Prudential Associates has served corporations, law firms, and government agencies worldwide for over 30 years. We specialize in providing vulnerability assessments and risk management procedures that assist in the protection of people, assets, information, value, and reputation. Our professional consultants bring sophisticated skills, diverse expertise, and broad resources to each assignment as they conduct a thorough security audit to help define effective strategies and develop cost-effective solutions.
The Basic Security Assessment is an effective way to evaluate your needs and to plan security and safety programs that mitigate risks. Security threats addressed include crimes against property, crime against people, equipment or systems failures, terrorism, natural disaster, and fire & bomb threats.
The following steps describe Prudentials approach to conducting the Basic Security Risk Assessment:
- Understand the organization and identify the people and assets at risk
- Specify loss risk events and vulnerabilities
- Establish the probability of loss risk and frequency of events
- Determine the impact of the events
- Develop options to mitigate risks
- Study the feasibility of implementation of options
- Perform a cost/benefit analysis
The Risk Assessment Report will provide what management needs to know about security:
- What vulnerabilities and weakness are present today?
- What is the current threat level?
- How can we measure effectiveness of existing security controls?
- How much should we spend on additional security features?
- Are we compliant with current regulations?
Prudential Associates will help you answer the following:
- Is your security program as effective and efficient as it can and should be?
- Are your people and assets reasonably protected against attack, theft, and other compromises?
- Do you really know what your security-related risks, vulnerabilities, threats, and liabilities are, and how to prevent or mitigate them?
- Do you have a program and process for practical and effective prevention of and response to Workplace Violence?
- Are you reasonably protected against todays escalating security-related liabilities?
- Do the security services that you now use provide consistently quality service at the best price?
- How vulnerable is your computer network?
- How much security is enough security?