Time
2 hours 33 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hello, everyone. And welcome back to cyber is and use of physical security Course. This is less than 3.2 receiving visitors, employees and contractors.
00:14
We have to learning objectives for this lesson. The first is we're gonna talk about discussing how we process visitors into our building,
00:24
and then we're gonna talk about how do we allow employees, contractors and visitors
00:32
access
00:36
Processing visitors is a critical piece
00:40
in physical security.
00:42
We want to welcome them in. But we also want to make sure that the people who were welcoming in have business there.
00:49
It's about security
00:51
checking their identity,
00:54
authenticating their purpose for being in the building,
00:57
and also to make sure that the person coming into the building is not bringing in something that could potentially harm the business or the employees.
01:07
They do this first of all through active conversation, finding out why the person is they're contacting the person they're supposed to see to ensure that the person really does have business there that day,
01:19
as well as the chance to take their I d.
01:22
Give them,
01:23
give them a visitor's badge
01:26
and also give them that time to call an escort to come down from
01:32
WHO? John Smith's office,
01:34
to greet the guest and to bring them up to John Smith's office.
01:46
Now we talked about processing and visitors. It's also important that we process in special contractors. Well, what do I mean by that? Well,
01:53
like the picture illustrates, there are certain
01:57
contractors that a business will hire
02:00
most commonly thought of is the cleaning crew
02:05
to continue to do to serve some function for the business?
02:12
That being said, they shouldn't have 24 7 access to the building. They should only have access for the purpose of doing their job.
02:23
So it's important, just like with our visitors. And just even like with our employees or contractors, when they first come in to do their regular
02:30
9 to 5 job
02:32
that we screen them.
02:34
We also want to scan them, make sure they're not bringing in something that they're not supposed to.
02:38
We can give them the opportunity, secure personal items like cell phones or or maybe even a backpack so that they're not bringing again. So they're not bringing something into the building that they don't need to have in there.
02:51
We would also consider issuing them special badges this identifies them as the cleaning crew. It also shows that they've been vetted, that they have a purpose for being there.
03:01
But we might also consider giving them an escort. Now
03:07
you might wonder why. Well, think about it.
03:12
If a if a cleaning crews coming in, let's say around 45 o'clock at night to start the cleaning duties.
03:19
Where is everybody else? We're going home for the day.
03:22
Most people are not all.
03:23
If you're a hard worker, you probably will stay till maybe 56 oclock.
03:29
But the reality is, is that most people have departed the building.
03:34
This means that thes
03:36
contractors without
03:38
proper escort would have free reign through the building.
03:42
They could open filing cabinets. Maybe they could. They could take pictures of, um,
03:49
trade secrets or plans or or any kind of information that might be valuable. Even P I. I personally identifiable information. Whatever it ISS,
03:58
they have free rein in the building,
04:00
so it's important
04:03
for the company to consider to use escorts with them.
04:08
I have worked in buildings where on engineer was there to work on the electrical system.
04:13
Well, wherever he went, he had an escort shadowing in the whole way to make sure he didn't go anywhere. That he didn't need to go
04:25
just is important that we scan and take care of people as they enter the building. It's also important that we process them out of the building as well.
04:33
Remember I said that with visitors
04:38
they may come in. We take their I d. Give them a visitor badge. Well,
04:42
they need to get their I D back.
04:45
We can also use this as an opportunity to search their bags, their their personal belongings that they brought in to make sure they haven't brought something out that they weren't supposed to take out of the building.
04:54
It also ensures that we have a clear record of who is in the building and who is not in the building, so that if something were to happen later that night,
05:03
let's say
05:04
God forbid of fire.
05:06
Well,
05:09
we know that the person is not in the building so we can account for them, and we don't have to worry that someone's been left behind
05:19
in this lesson. We discussed two main areas. First we talked about processing of visitors
05:26
and then we discussed act lowing employees, contractors and visitors access to the interior of the building.
05:33
I want to thank you for taking the time to join me for this lesson. I look forward to seeing you in the next one.

Up Next

End User Physical Security

This course will introduce you to physical security and why it is important. We’ll do some time travel and go back in time to discuss ancient physical security methods.

Instructed By

Instructor Profile Image
Corey Holzer
Information Systems Engineer
Instructor