Security Audit



BUSINESS SECURITY AUDIT

linelong

A security audit is the process of determining your company’s exposure to threat and risk.  A small investment in a security audit may save you and your company years of unnecessary financial loss.

A continuum of audits is available at DK depending upon individual needs, size of company and location.  The security professionals at DK are knowledgeable, professional and friendly.  We work diligently to make certain your security audit is cost effective and highly beneficial to your company’s well-being.

 
 

The security audit includes a review of business practices, facility access, personnel management issues as they relate to hiring, retention, discipline, misconduct and termination. 

  • Infrastructure design

  • Access control systems and policies

  • Hiring and screening policy practices

  • Workplace policies and strategies

  • Security of key personnel and executives

  • Cyber security policies

  • Security awareness training

  • Business continuity plan

DK Security has conducted security audits for Fortune 500 companies, dozens of Michigan based companies, school systems, colleges, and government agencies. We believe that the current unrest, violence, and protests in public and collegiate venues will over time flow into the business community and cause business disruption. A business continuity plan has always been an important factor of any business security plan and maybe more so now than ever. 



THREAT ANALYSIS

linelong

85% OF ALL CRIMES COMMITTED AGAINST AMERICAN BUSINESSES ARE COMMITTED BY THEIR OWN EMPLOYEES.

How well do you pre-screen potential employees before you hire them? Many companies DO NOT do an adequate pre-employment check before hiring and that means their greatest threat is already in their buildings and on their staff. DK Security feels that there is no sense in maintaining an access control system, building a fence, installing an alarm system and then hiring and issuing clearance to the very people  you want to keep out. This is where we begin our security audits and invariable it becomes part of any specific threat analysis.