risk of loss. Whether it’s new processes, dedicated safety training, or additional physical protection, the plans you create now can help prevent losses from the key dangers you’ve identified.


5. Implement and follow up

While an initial assessment can make you more aware of potential risks, preventing losses requires action — and reevaluation. Did the solutions you created prevent injuries or business disruptions? Did they have any negative consequences, like new inefficiencies? With these strategies in place, are different risks now a higher priority?


Planning to reduce business risks should always be rooted in a why. Following this approach can help your business evaluate and avoid dangers as they arise. Commit adequate resources to prevent them and stay proactive rather than reactive as your operations evolve. 


While COVID-19 and its related economic challenges continue, it’s time to regain focus on setting your business up for future success rather than playing catch-up. 


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: risk assessment risk management security metrics security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Zblewski is a director of safety services with Sentry Insurance. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • globe COVID-19

    Reimagining risk assessments in global crises

    See More
  • software supply chain

    A focus on risk in software supply chain security

    See More
  • risk-assessments-freepik1170x658v57026.jpg

    Dreading security risk assessments? 6 ways to make them better

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing