CAP Security

  • Home
  • About Us
    • Our Mission
    • Company History
    • Industry Partners
    • Frequently Asked Questions
    • Privacy Policy
  • Security Services
    • Services Overview
    • Uniformed Guard Services
    • Hospitality Services
    • Education / Government Services
    • Commercial Services
    • Investigative Services
  • Personnel
    • Personnel Overview
    • Management Team
    • Uniformed Officers
    • Apply Online
  • Subscribe
  • CAP Blog
  • Contact
    • General Inquiry
    • Order Services
    • Our Locations
    • Site Map
    • Connect >
      • Facebook
      • Twitter
  • Management Team
  • Management Team
  • Management Team
  • Management Team
  • Management Team
  • Management Team
  • Home
  • About Us
    • Our Mission
    • Company History
    • Industry Partners
    • Frequently Asked Questions
    • Privacy Policy
  • Security Services
    • Services Overview
    • Uniformed Guard Services
    • Hospitality Services
    • Education / Government Services
    • Commercial Services
    • Investigative Services
  • Personnel
    • Personnel Overview
    • Management Team
    • Uniformed Officers
    • Apply Online
  • Subscribe
  • CAP Blog
  • Contact
    • General Inquiry
    • Order Services
    • Our Locations
    • Site Map
    • Connect >
      • Facebook
      • Twitter
  • Management Team
  • Management Team
  • Management Team
  • Management Team
  • Management Team
  • Management Team

Capital ideas blog

EXAMPLES OF INTRUSION

11/28/2018

1 Comment

 
Picture
In almost all cases in which an intrusion is defeated, it is stopped from ever happening in the first place by the security operation deterring the intruder away from the target. This is why most discussion of security involves creating the security plan and how to broadcast the presence of security measures. However, sometimes a determined adversary will misjudge or ignore the defenses in place. A security plan must be ready to respond at all times in case deterrence fails.
 
Capital Asset Protection has had several instances of malicious intruders attempting to breach our defenses. We’ve found that this most often occurs at night, in locations that are difficult to fully monitor all areas at once, such as large factories. In all cases, upon discovery and the realization that an authority figure was aware of their presence, they disengaged with little or no disruption to the property.
 
A stopped intrusion is cause for [celebration] and relief in how much damage was prevented. However it also necessitates an examination of why the security measures in place failed to deter or obstruct the intruder from entering the property, and a change in procedure to eliminate the weakness.
1 Comment

HAPPY THANKSGIVING

11/22/2018

0 Comments

 
Picture
​Today we meet with family and friends to give thanks for our blessings and celebrate our relationships with those close to us, and as we do we should all take a moment to remember that each of us has reason to feel fortunate. Whether it be due to the jobs that allow us to live our lives, the satisfaction we receive from contributing to society with them, and most importantly the people who we will soon be joining together with.

Our management team, Dan, Mark, Mike, Christy, Dylan, and Geoff, wish you a safe and secure holiday, and we hope that it is spent in much joy and little worry.
0 Comments

TO SET UP A DEFENSE

11/15/2018

0 Comments

 
Picture
​What is the best way to ensure a location is secure from intrusion? It starts with the environment that the building is located in.
 
Take the above picture for instance, an illustration of a typical industrial building. How does the environment assist in deterring or disrupting intruders? Some measures are obvious – a large fence limiting entranceways, a guard shack in position to limit access to authorized personnel. Some features that help secure the facility are more subtle. The long, unbroken sightlines will reveal any intruder long before he reaches the factory walls. Further improvements could be made still, such as the addition of lighting to ensure nighttime visibility, and cameras so that the entire facility is observable at all times without leaving post. More intensive measures could also be considered, such as replacing the walls with a chain-link fence that does hide potential intruders.
 
To set up a defense, you must be able to know how the intruder will think – what his approach will be, what goals he will be working towards, and what methods he will attempt to breach the security measures. While you may be confident in your facility’s defensibility, there may be subtle vulnerabilities, or simple changes that could be easily made to improve security. Always make sure to have your defenses reviewed by a security professional, especially in today’s fast evolving world of crime.
0 Comments

FENCING AND PATROLS

11/9/2018

15 Comments

 
Picture
​The most effective way to deter an intrusion into your property is simply to show that it is being actively defended. A good example is the signs that are commonly placed around homes announcing a security system is installed or at businesses marking the position of cameras – the idea being that if the potential criminal knows that their intrusion has been prepared for, they will not attempt it.

A perimeter barrier is another effective element in a deterrence operation. While most fences provide only a minimum of effectiveness as a delay barrier and thus should be paired with other defensive environmental elements, as a perimeter barrier they are very effective at marking property lines and removing any doubt that a trespasser did not know they were in an unauthorized area.

When a security officer is responsible for defending a property, they will almost always have a patrol schedule implemented as part of the post orders (unless their job duties keep them tied to one area, such as a guard shack at the only accessible entrance). This is partly so the guard can observe the entire property, but arguably the more important result is that the guard makes himself and his active defense visible to anyone who would look to break in.
 
15 Comments

TRUSTING SECURITY PERSONNEL

11/1/2018

0 Comments

 
Picture
​One of the most common uses of a security officer is to ensure that there is always a physical presence at what would otherwise be an unoccupied location. This will deter the vast majority of intrusion attempts, but the individuals trusted to man the empty posts must be of the utmost trustworthiness.
 
Ideally the hiring process filters out the unqualified individuals, and basic interview and verification procedures that all industries use are sufficient. Often times our clients wish to conduct interviews with the potential officers themselves. All of our officers are given criminal history checks, and many undergo additional checks and clearances when positioned at particular sites. For example, working on or near a federal or state government property may require an FBI background check, performing even basic medical procedures mare require an EMT license, and any officers working at a school need several distinct background checks to be cleared before even setting foot on the property.
 
The majority of the effort is made afterwards, by establishing the standard of conduct, and making sure that the officer is aware not only of policies and procedures, but also that infractions will be discovered and acted upon. Frequent site checks by their managers and road supervisors help avoid a sense of isolation, especially in remote posts and on night shifts when the officer may not expect to be disturbed. As with most aspects of security, the quality of the security operation is directly tied to the quality of the local management.

0 Comments

    Exploring What Creates A Protected World


    Archives

    August 2022
    June 2022
    April 2022
    January 2022
    December 2021
    February 2021
    December 2020
    November 2020
    October 2020
    September 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    August 2019
    July 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017

    Categories

    All

    RSS Feed

INVESTIGATE OUR WEBSITE

ABOUT US
Home
​Our Mission
Company History
Industry Partners
Frequently Asked Questions
SECURITY SERVICES
Uniformed Guards
Hospitality
Education/Government
Commercial
Investigative Services
PERSONNEL
Personnel Overview
Management Team
Uniformed Officers
Employment
Apply Online
NEWS / CONTACT
Connect on Facebook
Capital Asset Blog
Subscribe to Newsletter
Contact Us
Privacy Policy

Picture
​29 W Noblestown Road,   Carnegie, PA 15106
Picture

Website Crafted by GET WEB Get Going!