Security Response to Terrorism

Wednesday, 18 November 2015
Preventing Terrorism

Security Consultant John M. White, CPP, CHPA of Protection Management, LLC was recently quoted in an article titled, “6 tips for preventing and surviving a terrorist attack” as published by the Sinclair Broadcast Group.

Security Response to Terrorism

The fact of the matter is that every person is part of the solution when it comes to preventing a terrorist act, and we all need to have our own security response to terrorism.

Look at it this way, the majority of businesses are small businesses and they have no security personnel on staff. However, even the largest corporations that do have a security staff always rely on all employees to be a part of the security response to any event. Most security professionals know that they need all staff, as well as visitors and customers to be a part of the security for their organization, and therefore an extension of their security. The more ears and eyes that you have watching and protecting your business or even your home, the better off you will be over the long run.

See Something Say Something

One of the things that the average person can do, and should do, is if they see something that they feel is suspicious or does not feel right, they need to say something to law enforcement. It goes back to that gut feeling that you get when you are seeing or hearing something that just does not feel right, and at that point it is time to say something to law enforcement and be a part of the security response to terrorism.

Fear of Overreacting to Security Threat

What is often the case is that when someone gets that gut feeling that something is wrong, they struggle with the decision as to whether to say anything to the police or not. Their self doubt can be their own worst enemy at times, yet they may be holding the key to prevention in their hands at that very moment.

We doubt that there are any law enforcement or government agency out there that will be annoyed with your call regarding what you have observed or overheard. In fact, your information may be the last piece of the puzzle that they need in a case that they are working on, and that information may be the most important source that is needed.

In many cases in past incidents of terrorism there was prior knowledge or signs that an event was in the planning stages, but in many cases those people that knew of those warning signs never provided that information to law enforcement. So in essence, many people are more prone to under-reacting than overreacting, and as a society we need to change that.

6 Tips for Preventing and Surviving a Terrorist Attack

Follow this link to read the article on the 6 Tips for Preventing and Surviving a Terrorist Attack.

Protected Health Information Security

Friday, 19 September 2014
Expert Hospital Security Consultant

Protected Health Information Security

Protected Health Information (PHI) is one of those ongoing security threats within healthcare organizations that continues to plague healthcare executives and security experts.  Just one incident of protected healthcare information being stolen or mishandled can affect hundreds of thousands of people for years to come.  Healthcare organizations have to do more to protect this sensitive and protected information.

Security Risk Assessment

Almost every time our firm performs a security risk assessment for a healthcare organization we locate protected health information that is not being protected as required by law.  Case in point, in one hospital we found a report dictation room unsecured and inside the room we discovered computers that were unsecured with health information on the screens.  In addition to that we also found printed health records lying on the desk with protected health information for at least three patients.  In another case we found patient records on the front seat of a car parked in the parking structure in plain view.

Assessing your risk for protected health information is an ongoing task, and something that healthcare organizations need to do a better job of addressing.  All you have to do is watch the news to see that it is almost a weekly news story where there is a violation of HIPAA and where healthcare organizations report the loss of thousands of files of protected health information due to mishandling or inadequate security measures.

Healthcare Security Expert John M. White, CPP, CHPA was recently quoted in an article published by CSO/Akamai on this subject and spoke about vulnerabilities within healthcare organizations.   Read more….

Security Risk Assessment - Managing Physical and Operational Security

Security Risk Assessment – Newly Published Security Professional Reference Book

Security Expert John M. White, CPP, CHPA, has authored a new book on how to conduct a security risk assessment titled: Security Risk Assessment – Managing Physical and Operational Security.

For many years security practitioners have been seeking comprehensive resource materials on how to conduct a proper security risk assessment, and what to do with the information they have collected as a result of their project.  Well that professional security resource is now available for purchase online at and  Published in August 2014, you can now order the book Security Risk Assessment – Managing Physical and Operational Security through these sites.

Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.

A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found.

Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.

  • Discusses practical and proven techniques for effectively conducting security assessments
  • Includes interview guides, checklists, and sample reports
  • Accessibly written for security professionals with different levels of experience conducting security assessments

For more information, to speak with Mr. John M. White, or receive a free initial phone consultation Contact Protection Management, LLC today.

Top 30 Voices in Healthcare Security

We all know that the giving clergy access to their church members that are inpatients in hospitals is often considered part of the healing process. However, we should know from history that some members of the clergy have had problems in our society. Does that mean that they are all bad apples? Absolutely not! But what does your organization do to insure the clergy has been vetted?

Some would argue that it is not the place for healthcare organizations to do any type of vetting of the clergy that frequent their facilities. Others would argue that you need to do some due diligence, as you are providing them for the most part with unlimited and private access to your patients. For those that think hospitals should stay out of it, do you have any idea who is in your facility today? Do you provide identification name badges for the clergy that frequents your hospital?

Read more…

Emergency Room Violence

If handling the remains of deceased patients is a responsibility of your security department, or you are being pressured to take on the role because of budget cuts, the need to anticipate and plan for complications which may arise is critical, the author points out.

Is it a role of healthcare security officers to handle the remains of deceased patients (i.e. transporting to the morgue, facilitating the transfer of the remains to mortuary services)? Often the answer to this question will depend on your size of facility, geographic location, and your security operation in general. There is no right or wrong answer to the questions above, because it really comes down to the determination of several factors.

Read more…