Sunstates Blog

A Proactive Security Partner

Archive for the ‘Security Tips’ Category

Smart Cameras, Smarter People

without comments

Smart Cameras, Smarter People

New technology, especially security cameras with analytics features, are adding new capabilities and providing more reactive and proactive options. Today’s systems have capabilities previously seen only in the movies: pattern-based analytics, self-learning and AI (artificial intelligence) that can find security threats and suspicious patterns incredibly quickly and accurately. The new technology won’t replace security officers, but it will enable them to provide even greater security.

 

 

Spotting Potential Security Issues

Scenario 1: Looking Back for Clues

For example, you know a white van with green stripes was involved in an incident, or is suspected in an incident, on a corporate campus with 200 security cameras. Analytics software and a skilled security officer can find every instance that van was recorded by a security camera over the past few hours, days or weeks, typically in less than an hour. The security officer can build a timeline of the vehicle’s movements on the campus, as well as identify when anyone entered or left the vehicle.

Scenario 2: Looking Forward Proactively

Today’s cameras and software can also reverse-engineer that scenario. The security officer can use the software and camera system to be on the lookout for a white van with green stripes, and send an alert as soon as a vehicle matching that description is spotted.

If, say, a recently terminated employee is deemed a potential threat, and the security officer knows what type of vehicle that person is driving, the system can alert security as soon as that person drives onto the corporate campus.

Building and Managing a Complete System

Most importantly, software can now bridge different systems and different cameras from multiple manufacturers to build a complete, seamless system. Even older cameras can have the same capabilities as the latest generation, albeit possibly with lower resolution. Even if the images aren’t as sharp and clear, those cameras can still be an integral part of an early warning system, saving the costs of replacing equipment.

Cameras and Access Control

With facial recognition technology, the future won’t rely on keys, badges or card swipes, but on cameras and software that “recognize” employees and flag intruders and anyone not known by the system. This technology will be both more secure—an intruder could steal an employee’s badge or key card, but not an employee’s face—and more cost-effective.

The Human Element

Security cameras, software and other technology won’t replace security personnel. Instead, security officers will be more highly skilled in using that technology to provide higher levels of both reactive and proactive security.

For information on how Sunstates Security can combine technology with skilled personnel for a higher level of security, please call 866-710-2019 or email us.

Written by Sunstates Security

September 10th, 2019 at 6:31 pm

Security by Design: Best Practices in Secure Environments

without comments

Security by Design: Best Practices in Secure Environments

Most commercial buildings begin with an architect and a designer. Outside, a landscaper or landscape architect will usually be tapped to provide the esthetic surroundings.

Open floorplans. Glass walls. Lots of windows. Outside, beautiful plantings.

These features may be pleasing to the eye. But they also can significantly compromise safety. Security would be greatly enhanced by including a security expert on the initial design team.

 

The Four Aspects of Designing for Safety

There are four key elements to corporate security:

  • Access control, especially in shared spaces
  • Landscape design that emphasizes security
  • Interior design that mitigates potential threats
  • Security-minded policies and procedures

Element 1: Access Control

Access control can be challenging when a building or campus is shared by different organizations. But there are several best practices that can mitigate the potential for security issues:

  • Individual access control for each office or tenant
  • A centralized communication system, such as a PA, to warn all occupants of potential or actual threats
  • Building-wide access control, so only those who belong in the building can enter
  • Security systems or personnel that can flag unusual activity

Consider, for example, the auto mechanic who was terminated at a West Coast auto dealership after weeks of poor performance, threats to co-workers, and other red flags. He went to his vehicle, retrieved a gun and returned, killing two former colleagues before committing suicide. Incidents such as this highlight what many businesses are now following as a best practice:

  • Have employees park in a secure area with controlled access
  • Restrict employees from visiting their vehicles during the workday or monitor employees who do so

Element 2: Exterior Design

Parking areas, pathways and landscaping should be designed with two goals in mind: perimeter security and elimination of hiding places.

Perimeter security means establishing layers of security, typically with multiple checkpoints and many opportunities to spot potential security issues. Ideally, this strategy positions the initial access control so that a would-be intruder would be stopped before being able to enter or penetrate a facility or campus.

For landscaping, the key is to eliminate not only hiding places for intruders attempting to enter the building, but also places where someone could attack or otherwise harm employees and visitors heading towards or away from the building.

Element 3: Interior Design

The same glass walls and bullpen-type seating areas that give a space a light and airy ambience have a serious drawback. In the event of an active shooter or other incident, employees have nowhere to hide. Walls, offices and secure doors make it possible to hide from an intruder.

Employees have three options when confronted by an active shooter: run, hide or fight. Interiors should be designed to maximize all three of those options. In addition, entrances should have a holding area that can be secured to prevent an intruder from entering the inner offices.

Element 4: Policies and Procedures

None of these steps, of course, will effectively mitigate potential security threats without employee training in the proper policies and procedures to spot and react to security issues.

For organizations without an internal security chief, a security consultant that offers employee training can be an invaluable resource. Security training should be part of every new employee’s orientation, and refresher training should be mandatory and regularly scheduled.

For information on how Sunstates Security can use technology and personnel to provide greater security, or for an evaluation of your existing security systems and strategies, please call 866-710-2019 or email us.

 

Written by Sunstates Security

September 4th, 2019 at 3:22 pm

Commercial Property Class A Safety

without comments

Think of the swanky downtown offices or high-rise apartments in your surrounding area. Chances are they’re what is known as a Class A property. Class A properties are generally newer
properties, well-located in the market and typically professionally managed. You may admire their size and architecture, but do you ever stop to think about the security that happens behind the scenes? It takes a special kind of security professional to perform the job well. They must interact well with tenants, cover a large area, and perform various duties. It’s important to be aware of common safety concerns and to pick the right security provider. After all, security professionals are a reflection of both their employer and the client.

Sunstates Security understands how important it is to acknowledge your organization’s culture and identify what is important in servicing your multiple levels of clientele: whether it’s your employees, visitors, or surrounding community. Security professionals working in these properties need to be able to balance a dual role. One component of their role is to serve as a public ambassador and provide the best experience for all tenants, contractors, and visitors. Security professionals must fulfill this side of the job while simultaneously ensuring that all property safety protocols are enforced.

Security professionals must cater to the public ambassador portion of the role in a multitude of ways. They are often responsible for greeting tenants (employees of the building, residents, etc.). They provide directions to guests, answer phone calls at reception, and more. Often, the mere physical presence of an officer while they perform their public ambassador duties can deter security threats.

The other component of a security professionals’ job in a Class A property is to monitor for physical security issues like “piggybacking” or “tailgating”, and maintenance issues. Piggybacking is when an individual enters the building directly behind someone who is authorized to be there, while they themselves are not. This could happen when someone swipes their access key to enter the building and another person follows through directly after without having their own key. Security professionals often are tasked with performing patrols around the building and on each floor to monitor for maintenance issues like water leaks and lighting outages. At Sunstates, our officers utilize electronic reporting tools that allow them to report issues like these as soon as they encounter them.

Given the duality of the role, it’s important you have security professionals who are recruited and trained to the highest standard. Sunstates has extensive experience hiring security professionals who can perform all aspects of this unique role. Contact us to learn more about our security services in Class A properties.

Written by Sunstates Security

August 20th, 2019 at 4:46 pm

Active Shooter Safety

without comments

On April 30, 2019 two students at UNC Charlotte were fatally shot and four were injured when a 22-year-old opened fire on campus. Only a week later on May 7, 2019, a shooting occurred at a Colorado school resulting in one death and eight injuries. These tragedies are the most recent examples of the escalating trend of active shooter scenarios taking place across the country. Sunstates Security offers our heartfelt thoughts and sympathies to all those affected by the past week’s events, as well as the victims of all gun-related violence. We take active shooter preparedness very seriously and encourage everyone to have an emergency plan in place. Terry Hairston, CEO of Defend and Protect, Inc. recently presented a training session to Sunstates management staff enforcing the message that “You never know what you prevent, you only know what you don’t”. Let this be a reminder to have plans in place and know the best ways to respond if the situation arises. For the purpose of this blog, we’ll focus on three things: prevention, preparation, and best courses of action.

Prevention of Workplace Violence

Active shooter scenarios can occur anywhere, but often occur in the workplace. Key ways to help prevent workplace violence include fostering a respectful work environment and knowing the warning signs of someone who might be considering violence. Common signs include:

  • Increased use of alcohol and/or illegal drugs
  • Unexplained increase in absenteeism
  • Resistance and overreaction to changes in policies and procedures
  • Noticeably unstable, emotional responses
  • Comments about “putting things in order” or “getting even”
  • Increase in interest and comments about firearms, other weapons and violent crimes

The most important step in prevention is sharing information with management and/or law enforcement if you suspect anything suspicious about co-workers or unfamiliar visitors in your workplace.

Preparation

It is vital to have an emergency action plan in place and to practice the plan. People often think that an active shooter scenario will never happen to them. Unfortunately, violence doesn’t make exceptions for any person or setting, so it is critical to always maintain a high level of situational awareness. Create your action plan and focus on these components:

  • Preferred method for reporting fires and other emergencies                                                                                                        Image 1 for Active Shooter Safety Post
  • Evacuation policy and procedure
  • Escape procedure and route assignments (floor plans and safe areas) NOTE: Always identify two exits in any facility or venue as soon as you enter
  • Local area hospital information
  • Emergency notification system that alerts employees, law enforcement, and hospitals

Action

An active shooter is an individual actively engaged in killing or attempting to kill in a confined and populated area. In most cases, they are using firearm(s) and they have no pattern or method to the selection of their victims. If you are subject to an active shooter scenario, it is imperative that you assess the situation and decide whether to run, hide, or fight.

  • This is the most desirable option and is where your escape route and plan come in to play. Leave your belongings, keep hands visible to law enforcement, and follow instructions of police officers if any are present. Call 9-1-1 when safe.
  • If you cannot escape the environment, immediately get out of the shooter’s view. Close and lock doors, turn out lights, and put barriers between yourself and the shooter (desk, barricade, etc.). Silence your phone and remain quiet. If you can safely call 9-1-1, provide them with the location of the shooter, the number of shooters and a physical description, the number and type of weapons, and number of potential victims. Do not open the door or come out of hiding until law enforcement identify themselves and instruct you to do so.
  • Do this as a last resort if your life is in imminent danger. Act as aggressively as possible by throwing items, yelling, and improvising weapons. Most importantly, commit to your actions and be prepared to fight for your life.

Image 2 for Active Shooter Safety Post
Sunstates Security encourages everyone to take action against becoming a victim. Prevent, prepare, and act. Again, our thoughts and sympathies go out to all affected by gun violence. For more information on active shooter training and Sunstates Security, please visit SunstatesSecurity.com.

Written by Sunstates Security

May 23rd, 2019 at 7:16 pm

Ready, Aim, Fire (Risk Mitigation During Terminations)

without comments

Called into a termination meeting, an Illinois man pulled out a handgun, fatally shot five co-workers and wounded five police officers. In Orlando, a fired employee returned later and fatally shot five employees before killing himself. A Los Angeles man, fired from his job at an auto parts store, shot and killed six co-workers before dying in a gun battle with police.

Terminations are almost always emotional. The key is to keep them from turning deadly.

Risk mitigation prepares for the “what-ifs.” What if the employee argues and threatens? What if the employee turns violent? What if the employee has a weapon?

Most human resources professionals are caring individuals. They’re not thinking about safety and security, but about treating the terminated employee humanely while following company policies and government regulations. But safety and security should always be a prime consideration when terminating an employee.

Best Practices During Termination

  • Place an experienced manager in charge of the termination, and brief everyone involved beforehand about the process.
  • Always have a witness to the event. In an ideal situation, assign two people—at least one of the same gender as the employee—to help defuse any potential issues. The best-case scenario also includes video surveillance in real time.
  • Position HR personnel so they always have an accessible escape route; they should never have their backs to the wall or otherwise be in a position where they can be cornered or blocked from leaving.
  • Post security personnel nearby, and provide HR employees with a way to quickly call for help, such as a code word or another discreet communication method.
  • Escort terminated employees off the premises immediately, preferably not back to their desks or work stations. Instead, HR personnel should box the employee’s personal belongings.
  • Use a third-party carrier to return equipment, so the terminated employee has no legitimate need to come back to the workplace.

HR personnel should be briefed on how to calm upset individuals. One common, and effective, technique positions the termination package as a carrot by making it contingent on employee compliance with the company process.

Employees should also be trained to look for red flags, even before considering termination. If any exist, security personnel should be placed on alert for an extended period. Terminated employees have returned to their former workplaces with a weapon weeks, months or even years later. Security personnel should receive as much intelligence regarding the terminated employee as possible, including a recent photograph, what vehicle(s) he/she drives, and what to do if the individual is seen in the area.

Terminating employees is a fact of life. Mitigating the risks when that becomes necessary protects everyone.

For information on how Sunstates Security can support your human resources department and other employees before, during and after terminations, please call 866-710-2019 or email us.

Written by Sunstates Security

May 14th, 2019 at 3:43 pm

Safety in Faith-Based Organizations

without comments

On March 16, 2019 dozens were killed in a New Zealand mosque terror attack. This served as an important reminder that whether it’s a church or religious educational institution, there is always a possibility of safety threats. Faith-based organizations pride themselves on being open and inclusive, so how do they draw a line when it comes to safety? Having proper security in place helps make that line a little less blurry and can deter and prevent threats.

Common Threats:

• Vandalism
• Burglary/Break-Ins
• Violence
• Armed Intruders

Churches and religious institutions should be able to focus on their mission: providing safe places for people to gather, worship, and learn. Sunstates Security helps our clients do just that by providing security professionals that are trained to identify potential hazards before they become incidents.

How We Can Help:
                                                                     
• Emergency Action Plans
• Vulnerability Assessments
• Education and Awareness Training
• Efficient Communication
• Patrol Services
• Concierge Services – a friendly face to provide information and assistance

Often, the mere physical presence of security personnel can deter threats. When that’s not enough, our security professionals will work with you to establish and implement practice response plans.

Unfortunately, security is not always a priority until something significant happens. Be proactive instead of reactive. Don’t let yourself be an easy target – utilize security and know the limits to your open-door policy.

For information on how Sunstates Security can support your security program, please call 866-710-2019 or email us at SunstatesInfo@SunstatesSecurity.com.

Written by Sunstates Security

April 24th, 2019 at 2:43 pm

How Technology Adds Value to Security Services

without comments

The foundation of good security is good people, and that’s always been the focus at Sunstates Security. At the same time, we’re always looking for opportunities to help our people provide even more value. That’s why we partner with proven experts as needed and we employ the best technology to enhance and extend what our security officers are doing. This policy allows us to apply best practices from a wide range of industries to enhance client security programs.

“We apply the concept of ‘dog fooding,’ where you should never promote or sell something that you’ve never tasted yourself,” says Sunstates President Glenn Burrell, CPP. “We identify a strategic partner and use their product or service to better understand its capabilities and limitations so we’re able to advise our clients on whether it’s an appropriate answer to their problem.”

New Solutions for Common Problems
Some of the technology we use is behind the scenes: our clients won’t necessarily know we’re using it. Some is more client facing. We constantly review the available technological solutions and work with trusted partners to employ the best solutions on clients’ behalf.

• Proximity Readers and License Plate Recognition Software. Many facilities, such as corporate/school campuses and residential communities, have a high volume of both regular traffic (e.g., residents, students, employees, etc.) and visitors (e.g., guests, vendors, etc.) driving in. We know what systems can most efficiently read a tag or other device from the front of a vehicle as it approaches a gate, allowing quicker entry. Pairing such technology with license plate recognition software can confirm identity.
• Key Tethers. A key tether connects a key (or set of keys) with another device and provides an instant alert when, say, keys are detached from a belt. We often also attach a GPS tile to find separated keys. Clients frequently entrust us with the keys to their facilities, and we have a critical responsibility to take care of their keys, regardless of cost. Key control is critical to our clients’ safety and well-being.
• KnoxBoxes. Many property management clients have maglocks on their doors because they’re convenient: access cards can be easily programmed to control access for individual employees. But those doors will lock down in a power outage. While they can be opened from the inside, authorized personnel cannot enter the facility, even with an access card. We’ve found a solution by using KnoxBoxes, which uses a master key—available for security or management—to open those doors manually.
• Mass Notification Systems. We partnered with Punch Technologies to offer clients the Punch Alert emergency communication platform. The system allows individuals to report emergencies and safety hazards through a smartphone app. In addition, the platform permits two-way communication during an incident, so users can submit information and responders can issue mass updates.

We evaluate new technology constantly to find solutions that provide a higher level of security and convenience to our clients. Technology will never replace the eyes and ears of trained security officers, but it can help them do their jobs better every day.

Do you have a challenging security issue that’s keeping you awake at night? Contact Sunstates Security at 866-710-2019 or email us. We’ll help you find a solution.

Written by Sunstates Security

August 14th, 2018 at 3:54 pm

Gated Communities: Combining Security + Public Relations

without comments

Security in gated communities presents challenges that vary widely from other facilities. These residential settings also require specialized skill sets and personnel that, again, are quite different.

For example, at a school or corporate campus, it’s quite obvious if someone attempting to enter has a purpose or belongs there. At many gated communities, the sheer volume and variety of   people seeking entry requires an equal blend of rigor and diplomacy.

Community Challenges
With residential communities, security personnel serve as both protectors and as public ambassadors. The open setting creates access-control challenges as officers decide whether or not to grant entry. As a result, officers must follow policies and procedures firmly and courteously, even though diligence might anger residents whose visitors have been delayed.

“Most people would say, that’s good. It shows they’re doing their job,” says Sunstates President Glenn Burrell, CPP. “It’s fine when it’s someone else’s guest, but when it’s your guest, it can be a problem.”

Depending on the size of the community, high volume at peak hours can affect the surrounding neighborhood. For example, many homeowners’ associations (HOAs) do not allow contractors to start work before eight o’clock in the morning. Larger communities may have 100 contractors waiting for entry, which affects public roads. Consequently, security officers need to be aware of what’s happening beyond their immediate vicinity.

In addition, security must enforce HOA rules and regulations, as well as standard procedures for safety and security. Diplomacy is an essential skill in such settings.

Community Best Practices
Based on extensive experience serving this specialized market, Sunstates Security has identified several key practices for meeting the unique needs of gated communities:

• Comprehensive procedures. Security personnel should have procedures, developed jointly with community representatives, for handling every conceivable situation, from background checks to emergency incidents. Such planning can help minimize common issues, such as visitor backlogs. In many communities, for instance, all guests and contractors must have prior approval, which includes background screening for vendors.
• Selection and training. The delicate nature of residential security demands personnel with exceptional public-relations skills. A discriminating selection process identifies individuals with the right temperament and attitude. Then, specialized training expands on core security skills to include gatehouse operations, community patrols, homeowner relations and diplomacy. First-aid and AED training prepares security personnel to respond to medical emergencies.
• On-site management. Having a dedicated manager at the community full-time helps align the security team with homeowners, property managers and other stakeholders. Such individuals have extensive experience securing residential communities, and they have the power to make informed decisions quickly and efficiently.
• Technology. Modern technology offers powerful tools for supporting the security function, while minimizing inconvenience. For instance, systems can scan and capture information from drivers’ licenses and compare that information to sex crime/pedophile registries. Other technology vets and processes visitors and issues temporary badges. New vehicle identification technology uses microwave RFID and semi-active transponders to identify residents and other approved vehicles. A more affordable option, tag or card systems on vehicles can speed entry for residents, while flagging non-residents.
• Two-tier authentication. While technology is indispensable for modern communities, those with automated vehicle-access systems need to heed the cautionary tale of the Trojan horse. Currently, most systems only identify the vehicle, not the occupant(s). The latest technology provides two tiers of authorization: the vehicle tag only works if an additional reader assigned to the owner is also in the car.
• Law enforcement liaison. The community security force is an ally of local law enforcement, and vice versa. Both groups should serve as the eyes and ears of the community and communicate regularly about incidents and potential threats. In addition, security teams need to monitor local crime trends and prepare for possible challenges.
• Resident resource. Hosting special events where board members and residents can meet security staff and managers has two benefits: it fosters trust and creates better relationships, and it allows security personnel to hear about and discuss issues and concerns firsthand.

To discuss how Sunstates Security can meet the needs of your community, please call 866-710-2019 or email us.

Written by Sunstates Security

August 14th, 2018 at 3:53 pm

Managing Modern Threats with Protective Intelligence

without comments

Managing Modern Threats with Protective Intelligence

Social media makes it easier than ever for like-minded individuals not only to find one another, but also to organize demonstrations for their cause. Consequently, more companies are calling on security partners for assistance in identifying and preparing for pop-up protests and other potential disruptions.
Technology can provide advance warning of such threats, but skilled human intervention continues to play a critical role in analyzing data and developing a sound strategy for risk management.

Sources of Intelligence
Advances in technology make security operations centers (SOCs) more affordable than ever, often providing in-house intelligence as needed. At the same time, organizations have other excellent information sources at their disposal for a fraction of the cost.

• Local partnerships. The same technology used to organize protests and other demonstrations also keeps the public informed of local developments. Many law enforcement agencies have email alert systems to notify residents of unusual conditions, such as extreme weather, vehicle accidents, and police activity. Most large cities have downtown alliances for businesses and other organizations that operate in these districts; information-sharing among members is an important benefit. In addition to these publicly available resources, private security teams should cultivate strong working relationships with local authorities, which encourage a two-way flow of information.
• Social media monitoring. Instead of relying on public alerts, more organizations are monitoring and analyzing social media activity, often through a partner with the tools and skills required to mine the raw data. Such monitoring efforts frequently fo-cus on a specific geographic area for a discrete period of time. For example, social media monitoring can provide real-time intelligence to support traveling executives and company events or to prepare for public reaction to current affairs, such as the student protests following the Parkland shooting.

Planning and prevention
Securing advance warning is only the first step. Managing potential threats requires more finesse than increasing the security staff in response to possible demonstrations.

• Staff management. While additional personnel may be required, a large, visible security presence may have the unintended effect of antagonizing protesters. Organizations should develop a strategy for making additional support available and ready to respond, without fueling already-high tensions.
• Building security. In some cases, it might make sense for an organization to go into lockdown mode and to prevent public access during a planned event. Even during a peaceful gathering, companies should have a plan for managing practical concerns, such as access control for employees and visitors and public runs on the restroom facilities.
• Training. Long before any potential threat materializes, security team members should complete training on non-violent crisis intervention. This specialized training teaches individuals how to defuse challenging situations before they escalate into crises.

To learn how Sunstates Security can assist your organization, please call 866-710-2019 or email us .

Written by Sunstates Security

May 1st, 2018 at 8:53 pm

4 New Year’s Resolutions for Security Directors

without comments

4 New Year’s Resolutions for Security Directors

As we start the New Year, most of us have personal and professional goals to which we aspire. For security professionals, we recommend the following resolutions to help make 2018 a successful, uneventful one for your organization.

  1. Update and test the business continuity plan (BCP). Beyond the dangers of a national emergency, every organization needs a current, robust plan to recover from a crisis. In recent years, companies across the country have experienced disruption from weather emergencies. Advances in cloud computing and increasingly remote workforces are two developments that can have a dramatic impact on a BCP. The breakneck pace at which technology continues to transform business practices makes annual review and testing of BCPs more important than ever. Today, the plan should include procedures that apprise organizations of employees’ whereabouts—particularly when key personnel are traveling. Putting a plan on paper is not enough; companies need to conduct a tabletop exercise and drill at least annually.
  2. Establish (or enhance) an active shooter policy. Every company should have at least a basic policy that is communicated to employees. The U.S. Department of Homeland Safety publishes a guide that organizations can use as a starting point. In reviewing the active shooter policy, security directors need to keep in mind that the threat has increased. More shooters are forgoing handguns in favor of assault weapons. By the time police arrive, the assault is typically over. Contingency plans should include safe rooms where employees can retreat. In addition, organizations need clear guidelines regarding who closes and locks the door and when. Similar to BCPs, active shooter plans should also be tested annually with a combination of tabletop and live drills.
  3. Ensure vendor compliance with internal screening standards. Many organizations have strict background screening standards for their employees but don’t extend those requirements to vendors that provide contract or temporary personnel. As some companies have learned through repeated incidents and infractions, external partners may perform minimum screening to fulfill a vague contractual obligation. Outline the basic requirements for vendor background screenings in the security policy. At a minimum, service agreements should include this specific language. Preferably, the host organization should identify a trusted third party to ensure consistent screening standards for all on-site personnel.
  4. Perform penetration testing at key locations. While security protocols may appear iron-clad on paper, most are surprisingly easy to overcome. Resolve this year to put access control to the test: inspect perimeter fencing, check for blind spots in CCTV monitoring. Internal personnel can conduct preliminary testing, but organizations should consider contracting a qualified third party for unbiased reporting. Testing should focus on vulnerable entry points, testing the physical, human and technological aspects of the security program.

For information on how Sunstates Security can help your organization implement these resolutions, call 866-710-2019 or email us.

Written by Sunstates Security

January 26th, 2018 at 7:40 pm