FAQ's

Questions About Security Consulting?

FAQS

Questions About Security Consulting?

What is included in a physical security assessment?

Our Security Assessment Process typically includes a comprehensive site inspection, a review of existing security policies, and an evaluation of technologies like cameras and access control. We conclude by identifying vulnerabilities and providing a prioritized list of recommended mitigation strategies tailored specifically for your organizations needs.

What industry standards do you follow?

We align our recommendations with globally recognized frameworks such as ASIS International Standards The Top 10 Questions to Ask When Hiring a Private Security Partner - The Watch Blog for security risk assessments.

What is your overall physical security philosophy?

We utilize a defense-in-depth approach, employing multiple, overlapping layers of security to deter, detect, delay, deny, and defend against unauthorized access to sensitive information, protection of assets and personnel.

What is TSCM?

TSCM stands for Technical Surveillance Countermeasures. It is a professional service used to detect, isolate, and neutralize unauthorized surveillance devices like hidden cameras, microphones, or GPS trackers.

How is it different from physical security?

While traditional physical security focuses on locks, cameras, and guards to prevent unauthorized entry, TSCM identifies electronic eavesdropping threats that can bypass physical perimeters, such as Wi-Fi exploits or miniature listening devices.

What are common "warning signs" that I need a sweep?

Indicators include hearing unusual sounds on phone lines, noticing interference on electronic devices, seeing unfamiliar vehicles nearby, or having confidential information leaked to competitors.

What environments do you sweep?

Inspections typically cover executive offices, boardrooms, private residences, vehicles (cars/aircraft), and off-site meeting facilities.

How often do you recommend TSCM sweeps be conducted?

The answer depends on various factors such as business sector, level of risk, geographic location and past incidents. With all of this in mind, we generally recommend the following schedule:

High-Risk Areas: Businesses operating in high-risk industries or dealing with sensitive information should conduct sweeps quarterly.

Moderate Risk Areas: In moderate risk environments it is recommended to perform a TSCM sweep at least annually as a protective measure.

Event-Triggered: Beyond routine sweeps, businesses should be prepared to conduct additional TSCM sweeps whenever specific circumstances arise, such as moving to a new office, or after any suspicious activity is detected.

How long does a typical sweep take?

The duration varies by the size and complexity of the space, typically ranging from a few hours for a single office to several days for large corporate facilities.

How do you assess risk in sensitive or classified environments?

We conduct comprehensive threat, vulnerability, and risk assessments using intelligence-led methodologies tailored to the operational environment.

What industries do you support?

We support federal, state, and local government, defense contractors, data centers, and private enterprises requiring advanced security solutions.

Do you design SCIFs and secure facilities?

Yes. We provide end-to-end SCIF and high-security facility design, from planning through accreditation support.

How do you ensure compliance with regulations?

Our security programs align with applicable federal standards, agency requirements, and industry best practices.