Comprehensive Physical Security Inspection and Analysis

Security Audits

 

Our Standard Analysis will include:


Grounds, and building layout, perimeters,  utilities, physical layout, lighting, telecommunications, all points of  entry and egress. ID Badge and Identification Systems,  vehicle access, any high points of risk that you may identify, security  guard service, security monitoring service, security alarm system,  building hardware and key control.


To conduct a comprehensive survey several points that must be identified to us are:


Location of your check writing equipment, Mail room, Mail  reception and sorting areas We will need to know the exact property  boundary. 


A sited plan of a minimum of ground floor or any level that has ground access. 

  

We will need to have access to the property and be able to see everything. We will need an escort and access to the building at night and on weekends as well as business hours.


Additional Analysis that is available:


Evaluation of existing response and disaster plan.


Telecommunications Analysis


Telephone  system, facsimile system, inter-comm system, TSCM (Debugging)  recommendations, control of access to the communications systems and  protection in general. Commercial Technical  Countermeasures conducted will be a radio frequency analysis, telephone  analysis, telephone line analysis, carrier current analysis, and a  physical search. The telephones and lines will be analyzed by performing 27 different test. 


 Proprietary Information protection


 Data Security Policy, general information policy and awareness.


 Comprehensive Information Technology Analysis


This is a survey of your IT program, policy and contingency plans. Facility will be examined for the presence of unauthorized recording or transmitting equipment. Report will point out the most common areas that easy compromise could come from and how to stop it.


A basic TSCM inspection involves the following steps: The visual inspection of the areas and inspection  of the r.f. spectrum and the power circuits in the individual rooms  using a TF-8500 receiver, FDL spectrum analyzer, carrier current  analyzer, RF Receiver, Frequency counter, Microwave analyzer, 4 and 5G Analyzers, WiFi and Video Detection, electromagnetic pulse  detector, and Spectrum Analyzer. 


Establish a listening point outside of your facility to determine if there are any radio frequency devices transmitting out of your building.


Counter  measures are performed by experienced professionals using the industry  excepted and certified counter measure equipment and ATAB and ISATP  Certified Technicians. 


Computer Vulnerability tests.


Actual hands on  testing of your system to determine if your are currently compromised  and also to determine if you system can withstand an outside attack from  professional hackers. We will be looking for switches,  sniffers, Trojan horses, logic bombs, virus/worms, service denial, login  and password compromises and physical invasion.


HIPPA Compliance Survey


The Health  Insurance Portability and Accountability Act (HIPAA) of 1996 requires  the Department of Health and Human Services (HHS) to adopt national  standards for electronic health care transactions.

The law also required security and privacy standards in order to protect personal health information. IDRC has developed a program to audit your compliance with and assist you with the following regulations:

 

  • Electronic health care transactions (final rule issued);
  • Medical privacy (final rule issued);
  • Security requirements (proposed rule issued; final rule in development);


Under HIPAA,  most health plans, health care clearinghouses and health care providers  who engage in certain electronic transactions have only until October  2002 to implement each set of final standards.

image7