Preview

Reedy Case Study

Powerful Essays
Open Document
Open Document
2084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reedy Case Study
A security survey at Reedy Recovery Company was conducted on September 15, 2011 by Amy Reedy who was invited and retained by DeVry University for a security assessment. Information in the report was obtained from James Write, Executive Vice President and Chief Financial officer, and Rhonda Forbes, Facilities Manager, personal observations were done by James Write during the inspection of the DeVry facility.
The intentions of this report are a detailed audit of all security aspects and phases of the Reedy Recovery Company. Our company will review and evaluate areas and activities that are considered most vulnerable to theft and safety risks.
It is not the intentions of Reedy Recovery Company or the writer of this report to evaluate DeVry’s
…show more content…
It is also recommended that the security officer who patrols the grounds while the receptionist is at her desk not only do it between the hours of 8am and 5pm, but that shift are made to patrol the grounds at all times, as anyone could find out this schedule and attempt to breach the facility when they know an officer is not patrolling after …show more content…
A camera should be added to the hallway area monitoring employees there. Another CCTV should be monitoring the lobby outside the vault area and it should be able to be viewed by employees inside the vault area. Shipping and receiving should be more closely monitored especially when some of the items are being picked up by and external carrier. These people should also show ID for the company they are working for and along with signing the receiving slip also sign in to a log book with their name, time, date and what they are picking up and dropping off. Please be advised that these are the recommendations of Reedy Recovery Company and we take great pride in being given the opportunity to assist you in your security needs for your facility. You can rest assured that your company will be at little risk if you take these recommendations and put them to work for you. It has been a pleasure in assisting you in increasing the security of your company and if you have any other concerns or questions please feel free to contact our office and ask to speak to me

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -RESULTS DRIVEN. As Security Manager, he supervised three quarterly Cyber Security spot checks covering 14 secure spaces between 11 tenant commands island-wide, maintaining compliance of Defense Information Systems Agency's Physical Security posture…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    This security assessment is provided at the request of Southbound LLC. Willie D. Gibbons of Stalwart Security conducted the assessment of the Southbound warehouse complex…

    • 4807 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 Individual Security Solutions. NTC 411 Week 5 Summary.…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    talk team uk

    • 297 Words
    • 2 Pages

    Staff must ‘clock in’ and ‘clock out’ every time they enter and exit the building. Failure to do so will result in a penalty fine…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Better Essays

    If a security guard is already on site then they are able to respond immediately. Hiring private security also reduces the chance that physical security operations are run properly. Security guards are able to test locks, cameras and alarms to ensure that they are always working properly. Security guards can remain in certain areas or they can monitor cameras and cover a much larger area. With these safeguards in place the church members are able to feel comfortable and enjoy their beliefs without the fear of hate crimes, robbery or vandalism. With everyone safe the staff members are able to do their job in peace and provide a great service for their followers. Now that the church is safe from intruders, it is pertinent that all internal employees and staff members are…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 1114 Words
    • 2 Pages

    1. "2013 Annual Report of Campus Security and Fire Safety Policies and Procedures." DREXEL UNIVERSITY – CLERY ACT STATISTICS. DREXEL UNIVERSITY, 2013. Web. 11 Feb. 2014.…

    • 1114 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    health and saftey

    • 5836 Words
    • 20 Pages

    A risk assessment should be carried out every morning and eveing, the room and equipment need to be checked on a daily basis and removed if broken or need repairing. The room must have suffient light and air circulation and all doors should be alarmed and secure to alert staff when opened. Any visitors have to report to the office and signed in and be told the fire drill procedures and…

    • 5836 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    School Shootings

    • 669 Words
    • 3 Pages

    Next, after gathering the best security personnel you can find, focus on the duties of each officer. There should be one police officer for each exit and entrance in order to make sure that no dangerous figure can sneak into the building in any way. Then, give each officer a handheld transceiver so that they may communicate properly with each other to either call for backup or to evoke any kind of awareness. In addition, schools should incorporate two officers near the main entrance of the building in order to have an exponentially improved security system due to the increased risk of shooters entering through the front.…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Availability to ensure that all the utilities and systems are available and operational when they are needed. A major objective of an access security policy must be to ensure that utilities information is always available to support critical business processing. The purpose of this audit is to evaluate the access and security internal controls related to the XYZ and to assess whether there are internal control weaknesses that could allow errors and irregularities to go undetected.…

    • 1681 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Clerk Case Studt

    • 323 Words
    • 2 Pages

    Having them check each other’s work or hire another clerk to double check might be better than installing cameras because it could be an invasion of privacy for some people. Proper corrective and preventive discipline actions could be taken so that these thefts would not happen again. Job rotation could also be taken since…

    • 323 Words
    • 2 Pages
    Satisfactory Essays